Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msvcp110.dll

Overview

General Information

Sample name:msvcp110.dll
Analysis ID:1541478
MD5:740c3417929730c4ae20e0165aa94b7c
SHA1:d03cebc7b1172149f65b06f15b0fbb11512f5b88
SHA256:8e200e4aca363cc2be03121815ec03525f1d983f717f67b63241028c59cb0bde
Tags:dlluser-aachum
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking computer name)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6480 cmdline: loaddll32.exe "C:\Users\user\Desktop\msvcp110.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5832 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5960 cmdline: rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • aspnet_regiis.exe (PID: 5092 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
          • WerFault.exe (PID: 5960 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1260 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 2404 cmdline: rundll32.exe C:\Users\user\Desktop\msvcp110.dll,GetGameData MD5: 889B99C52A60DD49227C5E485A016679)
      • aspnet_regiis.exe (PID: 4488 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
        • WerFault.exe (PID: 5920 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1244 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5344 cmdline: rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",GetGameData MD5: 889B99C52A60DD49227C5E485A016679)
      • aspnet_regiis.exe (PID: 5276 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
        • WerFault.exe (PID: 1444 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 1268 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://95.217.125.57/2f571d994666c8cb.php", "Botnet": "36495972654"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            7.2.aspnet_regiis.exe.3000000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              6.2.aspnet_regiis.exe.740000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                10.2.aspnet_regiis.exe.3180000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  6.2.aspnet_regiis.exe.740000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    7.2.aspnet_regiis.exe.3000000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 10.2.aspnet_regiis.exe.3180000.0.unpackMalware Configuration Extractor: StealC {"C2 url": "http://95.217.125.57/2f571d994666c8cb.php", "Botnet": "36495972654"}
                      Source: msvcp110.dllReversingLabs: Detection: 63%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: msvcp110.dllJoe Sandbox ML: detected
                      Source: msvcp110.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                      Source: msvcp110.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: http://95.217.125.57/2f571d994666c8cb.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 95.217.125.57 95.217.125.57
                      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.000000000359C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 0000000A.00000002.2661808078.000000000355D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/.
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/1
                      Source: aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/2=
                      Source: aspnet_regiis.exe, 0000000A.00000002.2661808078.000000000355D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/IXK
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/R
                      Source: aspnet_regiis.exe, 00000006.00000002.2409698695.000000000306F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/Y
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/b
                      Source: aspnet_regiis.exe, 0000000A.00000002.2661808078.000000000355D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/jXl
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/~
                      Source: aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57R/
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57h
                      Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1244
                      Source: msvcp110.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@19/13@0/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_00758680 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,6_2_00758680
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5276
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6028:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5092
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4488
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3205649a-56de-4634-b8e2-296e669c7ce8Jump to behavior
                      Source: msvcp110.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msvcp110.dll,GetGameData
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT url FROM urls LIMIT 1000;
                      Source: msvcp110.dllReversingLabs: Detection: 63%
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\msvcp110.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msvcp110.dll,GetGameData
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",GetGameData
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1244
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 1268
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msvcp110.dll,GetGameDataJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",GetGameDataJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: msvcp110.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: msvcp110.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_0075B035 push ecx; ret 6_2_0075B048
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 7_2_0301B035 push ecx; ret 7_2_0301B048
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 10_2_0319B035 push ecx; ret 10_2_0319B048
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeEvasive API call chain: GetComputerName,DecisionNodes,Sleepgraph_7-13459
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 4800Thread sleep count: 258 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 4800Thread sleep time: -1548000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 4052Thread sleep count: 231 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 4052Thread sleep time: -1386000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_00741160 GetSystemInfo,6_2_00741160
                      Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                      Source: Amcache.hve.14.drBinary or memory string: VMware
                      Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                      Source: aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003053000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003084000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000007.00000002.2655920781.00000000035AF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 0000000A.00000002.2661808078.000000000356D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwarer
                      Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: aspnet_regiis.exe, 0000000A.00000002.2661808078.000000000356D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWU
                      Source: aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwared
                      Source: aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003084000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWsbC
                      Source: Amcache.hve.14.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.14.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_007445C0 VirtualProtect ?,00000004,00000100,000000006_2_007445C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_00759750 mov eax, dword ptr fs:[00000030h]6_2_00759750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 7_2_03019750 mov eax, dword ptr fs:[00000030h]7_2_03019750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 10_2_03199750 mov eax, dword ptr fs:[00000030h]10_2_03199750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 4488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 5092, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 5276, type: MEMORYSTR
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 740000 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3000000 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3180000 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 740000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3000000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3180000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 740000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 741000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 75E000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 76B000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 99C000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2B57008Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3000000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3001000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 301E000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 302B000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 325C000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F40008Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3180000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3181000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 319E000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31AB000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 33DC000Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F37008Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: GetLocaleInfoA,6_2_00757B90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: GetLocaleInfoA,7_2_03017B90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: GetLocaleInfoA,10_2_03197B90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_00757850 GetUserNameA,6_2_00757850
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 6_2_00757A30 GetTimeZoneInformation,6_2_00757A30
                      Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 7.2.aspnet_regiis.exe.3000000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.aspnet_regiis.exe.740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.aspnet_regiis.exe.3180000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.aspnet_regiis.exe.740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.aspnet_regiis.exe.3000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.aspnet_regiis.exe.3180000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2661356120.000000000321A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2655450967.000000000309A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2408845959.00000000007DA000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 4488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 5092, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 5276, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 7.2.aspnet_regiis.exe.3000000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.aspnet_regiis.exe.740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.aspnet_regiis.exe.3180000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.aspnet_regiis.exe.740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.aspnet_regiis.exe.3000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.aspnet_regiis.exe.3180000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2661356120.000000000321A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2655450967.000000000309A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2408845959.00000000007DA000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 4488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 5092, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 5276, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      11
                      Disable or Modify Tools
                      OS Credential Dumping1
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      21
                      Virtualization/Sandbox Evasion
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
                      Process Injection
                      Security Account Manager21
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive11
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Obfuscated Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Rundll32
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync132
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1541478 Sample: msvcp110.dll Startdate: 24/10/2024 Architecture: WINDOWS Score: 100 38 Found malware configuration 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Yara detected Stealc 2->42 44 4 other signatures 2->44 9 loaddll32.exe 1 2->9         started        process3 process4 11 rundll32.exe 9->11         started        14 cmd.exe 1 9->14         started        16 rundll32.exe 9->16         started        18 conhost.exe 9->18         started        signatures5 54 Writes to foreign memory regions 11->54 56 Allocates memory in foreign processes 11->56 58 Injects a PE file into a foreign processes 11->58 20 aspnet_regiis.exe 12 11->20         started        24 rundll32.exe 14->24         started        26 aspnet_regiis.exe 12 16->26         started        process6 dnsIp7 36 95.217.125.57, 49709, 49821, 49822 HETZNER-ASDE Germany 20->36 46 Found evasive API chain (may stop execution after checking computer name) 20->46 28 WerFault.exe 23 16 20->28         started        48 Writes to foreign memory regions 24->48 50 Allocates memory in foreign processes 24->50 52 Injects a PE file into a foreign processes 24->52 30 aspnet_regiis.exe 12 24->30         started        32 WerFault.exe 16 26->32         started        signatures8 process9 process10 34 WerFault.exe 2 16 30->34         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      msvcp110.dll63%ReversingLabsWin32.Trojan.Tedy
                      msvcp110.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://95.217.125.57/true
                        unknown
                        http://95.217.125.57/2f571d994666c8cb.phptrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://95.217.125.57/baspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://95.217.125.57/~aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://95.217.125.57R/aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://95.217.125.57/jXlaspnet_regiis.exe, 0000000A.00000002.2661808078.000000000355D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://95.217.125.57aspnet_regiis.exe, 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmptrue
                                    unknown
                                    http://95.217.125.57/Raspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://95.217.125.57/1aspnet_regiis.exe, 00000007.00000002.2655920781.000000000359C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://95.217.125.57/IXKaspnet_regiis.exe, 0000000A.00000002.2661808078.000000000355D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://upx.sf.netAmcache.hve.14.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://95.217.125.57haspnet_regiis.exe, 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://95.217.125.57/.aspnet_regiis.exe, 00000007.00000002.2655920781.000000000359C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://95.217.125.57/2=aspnet_regiis.exe, 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://95.217.125.57/Yaspnet_regiis.exe, 00000006.00000002.2409698695.000000000306F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  95.217.125.57
                                                  unknownGermany
                                                  24940HETZNER-ASDEtrue
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1541478
                                                  Start date and time:2024-10-24 21:49:08 +02:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 5m 32s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:20
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:msvcp110.dll
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winDLL@19/13@0/1
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HCA Information:
                                                  • Successful, ratio: 100%
                                                  • Number of executed functions: 75
                                                  • Number of non-executed functions: 4
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .dll
                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 52.182.143.212
                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • VT rate limit hit for: msvcp110.dll
                                                  TimeTypeDescription
                                                  15:49:59API Interceptor490x Sleep call for process: aspnet_regiis.exe modified
                                                  15:50:01API Interceptor1x Sleep call for process: loaddll32.exe modified
                                                  15:50:27API Interceptor3x Sleep call for process: WerFault.exe modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  95.217.125.57Setup_v1.29.exeGet hashmaliciousStealcBrowse
                                                  • 95.217.125.57/
                                                  L0ad3r.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 95.217.125.57/2f571d994666c8cb.php
                                                  Loader.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 95.217.125.57/2f571d994666c8cb.php
                                                  Installer.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 95.217.125.57/2f571d994666c8cb.php
                                                  AVSicb6epR.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 95.217.125.57/2f571d994666c8cb.php
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  HETZNER-ASDESetup_v1.29.exeGet hashmaliciousStealcBrowse
                                                  • 95.217.125.57
                                                  la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 94.130.253.79
                                                  https://tronlkam8s2.z13.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
                                                  • 195.201.57.90
                                                  http://tronlkam8s2.z13.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
                                                  • 195.201.57.90
                                                  https://8jkfw9cqp7ep.z13.web.core.windows.net/?zpbid=78432_55610c1d-9229-11ef-824f-03718b6de7bb#Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                  • 195.201.57.90
                                                  Payment for outstanding statements.pdfGet hashmaliciousHTMLPhisherBrowse
                                                  • 144.76.38.184
                                                  o2YUBeMZW6.elfGet hashmaliciousMiraiBrowse
                                                  • 94.130.241.80
                                                  ai3eCONS9Q.elfGet hashmaliciousMiraiBrowse
                                                  • 95.217.66.133
                                                  la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 49.12.72.134
                                                  la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                  • 95.217.66.190
                                                  No context
                                                  No context
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9590496265491976
                                                  Encrypted:false
                                                  SSDEEP:192:dRcP1xC0BU/4ju0ZrVZSzuiF2Z24IO8CBHw:LmxJBU/4jP8zuiF2Y4IO8CBH
                                                  MD5:1D114E1B98FB9C8C7DFA39A940330603
                                                  SHA1:9052ABAE3EE01417514B7FA0FD16F4183B84BCAC
                                                  SHA-256:FF3566C24321DEFC55C9DDACCE800A4050DA93CED4789E249247A51A4D8AA27D
                                                  SHA-512:27DC7C525C9E5D4AE352AA0A12E8D956EF85D7912D467E8EC8226E8A71A942C1525D6EA6BB4FEE98863B4108F1AF39ADB3B5550FF1DA18E28EDDED50AEB8A811
                                                  Malicious:false
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.7.3.0.2.2.7.8.5.5.8.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.7.3.0.2.4.2.5.4.3.4.5.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.d.2.3.3.4.a.9.-.d.1.1.7.-.4.c.9.d.-.a.1.4.b.-.c.9.7.5.b.c.e.9.f.6.c.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.0.e.a.3.3.1.-.d.4.b.3.-.4.c.5.a.-.9.a.2.1.-.7.5.c.0.8.1.9.6.0.7.3.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.8.8.-.0.0.0.1.-.0.0.1.5.-.5.4.b.6.-.6.5.e.8.4.d.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.c.5.5.8.f.0.e.8.4.2.c.4.3.e.6.b.3.b.c.0.6.6.9.1.6.b.2.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9589222191980253
                                                  Encrypted:false
                                                  SSDEEP:192:78ixXP1VC0BU/4ju0ZrVZazuiF2Z24IO8CBHw:QQNVJBU/4jPEzuiF2Y4IO8CBH
                                                  MD5:831285CF69DF220DEBB42D59709DB1AE
                                                  SHA1:B42EF4D8805185A1CF588BDA4D297E442D6B3B50
                                                  SHA-256:EA2D25DCBFA5561FFCB162DE7042057753828B27CF168CC9A0E95C0F72448C8E
                                                  SHA-512:01B94702F2CC1D0492A81704DAAA80C29249A56E612BDC7C7EECB284851CC124BD3768679D014268F20BD004E328F3B4270B1DE9F5B371B4004892E7AD0F60EE
                                                  Malicious:false
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.7.3.0.4.9.9.9.1.3.4.6.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.7.3.0.5.0.5.5.3.8.4.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.e.4.2.f.e.a.-.b.6.4.1.-.4.7.b.7.-.9.1.9.1.-.6.5.8.3.a.7.1.6.9.b.b.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.1.f.b.3.b.7.a.-.6.8.6.a.-.4.f.3.d.-.a.d.1.8.-.f.4.e.4.a.3.0.4.d.f.c.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.e.4.-.0.0.0.1.-.0.0.1.5.-.0.5.3.f.-.7.1.e.8.4.d.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.c.5.5.8.f.0.e.8.4.2.c.4.3.e.6.b.3.b.c.0.6.6.9.1.6.b.2.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9591073704243255
                                                  Encrypted:false
                                                  SSDEEP:192:Ib7P1RC0BU/4ju0ZrVZazuiF2Z24IO8CBHw:cRRJBU/4jPEzuiF2Y4IO8CBH
                                                  MD5:9D7999D546A3238ED40AA2A7A662CF8E
                                                  SHA1:2C48D1294D6893E37133A1B58716EBC8583408D0
                                                  SHA-256:BA3F5E3CCB66D41E1D0036C56611E134AB118FCEFED7A5797169A3AC239850EE
                                                  SHA-512:1E210D945F8A8AB8B2AB2613A0541A098B10C4E01E98ED9A4DAA0686DDC7C3C1496A91DA05ED82F2753528F69C2543E8D9246060FF9D41D99C1DB05B6F34B82A
                                                  Malicious:false
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.7.3.0.5.0.9.4.4.4.6.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.7.3.0.5.1.3.6.6.3.3.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.c.f.f.2.7.1.-.b.8.8.a.-.4.3.c.f.-.8.2.1.c.-.1.9.4.6.6.9.1.5.b.a.5.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.9.f.b.9.f.8.8.-.a.7.d.a.-.4.8.a.7.-.9.4.d.0.-.9.2.9.9.1.0.2.f.1.0.3.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.9.c.-.0.0.0.1.-.0.0.1.5.-.b.0.c.7.-.2.c.e.a.4.d.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.c.5.5.8.f.0.e.8.4.2.c.4.3.e.6.b.3.b.c.0.6.6.9.1.6.b.2.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Thu Oct 24 19:50:50 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):116598
                                                  Entropy (8bit):1.6203438626240492
                                                  Encrypted:false
                                                  SSDEEP:384:9OW5sc1zbSEFtBCsjPBiNnF/pjEukm8ED:75sc1/SEFtDgNnrQtK
                                                  MD5:8887503B8C596E96A9DFAE2207176B8A
                                                  SHA1:678334BCAFFEFD9F71DD265D43FBBD1D900F3E4F
                                                  SHA-256:1353010C27F5AF19AD961AB204927FF3C334411529837563D07D637D1878FC41
                                                  SHA-512:80816382B20EE7CB26471370068BB4BA24E1E0623F4B61EC3CB022A68C3BCC493083406CA71CCF84BC5DA17C62991259A4FB118D285F56B52AC86CA58AB32694
                                                  Malicious:false
                                                  Preview:MDMP..a..... ..........g.........................................A..........T.......8...........T............1.............l...........X...............................................................................eJ..............GenuineIntel............T.............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):8360
                                                  Entropy (8bit):3.6965711090821176
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJeI6e6YBX76Sq7h4gmfutprp89bpmsfRjm:R6lXJp6e6YBL6Sqigmfu2pFfY
                                                  MD5:1888A91352795DA17E08D7B12B20AF51
                                                  SHA1:28B76E413CD708CA9FCBD508A09F263CAB928573
                                                  SHA-256:D313842F1807F69DD29BFEACFE89556E21411D15F25FAAB9CE8D400D9B4F202B
                                                  SHA-512:1CF61DE494351459A4ED5D2A1B40A7F791A7B5ECA84661E6E1F1A033AF96A7603FC440DF22B41C88235E3D62BBBBD3BE8A1F0A428D04B460E6DF8C3346ED2985
                                                  Malicious:false
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.9.2.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4675
                                                  Entropy (8bit):4.460095411802302
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zs6Jg77aI9ij5WpW8VYXBYm8M4JhqeFGdM+q8b3s0SaraTMd:uIjfII7AI7VWgJh6dMgc0SaraTMd
                                                  MD5:42C5948CD938F4EFC22F292B41F30E0D
                                                  SHA1:80D441C01B89E54D20F8EA73582F813EEF719486
                                                  SHA-256:B8E08D2566880FC3A356730C09DBF1CDC377FD161905A611D5B15765C77851DE
                                                  SHA-512:7DCDDD669C7B820DEE08582CD2CA5B528ACDB5526E385E54B7E929D96583FAECB78C7F723D60CE3DCDC4361852C654187CAED4C02F7A57B703616B8852C83CC3
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557933" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Thu Oct 24 19:50:51 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):115518
                                                  Entropy (8bit):1.6351844297158578
                                                  Encrypted:false
                                                  SSDEEP:384:G7W5sc12TSEKPbAghHuUS6pwr0YQ3oaY1IV+hB5XiJTHrb:35sc12TSEKjPGoYsoX1IY5XQL
                                                  MD5:732F03B9F457C5FBFED7C9F33430EE33
                                                  SHA1:49950F48FAB0B9C7012D578C49DD96745DCB0465
                                                  SHA-256:2B72CD814DABEA67F5923AF44333DECFC4D6D4E9CFAC69D44D2083203FD49060
                                                  SHA-512:AE4C5D8DB5039240DA5E1B632AC12B913EFD96ABD67BC69E2747570C3E0B0BE9468FA3A9AC391E9A37D422E233280E9DE57287883E7E286427ADE71B2C7055AC
                                                  Malicious:false
                                                  Preview:MDMP..a..... ..........g.........................................A..........T.......8...........T...........H1..............l...........X...............................................................................eJ..............GenuineIntel............T.............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):6360
                                                  Entropy (8bit):3.722114229301873
                                                  Encrypted:false
                                                  SSDEEP:96:RSIU6o7wVetbGe67eSYuQE/CKP5aM4U889bgLsf6gm:R6l7wVeJGe67eSYutpr889bgLsf6gm
                                                  MD5:23F4EEB23B94BF2F811EA28582DE49A9
                                                  SHA1:D4CA66E6655E3FC318F4A1F03D9DF74ADD3C2229
                                                  SHA-256:2E94B7589DA970C30A41FF9B4A55B865CF048823E8CBB3F46E84F7EC5EB770E8
                                                  SHA-512:DC07DA25D271AB8B4EDA7ED51A2DEF9143BA551BE47D798C6444BB9DF3245BEA6D16170EC3BC715C544FCA0C0E868513A3ACADC84F63BFB47027F85D5938CC40
                                                  Malicious:false
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.7.6.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4675
                                                  Entropy (8bit):4.4590376158644975
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zs6Jg77aI9ij5WpW8VYXsYm8M4JhqeFvo+q8b3K0SaraOMd:uIjfII7AI7VWpJhjoga0SaraOMd
                                                  MD5:3DC791E84C5DE7B918BEBD0D7B3A04D3
                                                  SHA1:017BBD4D894DE48530AFE02AE692520955D9F8E3
                                                  SHA-256:A4BBB35DAF1530364F91E5A3B6E950081B53A542BF4805B046908D1A90E2B34A
                                                  SHA-512:132543BBE6E1796EED49C32AA3A11CC3F19C5011B05BEF0CE090445324BD8B72755224E2447FAF5F26EF52F69A60928805C7EEA9E658A0E74A51625C7B3321C5
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557933" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Thu Oct 24 19:50:23 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):110512
                                                  Entropy (8bit):1.6159377954215517
                                                  Encrypted:false
                                                  SSDEEP:384:Rml/cugQVSEVSctGo+oyhDNcQU9Ns6hMxIMkYIWr+:cl/cugQVSEzJh7Jlh3xvb
                                                  MD5:E75D671DA253361DDBBC8842B197AD45
                                                  SHA1:F385311CDF4C8D36B4C8FEAB34BB3046878A29E5
                                                  SHA-256:D6E09870F91930B137C51156FE26287D94B761BAAE64B1B274BA326D503D00A0
                                                  SHA-512:E2AD990AA98CC463261A4869162FD36D873E8BC51B87D488940DF7094F7366A015BFD9D65168D929543CCB3FD53EE148A99C7ABDB664B7CF2613B617BD934866
                                                  Malicious:false
                                                  Preview:MDMP..a..... ..........g....................................T....>..........T.......8...........T............0...~..........<...........(...............................................................................eJ..............GenuineIntel............T.............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):6348
                                                  Entropy (8bit):3.721636286272004
                                                  Encrypted:false
                                                  SSDEEP:96:RSIU6o7wVetb+ZK6LyYuQE/CKP5aM4Ui89b6Rsf5fGm:R6l7wVeJwK6LyYutpri89b6Rsf5em
                                                  MD5:E223AB812DC1B9973F7878CC8122E299
                                                  SHA1:3B51B2B7B3D47ADD8E4FA571A985DB257C0937EB
                                                  SHA-256:552C5005715345FE30B3034E9C0EBFAEAA7B0A95FB4A50236720C9384F7106E1
                                                  SHA-512:D575AB2EDF81F7F2EB509DE5E4CDF0026D19D62CBBAE6188606890DB3C8676D58E73928FE1170D7C16DF75ACE4A4DEE4A6C5E2A61EBE3A11DA437DF7D27AFE28
                                                  Malicious:false
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.4.8.8.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4675
                                                  Entropy (8bit):4.4600701723392815
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zs6Jg77aI9ij5WpW8VYXcYm8M4JhqeFJ+q8b3J0SaraiMd:uIjfII7AI7VW5JhVgZ0SaraiMd
                                                  MD5:C1F1E357170C9FBCBCC5404CD46E37D5
                                                  SHA1:EE50FACAFD21559C7801ACBB95F274E67EE13D02
                                                  SHA-256:2C2F15928D56C3882A8670D6CBDFE49C5A9D78595E4E8E941CAAFCD466522CB9
                                                  SHA-512:229417EF705CA78D5A3E9186652EE4A65609DCA11DCC84521A1B427DEBB0CD5AEC656C7F83FA4204B6F6831CA418402FF77D8085C0E1C5B773304183CBD50E32
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557933" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.469509149710471
                                                  Encrypted:false
                                                  SSDEEP:6144:2zZfpi6ceLPx9skLmb0fFZWSP3aJG8nAgeiJRMMhA2zX4WABluuNQjDH5S:YZHtFZWOKnMM6bFpWj4
                                                  MD5:5606B5DBE9630E8021268F2AE6BF31F5
                                                  SHA1:6D89EFF200CD76B84B9027B21D166D7A9D7DCF1F
                                                  SHA-256:EC252D935A81CE7CFB1F2056DCA63593CAF905D6B4065A8EE230C611B64230CD
                                                  SHA-512:61933F47C856325656683690081F18C683E0404F17066B1D0FDAC5CF640F8E2E1626CD8296C15603507F173967612FD4B2A3A118C7F2329367F6C7E30E32200B
                                                  Malicious:false
                                                  Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..E.M&................................................................................................................................................................................................................................................................................................................................................S.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):6.928739021633009
                                                  TrID:
                                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                                  • DOS Executable Generic (2002/1) 0.20%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:msvcp110.dll
                                                  File size:601'088 bytes
                                                  MD5:740c3417929730c4ae20e0165aa94b7c
                                                  SHA1:d03cebc7b1172149f65b06f15b0fbb11512f5b88
                                                  SHA256:8e200e4aca363cc2be03121815ec03525f1d983f717f67b63241028c59cb0bde
                                                  SHA512:4bccf661986c98635319ae86c394022e9e4bf1a944a759176a69916b33e64eb910beb027faa55f66322754715a772d0ec693ddf6c3cb07a611f026f678390e7f
                                                  SSDEEP:12288:UVi4BszD+DZslByhHwrZz1vb2MW4hPuH5A5ItioxaNi2iU:aBsG2l06rrCwSig9
                                                  TLSH:89D45B48AD34C29BE648C5F2F96C46D0796487A51D328CCB3EAE1C243B66EF0506D7F9
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.vkp}.8p}.8p}.8;..9|}.8;..9.}.8;..9d}.8;..9v}.8W.c8s}.8p}.8.}.8v..9Q}.8v..9`}.8v..9d}.8p}.8q}.8...9q}.8...9q}.8Richp}.8.......
                                                  Icon Hash:7ae282899bbab082
                                                  Entrypoint:0x1002faae
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x10000000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x671803AA [Tue Oct 22 19:57:30 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:6
                                                  OS Version Minor:0
                                                  File Version Major:6
                                                  File Version Minor:0
                                                  Subsystem Version Major:6
                                                  Subsystem Version Minor:0
                                                  Import Hash:43480200b3c5eced3ea874108558123d
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  cmp dword ptr [ebp+0Ch], 01h
                                                  jne 00007F6D6C812D47h
                                                  call 00007F6D6C813270h
                                                  push dword ptr [ebp+10h]
                                                  push dword ptr [ebp+0Ch]
                                                  push dword ptr [ebp+08h]
                                                  call 00007F6D6C812BF3h
                                                  add esp, 0Ch
                                                  pop ebp
                                                  retn 000Ch
                                                  push ebp
                                                  mov ebp, esp
                                                  push 00000000h
                                                  call dword ptr [1003D06Ch]
                                                  push dword ptr [ebp+08h]
                                                  call dword ptr [1003D068h]
                                                  push C0000409h
                                                  call dword ptr [1003D034h]
                                                  push eax
                                                  call dword ptr [1003D070h]
                                                  pop ebp
                                                  ret
                                                  push ebp
                                                  mov ebp, esp
                                                  sub esp, 00000324h
                                                  push 00000017h
                                                  call dword ptr [1003D074h]
                                                  test eax, eax
                                                  je 00007F6D6C812D47h
                                                  push 00000002h
                                                  pop ecx
                                                  int 29h
                                                  mov dword ptr [100926D0h], eax
                                                  mov dword ptr [100926CCh], ecx
                                                  mov dword ptr [100926C8h], edx
                                                  mov dword ptr [100926C4h], ebx
                                                  mov dword ptr [100926C0h], esi
                                                  mov dword ptr [100926BCh], edi
                                                  mov word ptr [100926E8h], ss
                                                  mov word ptr [100926DCh], cs
                                                  mov word ptr [100926B8h], ds
                                                  mov word ptr [100926B4h], es
                                                  mov word ptr [100926B0h], fs
                                                  mov word ptr [100926ACh], gs
                                                  pushfd
                                                  pop dword ptr [100926E0h]
                                                  mov eax, dword ptr [ebp+00h]
                                                  mov dword ptr [100926D4h], eax
                                                  mov eax, dword ptr [ebp+04h]
                                                  mov dword ptr [000926D8h], eax
                                                  Programming Language:
                                                  • [IMP] VS2005 build 50727
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x43a400x78.rdata
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x43ab80x64.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000x2118.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x42dd00x1c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x42d100x40.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x3d0000x174.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x3bb630x3bc00b9583e00c36c0820ca67ea068e65034fFalse0.4124239997384937data6.654540918170396IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x3d0000x732e0x740091edac08b9eb0cb235dd3b28530bf9beFalse0.4581088362068966data5.17097918438835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x450000x4e3e00x4d6009d9cfc5947f7a0aa0653d6af4cdef6f8False0.4926418618739903data6.351172386117954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .reloc0x940000x21180x220056e1b578d061799baa1245cfb844d13eFalse0.7789522058823529data6.639453614972652IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  DLLImport
                                                  USER32.dllFillRect, BeginPaint, InvalidateRect, PostQuitMessage, DefWindowProcA, ShowWindow, EndPaint
                                                  GDI32.dllTextOutA
                                                  ntdll.dllNtWriteVirtualMemory, NtCreateThreadEx, NtSetContextThread, NtResumeThread, NtAllocateVirtualMemory, NtGetContextThread, RtlUnwind
                                                  KERNEL32.dllWriteConsoleW, SetFilePointerEx, CreateFileW, TlsSetValue, GetConsoleMode, GetConsoleOutputCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapReAlloc, HeapSize, GetCurrentProcess, GetModuleHandleA, K32GetModuleInformation, GetModuleFileNameA, CreateFileA, CreateFileMappingA, CloseHandle, MapViewOfFile, VirtualProtect, GetModuleHandleW, GetConsoleWindow, VirtualAlloc, CreateProcessW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetStringTypeW, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, DecodePointer, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, GetProcessHeap, GetStdHandle, GetFileType
                                                  NameOrdinalAddress
                                                  GetGameData10x10015900
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 24, 2024 21:50:00.968420982 CEST4970980192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:00.973826885 CEST804970995.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:00.973917961 CEST4970980192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:00.974601984 CEST4970980192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:00.980110884 CEST804970995.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:09.657960892 CEST804970995.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:09.658107996 CEST4970980192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:09.658602953 CEST4970980192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:09.664665937 CEST804970995.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:30.500909090 CEST4982180192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:30.506715059 CEST804982195.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:30.506781101 CEST4982180192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:30.508619070 CEST4982280192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:30.510962009 CEST4982180192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:30.514591932 CEST804982295.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:30.514658928 CEST4982280192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:30.514794111 CEST4982280192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:30.516382933 CEST804982195.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:30.521173000 CEST804982295.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:38.997706890 CEST804982195.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:38.997900009 CEST4982180192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:38.998357058 CEST4982180192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:38.998608112 CEST804982295.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:38.998665094 CEST4982280192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:38.998739004 CEST4982280192.168.2.695.217.125.57
                                                  Oct 24, 2024 21:50:39.003886938 CEST804982195.217.125.57192.168.2.6
                                                  Oct 24, 2024 21:50:39.004096031 CEST804982295.217.125.57192.168.2.6
                                                  • 95.217.125.57
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.64970995.217.125.57804488C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 24, 2024 21:50:00.974601984 CEST88OUTGET / HTTP/1.1
                                                  Host: 95.217.125.57
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.64982195.217.125.57805276C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 24, 2024 21:50:30.510962009 CEST88OUTGET / HTTP/1.1
                                                  Host: 95.217.125.57
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.64982295.217.125.57805092C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 24, 2024 21:50:30.514794111 CEST88OUTGET / HTTP/1.1
                                                  Host: 95.217.125.57
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:15:49:58
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\System32\loaddll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\msvcp110.dll"
                                                  Imagebase:0xf30000
                                                  File size:126'464 bytes
                                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:15:49:58
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:15:49:58
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1
                                                  Imagebase:0x1c0000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:15:49:58
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:rundll32.exe C:\Users\user\Desktop\msvcp110.dll,GetGameData
                                                  Imagebase:0xdf0000
                                                  File size:61'440 bytes
                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:15:49:58
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1
                                                  Imagebase:0xdf0000
                                                  File size:61'440 bytes
                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:15:49:59
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                  Imagebase:0x200000
                                                  File size:43'016 bytes
                                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000002.2409698695.0000000003027000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000002.2408845959.00000000007DA000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:15:49:59
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                  Imagebase:0x200000
                                                  File size:43'016 bytes
                                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000007.00000002.2655920781.0000000003557000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000007.00000002.2655450967.000000000309A000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:15:50:01
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",GetGameData
                                                  Imagebase:0xdf0000
                                                  File size:61'440 bytes
                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:15:50:02
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                  Imagebase:0x200000
                                                  File size:43'016 bytes
                                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2661808078.0000000003517000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2661356120.000000000321A000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:15:50:22
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1244
                                                  Imagebase:0xba0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:15:50:49
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1260
                                                  Imagebase:0xba0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:15:50:50
                                                  Start date:24/10/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 1268
                                                  Imagebase:0xba0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:19%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:2%
                                                    Total number of Nodes:1159
                                                    Total number of Limit Nodes:6
                                                    execution_graph 14654 750765 14655 75076e 14654->14655 14656 75077d 14655->14656 14657 750a38 14655->14657 14660 74fb00 InternetCrackUrlA 14656->14660 14664 750843 14656->14664 14658 750250 InternetCrackUrlA 14657->14658 14659 750a4e 14658->14659 14660->14664 14661 750a2d 14662 75096b 14662->14661 14663 750030 InternetCrackUrlA 14662->14663 14663->14661 14664->14662 14665 74fd60 InternetCrackUrlA 14664->14665 14665->14662 13432 741190 13437 7578e0 13432->13437 13434 74119e 13436 7411b7 13434->13436 13441 757850 13434->13441 13438 757916 GetComputerNameA 13437->13438 13440 757939 13438->13440 13440->13434 13442 757886 GetUserNameA 13441->13442 13444 7578c3 13442->13444 13444->13436 13445 7569f0 13463 742260 13445->13463 13449 756a00 13556 741160 GetSystemInfo 13449->13556 13455 756a21 13456 756a26 GetUserDefaultLCID 13455->13456 13457 757850 GetUserNameA 13456->13457 13458 756a30 13457->13458 13459 7578e0 GetComputerNameA 13458->13459 13461 756a43 13459->13461 13567 755b10 13461->13567 13462 756b16 13633 7445c0 13463->13633 13465 742274 13466 7445c0 2 API calls 13465->13466 13467 74228d 13466->13467 13468 7445c0 2 API calls 13467->13468 13469 7422a6 13468->13469 13470 7445c0 2 API calls 13469->13470 13471 7422bf 13470->13471 13472 7445c0 2 API calls 13471->13472 13473 7422d8 13472->13473 13474 7445c0 2 API calls 13473->13474 13475 7422f1 13474->13475 13476 7445c0 2 API calls 13475->13476 13477 74230a 13476->13477 13478 7445c0 2 API calls 13477->13478 13479 742323 13478->13479 13480 7445c0 2 API calls 13479->13480 13481 74233c 13480->13481 13482 7445c0 2 API calls 13481->13482 13483 742355 13482->13483 13484 7445c0 2 API calls 13483->13484 13485 74236e 13484->13485 13486 7445c0 2 API calls 13485->13486 13487 742387 13486->13487 13488 7445c0 2 API calls 13487->13488 13489 7423a0 13488->13489 13490 7445c0 2 API calls 13489->13490 13491 7423b9 13490->13491 13492 7445c0 2 API calls 13491->13492 13493 7423d2 13492->13493 13494 7445c0 2 API calls 13493->13494 13495 7423eb 13494->13495 13496 7445c0 2 API calls 13495->13496 13497 742404 13496->13497 13498 7445c0 2 API calls 13497->13498 13499 74241d 13498->13499 13500 7445c0 2 API calls 13499->13500 13501 742436 13500->13501 13502 7445c0 2 API calls 13501->13502 13503 74244f 13502->13503 13504 7445c0 2 API calls 13503->13504 13505 742468 13504->13505 13506 7445c0 2 API calls 13505->13506 13507 742481 13506->13507 13508 7445c0 2 API calls 13507->13508 13509 74249a 13508->13509 13510 7445c0 2 API calls 13509->13510 13511 7424b3 13510->13511 13512 7445c0 2 API calls 13511->13512 13513 7424cc 13512->13513 13514 7445c0 2 API calls 13513->13514 13515 7424e5 13514->13515 13516 7445c0 2 API calls 13515->13516 13517 7424fe 13516->13517 13518 7445c0 2 API calls 13517->13518 13519 742517 13518->13519 13520 7445c0 2 API calls 13519->13520 13521 742530 13520->13521 13522 7445c0 2 API calls 13521->13522 13523 742549 13522->13523 13524 7445c0 2 API calls 13523->13524 13525 742562 13524->13525 13526 7445c0 2 API calls 13525->13526 13527 74257b 13526->13527 13528 7445c0 2 API calls 13527->13528 13529 742594 13528->13529 13530 7445c0 2 API calls 13529->13530 13531 7425ad 13530->13531 13532 7445c0 2 API calls 13531->13532 13533 7425c6 13532->13533 13534 7445c0 2 API calls 13533->13534 13535 7425df 13534->13535 13536 7445c0 2 API calls 13535->13536 13537 7425f8 13536->13537 13538 7445c0 2 API calls 13537->13538 13539 742611 13538->13539 13540 7445c0 2 API calls 13539->13540 13541 74262a 13540->13541 13542 7445c0 2 API calls 13541->13542 13543 742643 13542->13543 13544 7445c0 2 API calls 13543->13544 13545 74265c 13544->13545 13546 7445c0 2 API calls 13545->13546 13547 742675 13546->13547 13548 7445c0 2 API calls 13547->13548 13549 74268e 13548->13549 13550 759860 13549->13550 13638 759750 GetPEB 13550->13638 13552 759a93 LoadLibraryA LoadLibraryA 13553 759ac3 LoadLibraryA 13552->13553 13554 759ae6 13553->13554 13554->13449 13555 759868 13555->13552 13557 74117c 13556->13557 13558 741110 13557->13558 13559 741131 VirtualAllocExNuma 13558->13559 13560 741141 13559->13560 13639 7410a0 VirtualAlloc 13560->13639 13562 74114e 13563 741220 13562->13563 13641 7589b0 13563->13641 13566 741249 __aulldiv 13566->13455 13568 755b1d 13567->13568 13643 7426a0 13568->13643 13572 755ca3 14280 755510 13572->14280 13574 755cc3 14285 757500 13574->14285 13576 755da7 14289 744880 13576->14289 13578 755dbe 14293 745960 13578->14293 13580 755e03 13581 745960 InternetCrackUrlA 13580->13581 13582 755e4c 13581->13582 13583 745960 InternetCrackUrlA 13582->13583 13584 755e93 13583->13584 14297 751a10 13584->14297 13586 755eba 14327 744fb0 13586->14327 13588 755edb 14332 750740 13588->14332 13590 755f60 13591 745960 InternetCrackUrlA 13590->13591 13592 755fa0 13591->13592 14344 741e80 13592->14344 13594 755ff0 13595 756092 13594->13595 13596 756000 13594->13596 13598 745960 InternetCrackUrlA 13595->13598 13597 745960 InternetCrackUrlA 13596->13597 13601 75603a 13597->13601 13599 7560bf 13598->13599 14354 753560 13599->14354 14350 753dc0 13601->14350 13602 75608a 13605 75610b 13602->13605 14358 7540b0 13602->14358 13607 756130 13605->13607 14376 754780 13605->14376 13610 756155 13607->13610 14380 754bb0 13607->14380 13608 7560ec 14372 755100 13608->14372 13611 75617a 13610->13611 14394 754d70 13610->14394 13615 75619f 13611->13615 14402 754f40 13611->14402 13613 756210 13622 7562b3 13613->13622 13623 756220 13613->13623 13618 7561c4 13615->13618 14408 747710 13615->14408 13619 7561e9 13618->13619 14412 755050 13618->14412 13619->13613 14416 759010 13619->14416 13624 745960 InternetCrackUrlA 13622->13624 13625 745960 InternetCrackUrlA 13623->13625 13626 7562e0 13624->13626 13628 75625b 13625->13628 13627 753560 InternetCrackUrlA 13626->13627 13630 7562ab 13627->13630 13629 753dc0 InternetCrackUrlA 13628->13629 13629->13630 13631 745960 InternetCrackUrlA 13630->13631 13632 75631c 13631->13632 13632->13462 13634 7445d2 RtlAllocateHeap 13633->13634 13636 744622 VirtualProtect 13634->13636 13636->13465 13638->13555 13640 7410c2 moneypunct 13639->13640 13640->13562 13642 741233 GlobalMemoryStatusEx 13641->13642 13642->13566 13644 7445c0 2 API calls 13643->13644 13645 7426b4 13644->13645 13646 7445c0 2 API calls 13645->13646 13647 7426d7 13646->13647 13648 7445c0 2 API calls 13647->13648 13649 7426f0 13648->13649 13650 7445c0 2 API calls 13649->13650 13651 742709 13650->13651 13652 7445c0 2 API calls 13651->13652 13653 742736 13652->13653 13654 7445c0 2 API calls 13653->13654 13655 74274f 13654->13655 13656 7445c0 2 API calls 13655->13656 13657 742768 13656->13657 13658 7445c0 2 API calls 13657->13658 13659 742795 13658->13659 13660 7445c0 2 API calls 13659->13660 13661 7427ae 13660->13661 13662 7445c0 2 API calls 13661->13662 13663 7427c7 13662->13663 13664 7445c0 2 API calls 13663->13664 13665 7427e0 13664->13665 13666 7445c0 2 API calls 13665->13666 13667 7427f9 13666->13667 13668 7445c0 2 API calls 13667->13668 13669 742812 13668->13669 13670 7445c0 2 API calls 13669->13670 13671 74282b 13670->13671 13672 7445c0 2 API calls 13671->13672 13673 742844 13672->13673 13674 7445c0 2 API calls 13673->13674 13675 74285d 13674->13675 13676 7445c0 2 API calls 13675->13676 13677 742876 13676->13677 13678 7445c0 2 API calls 13677->13678 13679 74288f 13678->13679 13680 7445c0 2 API calls 13679->13680 13681 7428a8 13680->13681 13682 7445c0 2 API calls 13681->13682 13683 7428c1 13682->13683 13684 7445c0 2 API calls 13683->13684 13685 7428da 13684->13685 13686 7445c0 2 API calls 13685->13686 13687 7428f3 13686->13687 13688 7445c0 2 API calls 13687->13688 13689 74290c 13688->13689 13690 7445c0 2 API calls 13689->13690 13691 742925 13690->13691 13692 7445c0 2 API calls 13691->13692 13693 74293e 13692->13693 13694 7445c0 2 API calls 13693->13694 13695 742957 13694->13695 13696 7445c0 2 API calls 13695->13696 13697 742970 13696->13697 13698 7445c0 2 API calls 13697->13698 13699 742989 13698->13699 13700 7445c0 2 API calls 13699->13700 13701 7429a2 13700->13701 13702 7445c0 2 API calls 13701->13702 13703 7429bb 13702->13703 13704 7445c0 2 API calls 13703->13704 13705 7429d4 13704->13705 13706 7445c0 2 API calls 13705->13706 13707 7429ed 13706->13707 13708 7445c0 2 API calls 13707->13708 13709 742a06 13708->13709 13710 7445c0 2 API calls 13709->13710 13711 742a1f 13710->13711 13712 7445c0 2 API calls 13711->13712 13713 742a38 13712->13713 13714 7445c0 2 API calls 13713->13714 13715 742a51 13714->13715 13716 7445c0 2 API calls 13715->13716 13717 742a6a 13716->13717 13718 7445c0 2 API calls 13717->13718 13719 742a83 13718->13719 13720 7445c0 2 API calls 13719->13720 13721 742a9c 13720->13721 13722 7445c0 2 API calls 13721->13722 13723 742ab5 13722->13723 13724 7445c0 2 API calls 13723->13724 13725 742ace 13724->13725 13726 7445c0 2 API calls 13725->13726 13727 742ae7 13726->13727 13728 7445c0 2 API calls 13727->13728 13729 742b00 13728->13729 13730 7445c0 2 API calls 13729->13730 13731 742b19 13730->13731 13732 7445c0 2 API calls 13731->13732 13733 742b32 13732->13733 13734 7445c0 2 API calls 13733->13734 13735 742b4b 13734->13735 13736 7445c0 2 API calls 13735->13736 13737 742b64 13736->13737 13738 7445c0 2 API calls 13737->13738 13739 742b7d 13738->13739 13740 7445c0 2 API calls 13739->13740 13741 742b96 13740->13741 13742 7445c0 2 API calls 13741->13742 13743 742baf 13742->13743 13744 7445c0 2 API calls 13743->13744 13745 742bc8 13744->13745 13746 7445c0 2 API calls 13745->13746 13747 742be1 13746->13747 13748 7445c0 2 API calls 13747->13748 13749 742bfa 13748->13749 13750 7445c0 2 API calls 13749->13750 13751 742c13 13750->13751 13752 7445c0 2 API calls 13751->13752 13753 742c2c 13752->13753 13754 7445c0 2 API calls 13753->13754 13755 742c45 13754->13755 13756 7445c0 2 API calls 13755->13756 13757 742c5e 13756->13757 13758 7445c0 2 API calls 13757->13758 13759 742c77 13758->13759 13760 7445c0 2 API calls 13759->13760 13761 742c90 13760->13761 13762 7445c0 2 API calls 13761->13762 13763 742ca9 13762->13763 13764 7445c0 2 API calls 13763->13764 13765 742cc2 13764->13765 13766 7445c0 2 API calls 13765->13766 13767 742cdb 13766->13767 13768 7445c0 2 API calls 13767->13768 13769 742cf4 13768->13769 13770 7445c0 2 API calls 13769->13770 13771 742d0d 13770->13771 13772 7445c0 2 API calls 13771->13772 13773 742d26 13772->13773 13774 7445c0 2 API calls 13773->13774 13775 742d3f 13774->13775 13776 7445c0 2 API calls 13775->13776 13777 742d58 13776->13777 13778 7445c0 2 API calls 13777->13778 13779 742d71 13778->13779 13780 7445c0 2 API calls 13779->13780 13781 742d8a 13780->13781 13782 7445c0 2 API calls 13781->13782 13783 742da3 13782->13783 13784 7445c0 2 API calls 13783->13784 13785 742dbc 13784->13785 13786 7445c0 2 API calls 13785->13786 13787 742dd5 13786->13787 13788 7445c0 2 API calls 13787->13788 13789 742dee 13788->13789 13790 7445c0 2 API calls 13789->13790 13791 742e07 13790->13791 13792 7445c0 2 API calls 13791->13792 13793 742e20 13792->13793 13794 7445c0 2 API calls 13793->13794 13795 742e39 13794->13795 13796 7445c0 2 API calls 13795->13796 13797 742e52 13796->13797 13798 7445c0 2 API calls 13797->13798 13799 742e6b 13798->13799 13800 7445c0 2 API calls 13799->13800 13801 742e84 13800->13801 13802 7445c0 2 API calls 13801->13802 13803 742e9d 13802->13803 13804 7445c0 2 API calls 13803->13804 13805 742eb6 13804->13805 13806 7445c0 2 API calls 13805->13806 13807 742ecf 13806->13807 13808 7445c0 2 API calls 13807->13808 13809 742ee8 13808->13809 13810 7445c0 2 API calls 13809->13810 13811 742f01 13810->13811 13812 7445c0 2 API calls 13811->13812 13813 742f1a 13812->13813 13814 7445c0 2 API calls 13813->13814 13815 742f33 13814->13815 13816 7445c0 2 API calls 13815->13816 13817 742f4c 13816->13817 13818 7445c0 2 API calls 13817->13818 13819 742f65 13818->13819 13820 7445c0 2 API calls 13819->13820 13821 742f7e 13820->13821 13822 7445c0 2 API calls 13821->13822 13823 742f97 13822->13823 13824 7445c0 2 API calls 13823->13824 13825 742fb0 13824->13825 13826 7445c0 2 API calls 13825->13826 13827 742fc9 13826->13827 13828 7445c0 2 API calls 13827->13828 13829 742fe2 13828->13829 13830 7445c0 2 API calls 13829->13830 13831 742ffb 13830->13831 13832 7445c0 2 API calls 13831->13832 13833 743014 13832->13833 13834 7445c0 2 API calls 13833->13834 13835 74302d 13834->13835 13836 7445c0 2 API calls 13835->13836 13837 743046 13836->13837 13838 7445c0 2 API calls 13837->13838 13839 74305f 13838->13839 13840 7445c0 2 API calls 13839->13840 13841 743078 13840->13841 13842 7445c0 2 API calls 13841->13842 13843 743091 13842->13843 13844 7445c0 2 API calls 13843->13844 13845 7430aa 13844->13845 13846 7445c0 2 API calls 13845->13846 13847 7430c3 13846->13847 13848 7445c0 2 API calls 13847->13848 13849 7430dc 13848->13849 13850 7445c0 2 API calls 13849->13850 13851 7430f5 13850->13851 13852 7445c0 2 API calls 13851->13852 13853 74310e 13852->13853 13854 7445c0 2 API calls 13853->13854 13855 743127 13854->13855 13856 7445c0 2 API calls 13855->13856 13857 743140 13856->13857 13858 7445c0 2 API calls 13857->13858 13859 743159 13858->13859 13860 7445c0 2 API calls 13859->13860 13861 743172 13860->13861 13862 7445c0 2 API calls 13861->13862 13863 74318b 13862->13863 13864 7445c0 2 API calls 13863->13864 13865 7431a4 13864->13865 13866 7445c0 2 API calls 13865->13866 13867 7431bd 13866->13867 13868 7445c0 2 API calls 13867->13868 13869 7431d6 13868->13869 13870 7445c0 2 API calls 13869->13870 13871 7431ef 13870->13871 13872 7445c0 2 API calls 13871->13872 13873 743208 13872->13873 13874 7445c0 2 API calls 13873->13874 13875 743221 13874->13875 13876 7445c0 2 API calls 13875->13876 13877 74323a 13876->13877 13878 7445c0 2 API calls 13877->13878 13879 743253 13878->13879 13880 7445c0 2 API calls 13879->13880 13881 74326c 13880->13881 13882 7445c0 2 API calls 13881->13882 13883 743285 13882->13883 13884 7445c0 2 API calls 13883->13884 13885 74329e 13884->13885 13886 7445c0 2 API calls 13885->13886 13887 7432b7 13886->13887 13888 7445c0 2 API calls 13887->13888 13889 7432d0 13888->13889 13890 7445c0 2 API calls 13889->13890 13891 7432e9 13890->13891 13892 7445c0 2 API calls 13891->13892 13893 743302 13892->13893 13894 7445c0 2 API calls 13893->13894 13895 74331b 13894->13895 13896 7445c0 2 API calls 13895->13896 13897 743334 13896->13897 13898 7445c0 2 API calls 13897->13898 13899 74334d 13898->13899 13900 7445c0 2 API calls 13899->13900 13901 743366 13900->13901 13902 7445c0 2 API calls 13901->13902 13903 74337f 13902->13903 13904 7445c0 2 API calls 13903->13904 13905 743398 13904->13905 13906 7445c0 2 API calls 13905->13906 13907 7433b1 13906->13907 13908 7445c0 2 API calls 13907->13908 13909 7433ca 13908->13909 13910 7445c0 2 API calls 13909->13910 13911 7433e3 13910->13911 13912 7445c0 2 API calls 13911->13912 13913 7433fc 13912->13913 13914 7445c0 2 API calls 13913->13914 13915 743415 13914->13915 13916 7445c0 2 API calls 13915->13916 13917 74342e 13916->13917 13918 7445c0 2 API calls 13917->13918 13919 743447 13918->13919 13920 7445c0 2 API calls 13919->13920 13921 743460 13920->13921 13922 7445c0 2 API calls 13921->13922 13923 743479 13922->13923 13924 7445c0 2 API calls 13923->13924 13925 743492 13924->13925 13926 7445c0 2 API calls 13925->13926 13927 7434ab 13926->13927 13928 7445c0 2 API calls 13927->13928 13929 7434c4 13928->13929 13930 7445c0 2 API calls 13929->13930 13931 7434dd 13930->13931 13932 7445c0 2 API calls 13931->13932 13933 7434f6 13932->13933 13934 7445c0 2 API calls 13933->13934 13935 74350f 13934->13935 13936 7445c0 2 API calls 13935->13936 13937 743528 13936->13937 13938 7445c0 2 API calls 13937->13938 13939 743541 13938->13939 13940 7445c0 2 API calls 13939->13940 13941 74355a 13940->13941 13942 7445c0 2 API calls 13941->13942 13943 743573 13942->13943 13944 7445c0 2 API calls 13943->13944 13945 74358c 13944->13945 13946 7445c0 2 API calls 13945->13946 13947 7435a5 13946->13947 13948 7445c0 2 API calls 13947->13948 13949 7435be 13948->13949 13950 7445c0 2 API calls 13949->13950 13951 7435d7 13950->13951 13952 7445c0 2 API calls 13951->13952 13953 7435f0 13952->13953 13954 7445c0 2 API calls 13953->13954 13955 743609 13954->13955 13956 7445c0 2 API calls 13955->13956 13957 743622 13956->13957 13958 7445c0 2 API calls 13957->13958 13959 74363b 13958->13959 13960 7445c0 2 API calls 13959->13960 13961 743654 13960->13961 13962 7445c0 2 API calls 13961->13962 13963 74366d 13962->13963 13964 7445c0 2 API calls 13963->13964 13965 743686 13964->13965 13966 7445c0 2 API calls 13965->13966 13967 74369f 13966->13967 13968 7445c0 2 API calls 13967->13968 13969 7436b8 13968->13969 13970 7445c0 2 API calls 13969->13970 13971 7436d1 13970->13971 13972 7445c0 2 API calls 13971->13972 13973 7436ea 13972->13973 13974 7445c0 2 API calls 13973->13974 13975 743703 13974->13975 13976 7445c0 2 API calls 13975->13976 13977 74371c 13976->13977 13978 7445c0 2 API calls 13977->13978 13979 743735 13978->13979 13980 7445c0 2 API calls 13979->13980 13981 74374e 13980->13981 13982 7445c0 2 API calls 13981->13982 13983 743767 13982->13983 13984 7445c0 2 API calls 13983->13984 13985 743780 13984->13985 13986 7445c0 2 API calls 13985->13986 13987 743799 13986->13987 13988 7445c0 2 API calls 13987->13988 13989 7437b2 13988->13989 13990 7445c0 2 API calls 13989->13990 13991 7437cb 13990->13991 13992 7445c0 2 API calls 13991->13992 13993 7437e4 13992->13993 13994 7445c0 2 API calls 13993->13994 13995 7437fd 13994->13995 13996 7445c0 2 API calls 13995->13996 13997 743816 13996->13997 13998 7445c0 2 API calls 13997->13998 13999 74382f 13998->13999 14000 7445c0 2 API calls 13999->14000 14001 743848 14000->14001 14002 7445c0 2 API calls 14001->14002 14003 743861 14002->14003 14004 7445c0 2 API calls 14003->14004 14005 74387a 14004->14005 14006 7445c0 2 API calls 14005->14006 14007 743893 14006->14007 14008 7445c0 2 API calls 14007->14008 14009 7438ac 14008->14009 14010 7445c0 2 API calls 14009->14010 14011 7438c5 14010->14011 14012 7445c0 2 API calls 14011->14012 14013 7438de 14012->14013 14014 7445c0 2 API calls 14013->14014 14015 7438f7 14014->14015 14016 7445c0 2 API calls 14015->14016 14017 743910 14016->14017 14018 7445c0 2 API calls 14017->14018 14019 743929 14018->14019 14020 7445c0 2 API calls 14019->14020 14021 743942 14020->14021 14022 7445c0 2 API calls 14021->14022 14023 74395b 14022->14023 14024 7445c0 2 API calls 14023->14024 14025 743974 14024->14025 14026 7445c0 2 API calls 14025->14026 14027 74398d 14026->14027 14028 7445c0 2 API calls 14027->14028 14029 7439a6 14028->14029 14030 7445c0 2 API calls 14029->14030 14031 7439bf 14030->14031 14032 7445c0 2 API calls 14031->14032 14033 7439d8 14032->14033 14034 7445c0 2 API calls 14033->14034 14035 7439f1 14034->14035 14036 7445c0 2 API calls 14035->14036 14037 743a0a 14036->14037 14038 7445c0 2 API calls 14037->14038 14039 743a23 14038->14039 14040 7445c0 2 API calls 14039->14040 14041 743a3c 14040->14041 14042 7445c0 2 API calls 14041->14042 14043 743a55 14042->14043 14044 7445c0 2 API calls 14043->14044 14045 743a6e 14044->14045 14046 7445c0 2 API calls 14045->14046 14047 743a87 14046->14047 14048 7445c0 2 API calls 14047->14048 14049 743aa0 14048->14049 14050 7445c0 2 API calls 14049->14050 14051 743ab9 14050->14051 14052 7445c0 2 API calls 14051->14052 14053 743ad2 14052->14053 14054 7445c0 2 API calls 14053->14054 14055 743aeb 14054->14055 14056 7445c0 2 API calls 14055->14056 14057 743b04 14056->14057 14058 7445c0 2 API calls 14057->14058 14059 743b1d 14058->14059 14060 7445c0 2 API calls 14059->14060 14061 743b36 14060->14061 14062 7445c0 2 API calls 14061->14062 14063 743b4f 14062->14063 14064 7445c0 2 API calls 14063->14064 14065 743b68 14064->14065 14066 7445c0 2 API calls 14065->14066 14067 743b81 14066->14067 14068 7445c0 2 API calls 14067->14068 14069 743b9a 14068->14069 14070 7445c0 2 API calls 14069->14070 14071 743bb3 14070->14071 14072 7445c0 2 API calls 14071->14072 14073 743bcc 14072->14073 14074 7445c0 2 API calls 14073->14074 14075 743be5 14074->14075 14076 7445c0 2 API calls 14075->14076 14077 743bfe 14076->14077 14078 7445c0 2 API calls 14077->14078 14079 743c17 14078->14079 14080 7445c0 2 API calls 14079->14080 14081 743c30 14080->14081 14082 7445c0 2 API calls 14081->14082 14083 743c49 14082->14083 14084 7445c0 2 API calls 14083->14084 14085 743c62 14084->14085 14086 7445c0 2 API calls 14085->14086 14087 743c7b 14086->14087 14088 7445c0 2 API calls 14087->14088 14089 743c94 14088->14089 14090 7445c0 2 API calls 14089->14090 14091 743cad 14090->14091 14092 7445c0 2 API calls 14091->14092 14093 743cc6 14092->14093 14094 7445c0 2 API calls 14093->14094 14095 743cdf 14094->14095 14096 7445c0 2 API calls 14095->14096 14097 743cf8 14096->14097 14098 7445c0 2 API calls 14097->14098 14099 743d11 14098->14099 14100 7445c0 2 API calls 14099->14100 14101 743d2a 14100->14101 14102 7445c0 2 API calls 14101->14102 14103 743d43 14102->14103 14104 7445c0 2 API calls 14103->14104 14105 743d5c 14104->14105 14106 7445c0 2 API calls 14105->14106 14107 743d75 14106->14107 14108 7445c0 2 API calls 14107->14108 14109 743d8e 14108->14109 14110 7445c0 2 API calls 14109->14110 14111 743da7 14110->14111 14112 7445c0 2 API calls 14111->14112 14113 743dc0 14112->14113 14114 7445c0 2 API calls 14113->14114 14115 743dd9 14114->14115 14116 7445c0 2 API calls 14115->14116 14117 743df2 14116->14117 14118 7445c0 2 API calls 14117->14118 14119 743e0b 14118->14119 14120 7445c0 2 API calls 14119->14120 14121 743e24 14120->14121 14122 7445c0 2 API calls 14121->14122 14123 743e3d 14122->14123 14124 7445c0 2 API calls 14123->14124 14125 743e56 14124->14125 14126 7445c0 2 API calls 14125->14126 14127 743e6f 14126->14127 14128 7445c0 2 API calls 14127->14128 14129 743e88 14128->14129 14130 7445c0 2 API calls 14129->14130 14131 743ea1 14130->14131 14132 7445c0 2 API calls 14131->14132 14133 743eba 14132->14133 14134 7445c0 2 API calls 14133->14134 14135 743ed3 14134->14135 14136 7445c0 2 API calls 14135->14136 14137 743eec 14136->14137 14138 7445c0 2 API calls 14137->14138 14139 743f05 14138->14139 14140 7445c0 2 API calls 14139->14140 14141 743f1e 14140->14141 14142 7445c0 2 API calls 14141->14142 14143 743f37 14142->14143 14144 7445c0 2 API calls 14143->14144 14145 743f50 14144->14145 14146 7445c0 2 API calls 14145->14146 14147 743f69 14146->14147 14148 7445c0 2 API calls 14147->14148 14149 743f82 14148->14149 14150 7445c0 2 API calls 14149->14150 14151 743f9b 14150->14151 14152 7445c0 2 API calls 14151->14152 14153 743fb4 14152->14153 14154 7445c0 2 API calls 14153->14154 14155 743fcd 14154->14155 14156 7445c0 2 API calls 14155->14156 14157 743fe6 14156->14157 14158 7445c0 2 API calls 14157->14158 14159 743fff 14158->14159 14160 7445c0 2 API calls 14159->14160 14161 744018 14160->14161 14162 7445c0 2 API calls 14161->14162 14163 744031 14162->14163 14164 7445c0 2 API calls 14163->14164 14165 74404a 14164->14165 14166 7445c0 2 API calls 14165->14166 14167 744063 14166->14167 14168 7445c0 2 API calls 14167->14168 14169 74407c 14168->14169 14170 7445c0 2 API calls 14169->14170 14171 744095 14170->14171 14172 7445c0 2 API calls 14171->14172 14173 7440ae 14172->14173 14174 7445c0 2 API calls 14173->14174 14175 7440c7 14174->14175 14176 7445c0 2 API calls 14175->14176 14177 7440e0 14176->14177 14178 7445c0 2 API calls 14177->14178 14179 7440f9 14178->14179 14180 7445c0 2 API calls 14179->14180 14181 744112 14180->14181 14182 7445c0 2 API calls 14181->14182 14183 74412b 14182->14183 14184 7445c0 2 API calls 14183->14184 14185 744144 14184->14185 14186 7445c0 2 API calls 14185->14186 14187 74415d 14186->14187 14188 7445c0 2 API calls 14187->14188 14189 744176 14188->14189 14190 7445c0 2 API calls 14189->14190 14191 74418f 14190->14191 14192 7445c0 2 API calls 14191->14192 14193 7441a8 14192->14193 14194 7445c0 2 API calls 14193->14194 14195 7441c1 14194->14195 14196 7445c0 2 API calls 14195->14196 14197 7441da 14196->14197 14198 7445c0 2 API calls 14197->14198 14199 7441f3 14198->14199 14200 7445c0 2 API calls 14199->14200 14201 74420c 14200->14201 14202 7445c0 2 API calls 14201->14202 14203 744225 14202->14203 14204 7445c0 2 API calls 14203->14204 14205 74423e 14204->14205 14206 7445c0 2 API calls 14205->14206 14207 744257 14206->14207 14208 7445c0 2 API calls 14207->14208 14209 744270 14208->14209 14210 7445c0 2 API calls 14209->14210 14211 744289 14210->14211 14212 7445c0 2 API calls 14211->14212 14213 7442a2 14212->14213 14214 7445c0 2 API calls 14213->14214 14215 7442bb 14214->14215 14216 7445c0 2 API calls 14215->14216 14217 7442d4 14216->14217 14218 7445c0 2 API calls 14217->14218 14219 7442ed 14218->14219 14220 7445c0 2 API calls 14219->14220 14221 744306 14220->14221 14222 7445c0 2 API calls 14221->14222 14223 74431f 14222->14223 14224 7445c0 2 API calls 14223->14224 14225 744338 14224->14225 14226 7445c0 2 API calls 14225->14226 14227 744351 14226->14227 14228 7445c0 2 API calls 14227->14228 14229 74436a 14228->14229 14230 7445c0 2 API calls 14229->14230 14231 744383 14230->14231 14232 7445c0 2 API calls 14231->14232 14233 74439c 14232->14233 14234 7445c0 2 API calls 14233->14234 14235 7443b5 14234->14235 14236 7445c0 2 API calls 14235->14236 14237 7443ce 14236->14237 14238 7445c0 2 API calls 14237->14238 14239 7443e7 14238->14239 14240 7445c0 2 API calls 14239->14240 14241 744400 14240->14241 14242 7445c0 2 API calls 14241->14242 14243 744419 14242->14243 14244 7445c0 2 API calls 14243->14244 14245 744432 14244->14245 14246 7445c0 2 API calls 14245->14246 14247 74444b 14246->14247 14248 7445c0 2 API calls 14247->14248 14249 744464 14248->14249 14250 7445c0 2 API calls 14249->14250 14251 74447d 14250->14251 14252 7445c0 2 API calls 14251->14252 14253 744496 14252->14253 14254 7445c0 2 API calls 14253->14254 14255 7444af 14254->14255 14256 7445c0 2 API calls 14255->14256 14257 7444c8 14256->14257 14258 7445c0 2 API calls 14257->14258 14259 7444e1 14258->14259 14260 7445c0 2 API calls 14259->14260 14261 7444fa 14260->14261 14262 7445c0 2 API calls 14261->14262 14263 744513 14262->14263 14264 7445c0 2 API calls 14263->14264 14265 74452c 14264->14265 14266 7445c0 2 API calls 14265->14266 14267 744545 14266->14267 14268 7445c0 2 API calls 14267->14268 14269 74455e 14268->14269 14270 7445c0 2 API calls 14269->14270 14271 744577 14270->14271 14272 7445c0 2 API calls 14271->14272 14273 744590 14272->14273 14274 7445c0 2 API calls 14273->14274 14275 7445a9 14274->14275 14276 759c10 14275->14276 14277 75a036 8 API calls 14276->14277 14279 759c20 14276->14279 14278 75a0cc 14277->14278 14278->13572 14279->14277 14282 755521 14280->14282 14281 7552c0 InternetCrackUrlA InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA 14281->14282 14282->14281 14283 7551f0 InternetCrackUrlA InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA 14282->14283 14284 7557dc 14282->14284 14283->14282 14284->13574 14286 757548 GetVolumeInformationA 14285->14286 14288 757591 14286->14288 14288->13576 14290 744899 14289->14290 14420 7447b0 14290->14420 14292 7448a5 moneypunct 14292->13578 14294 745979 14293->14294 14295 7447b0 InternetCrackUrlA 14294->14295 14296 745985 moneypunct 14295->14296 14296->13580 14298 751a26 14297->14298 14299 757500 GetVolumeInformationA 14298->14299 14300 751b96 14299->14300 14424 757690 14300->14424 14302 751c1e 14303 757850 GetUserNameA 14302->14303 14304 751d14 14303->14304 14305 7578e0 GetComputerNameA 14304->14305 14306 751d8e 14305->14306 14431 757a30 14306->14431 14308 751e84 14435 757b90 14308->14435 14310 751f80 14439 759470 14310->14439 14312 752091 14443 757e00 14312->14443 14314 752119 14448 757ed0 GetSystemInfo 14314->14448 14316 75220f 14450 758100 14316->14450 14318 752289 14454 758320 14318->14454 14320 7524d3 14321 758320 6 API calls 14320->14321 14322 752568 14321->14322 14467 758680 14322->14467 14324 752620 14474 755190 14324->14474 14326 752699 14326->13586 14328 744fd0 RtlAllocateHeap 14327->14328 14329 744ff0 14328->14329 14330 7450a0 14329->14330 14331 745070 KiUserExceptionDispatcher 14329->14331 14330->13588 14331->14329 14333 750759 14332->14333 14334 750a38 14333->14334 14337 75077d 14333->14337 14512 750250 14334->14512 14336 750a4e 14336->13590 14342 750843 14337->14342 14492 74fb00 14337->14492 14339 750a2d 14339->13590 14340 75096b 14340->14339 14504 750030 14340->14504 14342->14340 14498 74fd60 14342->14498 14349 741e8f 14344->14349 14345 741f37 14619 741310 14345->14619 14347 741f4d 14347->13594 14349->14345 14615 7416d0 14349->14615 14352 753dcf 14350->14352 14351 753e18 14351->13602 14352->14351 14623 753c90 14352->14623 14355 753587 14354->14355 14356 7536eb 14355->14356 14632 752e30 14355->14632 14356->13602 14359 7540da moneypunct 14358->14359 14641 753ea0 14359->14641 14361 754185 14362 753ea0 InternetCrackUrlA 14361->14362 14363 7541af 14362->14363 14364 753ea0 InternetCrackUrlA 14363->14364 14365 7541d9 14364->14365 14366 753ea0 InternetCrackUrlA 14365->14366 14367 754203 14366->14367 14368 753ea0 InternetCrackUrlA 14367->14368 14369 75422d 14368->14369 14370 753ea0 InternetCrackUrlA 14369->14370 14371 754257 moneypunct 14370->14371 14371->13608 14373 755113 14372->14373 14374 755190 InternetCrackUrlA 14373->14374 14375 755163 14374->14375 14375->13605 14377 75479a moneypunct 14376->14377 14379 7548af moneypunct 14377->14379 14645 754570 14377->14645 14379->13607 14381 754bca moneypunct 14380->14381 14649 754910 14381->14649 14383 754c3d 14384 754910 InternetCrackUrlA 14383->14384 14385 754c72 14384->14385 14386 754910 InternetCrackUrlA 14385->14386 14387 754ca8 14386->14387 14388 754910 InternetCrackUrlA 14387->14388 14389 754cdd 14388->14389 14390 754910 InternetCrackUrlA 14389->14390 14391 754d13 14390->14391 14392 754910 InternetCrackUrlA 14391->14392 14393 754d48 moneypunct 14392->14393 14393->13610 14395 754d8d 14394->14395 14396 754910 InternetCrackUrlA 14395->14396 14397 754dff 14396->14397 14398 754910 InternetCrackUrlA 14397->14398 14399 754e8b 14398->14399 14400 754910 InternetCrackUrlA 14399->14400 14401 754f17 14400->14401 14401->13611 14403 754f5a moneypunct 14402->14403 14404 754910 InternetCrackUrlA 14403->14404 14405 754ff3 14404->14405 14406 754910 InternetCrackUrlA 14405->14406 14407 755028 moneypunct 14406->14407 14407->13615 14409 74771d moneypunct 14408->14409 14410 755190 InternetCrackUrlA 14409->14410 14411 747e77 moneypunct 14409->14411 14410->14411 14411->13618 14413 75506a moneypunct 14412->14413 14414 754910 InternetCrackUrlA 14413->14414 14415 7550dd moneypunct 14414->14415 14415->13619 14418 759027 moneypunct 14416->14418 14417 75904d 14417->13613 14418->14417 14419 755190 InternetCrackUrlA 14418->14419 14419->14417 14421 7447c6 14420->14421 14422 744848 InternetCrackUrlA 14421->14422 14423 744867 14422->14423 14423->14292 14425 7576aa 14424->14425 14478 7577a0 14425->14478 14428 7576c6 RegOpenKeyExA 14429 7576bd 14428->14429 14430 7576e7 RegQueryValueExA 14428->14430 14429->14302 14430->14429 14432 757a69 GetTimeZoneInformation 14431->14432 14434 757a92 14432->14434 14434->14308 14438 757bcc 14435->14438 14436 757c46 GetLocaleInfoA 14436->14438 14437 757d18 14437->14310 14438->14436 14438->14437 14440 75948a 14439->14440 14441 7594b5 14440->14441 14442 759493 K32GetModuleFileNameExA 14440->14442 14441->14312 14442->14441 14444 757e3d RegOpenKeyExA 14443->14444 14446 757e68 RegQueryValueExA 14444->14446 14447 757e87 14444->14447 14446->14447 14447->14314 14449 757f1c 14448->14449 14449->14316 14451 758136 14450->14451 14452 75814d GlobalMemoryStatusEx 14451->14452 14453 758163 __aulldiv 14452->14453 14453->14318 14486 75a740 14454->14486 14456 75835c RegOpenKeyExA 14457 7583d0 14456->14457 14463 7583ae 14456->14463 14458 7583f8 RegEnumKeyExA 14457->14458 14457->14463 14459 75843f RegOpenKeyExA 14458->14459 14458->14463 14461 7584c1 RegQueryValueExA 14459->14461 14459->14463 14462 758601 RegCloseKey 14461->14462 14464 7584fa 14461->14464 14462->14463 14463->14320 14464->14462 14465 75856e RegQueryValueExA 14464->14465 14465->14462 14466 7585a3 14465->14466 14466->14462 14468 75a740 14467->14468 14469 7586bc CreateToolhelp32Snapshot Process32First 14468->14469 14470 75875d CloseHandle 14469->14470 14471 7586e8 Process32Next 14469->14471 14472 758776 14470->14472 14471->14470 14473 7586fd 14471->14473 14472->14324 14473->14471 14475 7551b5 14474->14475 14488 745100 14475->14488 14477 7551cf 14477->14326 14481 757720 14478->14481 14480 7576b9 14480->14428 14480->14429 14482 75773a RegOpenKeyExA 14481->14482 14484 757765 RegQueryValueExA 14482->14484 14485 757780 14482->14485 14484->14485 14485->14480 14487 75a750 14486->14487 14487->14456 14489 745119 14488->14489 14490 7447b0 InternetCrackUrlA 14489->14490 14491 745125 moneypunct 14490->14491 14491->14477 14493 74fb16 14492->14493 14516 74be70 14493->14516 14495 74fc9a 14527 74ec30 14495->14527 14497 74fd0c 14497->14342 14499 74fd76 14498->14499 14500 74be70 InternetCrackUrlA 14499->14500 14501 74ff61 14500->14501 14502 74ec30 InternetCrackUrlA 14501->14502 14503 74ffd3 14502->14503 14503->14340 14505 750046 14504->14505 14507 75021e 14505->14507 14555 7526c0 14505->14555 14507->14339 14508 750138 14508->14507 14569 74da80 14508->14569 14510 75019f 14577 74f6b0 14510->14577 14514 750266 14512->14514 14513 755190 InternetCrackUrlA 14515 7506c4 14513->14515 14514->14513 14514->14515 14515->14336 14518 74be86 14516->14518 14517 74bf04 14517->14495 14518->14517 14520 74a790 InternetCrackUrlA 14518->14520 14521 74be70 InternetCrackUrlA 14518->14521 14523 755190 InternetCrackUrlA 14518->14523 14531 74a260 14518->14531 14535 74aef0 14518->14535 14539 74b4f0 14518->14539 14543 74ba80 14518->14543 14547 74b230 14518->14547 14520->14518 14521->14518 14523->14518 14528 74ec3f 14527->14528 14529 74ecf9 14528->14529 14551 74e430 14528->14551 14529->14497 14534 74a276 14531->14534 14532 755190 InternetCrackUrlA 14533 74a6f7 14532->14533 14533->14518 14534->14532 14534->14533 14538 74af06 14535->14538 14536 755190 InternetCrackUrlA 14537 74b1b9 14536->14537 14537->14518 14538->14536 14538->14537 14542 74b506 14539->14542 14540 755190 InternetCrackUrlA 14541 74ba11 14540->14541 14541->14518 14542->14540 14542->14541 14544 74ba96 14543->14544 14545 755190 InternetCrackUrlA 14544->14545 14546 74bdf4 14544->14546 14545->14546 14546->14518 14548 74b246 14547->14548 14549 755190 InternetCrackUrlA 14548->14549 14550 74b47d 14548->14550 14549->14550 14550->14518 14553 74e44d 14551->14553 14552 74e4b1 14552->14528 14553->14552 14554 74de10 InternetCrackUrlA 14553->14554 14554->14553 14556 7526d6 14555->14556 14568 752c1b 14555->14568 14582 7460a0 14556->14582 14558 752b61 14559 7460a0 InternetCrackUrlA 14558->14559 14560 752b88 14559->14560 14561 7460a0 InternetCrackUrlA 14560->14561 14562 752bac 14561->14562 14563 7460a0 InternetCrackUrlA 14562->14563 14564 752bd3 14563->14564 14565 7460a0 InternetCrackUrlA 14564->14565 14566 752bf7 14565->14566 14567 7460a0 InternetCrackUrlA 14566->14567 14567->14568 14568->14508 14573 74da96 14569->14573 14570 74dafa 14570->14510 14573->14570 14576 74da80 InternetCrackUrlA 14573->14576 14586 74cef0 14573->14586 14590 74d400 14573->14590 14594 74c990 14573->14594 14598 74d780 14573->14598 14576->14573 14580 74f6c6 14577->14580 14578 74f72d 14578->14507 14579 74f6b0 InternetCrackUrlA 14579->14580 14580->14578 14580->14579 14602 74f4a0 14580->14602 14583 7460b9 14582->14583 14584 7447b0 InternetCrackUrlA 14583->14584 14585 7460c5 moneypunct 14584->14585 14585->14558 14587 74cf06 14586->14587 14588 74d36f 14587->14588 14589 755190 InternetCrackUrlA 14587->14589 14588->14573 14589->14588 14593 74d416 14590->14593 14591 74d6e7 14591->14573 14592 755190 InternetCrackUrlA 14592->14591 14593->14591 14593->14592 14597 74c9a4 14594->14597 14595 755190 InternetCrackUrlA 14596 74ce7f 14595->14596 14596->14573 14597->14595 14597->14596 14599 74d796 14598->14599 14600 74d9ee 14599->14600 14601 755190 InternetCrackUrlA 14599->14601 14600->14573 14601->14600 14604 74f4bf 14602->14604 14603 74f653 14603->14580 14604->14603 14606 74f300 14604->14606 14607 74f313 14606->14607 14609 74f43c 14607->14609 14610 74ed20 14607->14610 14609->14603 14612 74ed31 14610->14612 14611 74ed6a 14611->14609 14612->14611 14613 755190 InternetCrackUrlA 14612->14613 14614 74ed20 InternetCrackUrlA 14612->14614 14613->14612 14614->14612 14617 7416e6 moneypunct 14615->14617 14616 741932 14616->14349 14617->14616 14618 755190 InternetCrackUrlA 14617->14618 14618->14617 14620 74132d 14619->14620 14621 755190 InternetCrackUrlA 14620->14621 14622 7414d2 14620->14622 14621->14622 14622->14347 14624 753caa 14623->14624 14626 753d32 moneypunct 14624->14626 14627 7538b0 14624->14627 14626->14352 14630 7538d2 moneypunct __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14627->14630 14628 753909 14628->14624 14629 7538b0 InternetCrackUrlA 14629->14630 14630->14628 14630->14629 14631 755190 InternetCrackUrlA 14630->14631 14631->14630 14633 752e46 14632->14633 14634 753398 14633->14634 14636 753047 14633->14636 14637 7531e5 14633->14637 14640 75315a 14633->14640 14635 7460a0 InternetCrackUrlA 14634->14635 14635->14640 14638 7460a0 InternetCrackUrlA 14636->14638 14639 7460a0 InternetCrackUrlA 14637->14639 14638->14640 14639->14640 14640->14355 14643 753ec9 moneypunct 14641->14643 14642 753eef moneypunct 14642->14361 14643->14642 14644 755190 InternetCrackUrlA 14643->14644 14644->14643 14647 754586 moneypunct 14645->14647 14646 7545d2 moneypunct 14646->14379 14647->14646 14648 755190 InternetCrackUrlA 14647->14648 14648->14646 14652 754932 moneypunct 14649->14652 14650 754958 14650->14383 14651 754910 InternetCrackUrlA 14651->14652 14652->14650 14652->14651 14653 755190 InternetCrackUrlA 14652->14653 14653->14652 14666 756af3 14668 756ab1 14666->14668 14667 755b10 41 API calls 14669 756b16 14667->14669 14668->14667 14670 7583dc 14671 7583eb 14670->14671 14672 7583f8 RegEnumKeyExA 14671->14672 14677 758485 14671->14677 14673 75843f RegOpenKeyExA 14672->14673 14672->14677 14675 7584c1 RegQueryValueExA 14673->14675 14673->14677 14676 758601 RegCloseKey 14675->14676 14678 7584fa 14675->14678 14676->14677 14678->14676 14679 75856e RegQueryValueExA 14678->14679 14679->14676 14680 7585a3 14679->14680 14680->14676 14681 753bdb 14684 753916 moneypunct __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14681->14684 14682 753baa 14683 7538b0 InternetCrackUrlA 14683->14684 14684->14682 14684->14683 14685 755190 InternetCrackUrlA 14684->14685 14685->14684

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,007605B7), ref: 007586CA
                                                    • Process32First.KERNEL32(?,00000128), ref: 007586DE
                                                    • Process32Next.KERNEL32(?,00000128), ref: 007586F3
                                                    • CloseHandle.KERNELBASE(?), ref: 00758761
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 420147892-0
                                                    • Opcode ID: fde0498dd664bab6aceca2b8101347d979ff0a0221a4b6ad25ce3fafaa89e047
                                                    • Instruction ID: 1d2dda4cb1f71491054687bb926271acbad1fbce25e4ef524dddca9164d30df6
                                                    • Opcode Fuzzy Hash: fde0498dd664bab6aceca2b8101347d979ff0a0221a4b6ad25ce3fafaa89e047
                                                    • Instruction Fuzzy Hash: DF316171901218EBDB25DF50CC45FEEB778FB44701F1046A9E90AA2190DF786E49CFA2

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 396 7445c0-744695 RtlAllocateHeap 413 7446a0-7446a6 396->413 414 7446ac-74474a 413->414 415 74474f-7447a9 VirtualProtect 413->415 414->413
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,007569FB), ref: 0074460E
                                                    • VirtualProtect.KERNELBASE(?,00000004,00000100,00000000), ref: 0074479C
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeapProtectVirtual
                                                    • String ID:
                                                    • API String ID: 1542196881-0
                                                    • Opcode ID: 7d4a38272a402e8ab808dd0253732b8bdd5388e48ae2329f9682d428b217a045
                                                    • Instruction ID: 766e3803959e45a350a17b06c7ba1b73666cc4ed35fabf372598d9d723eb9745
                                                    • Opcode Fuzzy Hash: 7d4a38272a402e8ab808dd0253732b8bdd5388e48ae2329f9682d428b217a045
                                                    • Instruction Fuzzy Hash: 8E41A7B1640704EBC71C9BE4EC8DA9D7B61AB48717F60C040F90B991D0DAFC9601ABBA
                                                    APIs
                                                    • GetLocaleInfoA.KERNELBASE(?,00000002,?,00000200), ref: 00757C62
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: dae8e2b5141edacdaaecdfe47eedb74554cbb25a8aba62a872e3df573c6994e3
                                                    • Instruction ID: 37e6d41f8adda994fc5ce4d7ebb274b5d436e228348f0b6f0ce5382a2bfeaf90
                                                    • Opcode Fuzzy Hash: dae8e2b5141edacdaaecdfe47eedb74554cbb25a8aba62a872e3df573c6994e3
                                                    • Instruction Fuzzy Hash: 6E415171954218EBDB24DB54DC99BEDB378FF44701F1042D9E80962291DB782F89CFA1
                                                    APIs
                                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,00000000,00000000,?,?,00000000,?,00760E10,00000000,?,00000000,00000000,?), ref: 00757A7D
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InformationTimeZone
                                                    • String ID:
                                                    • API String ID: 565725191-0
                                                    • Opcode ID: 6158727a4d8cdf6b4b9a2f04cc529307e142661d958dad4733334ce71107a28a
                                                    • Instruction ID: a344e82187c2b499069eb06d852f4eb496a9507bf526f8c51997ad48d930892d
                                                    • Opcode Fuzzy Hash: 6158727a4d8cdf6b4b9a2f04cc529307e142661d958dad4733334ce71107a28a
                                                    • Instruction Fuzzy Hash: D31165B1949218DBEB24CF54DC45F99B778F704711F10439AE916932C0D7785E44CF51
                                                    APIs
                                                    • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0075789F
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 898838f6a3733187ed8d9dec45d52173f403e8d020a7bf2cfc41a70ca0634121
                                                    • Instruction ID: 6c190795d81561a54b36881f9638c16244daf9545e583b262b2167b4e394e030
                                                    • Opcode Fuzzy Hash: 898838f6a3733187ed8d9dec45d52173f403e8d020a7bf2cfc41a70ca0634121
                                                    • Instruction Fuzzy Hash: 23F04FF1D48208ABD714DF98DD49BAEBBB8EB04711F10025AFA05A2780C7B81904CBA1
                                                    APIs
                                                    • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00756A17,00760AEF), ref: 0074116A
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoSystem
                                                    • String ID:
                                                    • API String ID: 31276548-0
                                                    • Opcode ID: 90906e6468853a242d5110b69fc08cab492de9b320256fc1af48bc47f9ff05a2
                                                    • Instruction ID: 287ee8801124fd05f947c2b55f151acc144702620001e0a5bcfbe7e996afbe91
                                                    • Opcode Fuzzy Hash: 90906e6468853a242d5110b69fc08cab492de9b320256fc1af48bc47f9ff05a2
                                                    • Instruction Fuzzy Hash: D5D05E74D0430CDBDB00EFE0D8496DDBBB8FB08311F000555D90562340EA305881DBA6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 759c10-759c1a 1 75a036-75a0ca LoadLibraryA * 8 0->1 2 759c20-75a031 0->2 3 75a146-75a14d 1->3 4 75a0cc-75a141 1->4 2->1 6 75a216-75a21d 3->6 7 75a153-75a211 3->7 4->3 9 75a21f-75a293 6->9 10 75a298-75a29f 6->10 7->6 9->10 11 75a2a5-75a332 10->11 12 75a337-75a33e 10->12 11->12 16 75a344-75a41a 12->16 17 75a41f-75a426 12->17 16->17 19 75a4a2-75a4a9 17->19 20 75a428-75a49d 17->20 26 75a4dc-75a4e3 19->26 27 75a4ab-75a4d7 19->27 20->19 30 75a515-75a51c 26->30 31 75a4e5-75a510 26->31 27->26 36 75a612-75a619 30->36 37 75a522-75a60d 30->37 31->30 43 75a67d-75a684 36->43 44 75a61b-75a678 36->44 37->36 48 75a686-75a699 43->48 49 75a69e-75a6a5 43->49 44->43 48->49 61 75a6a7-75a703 49->61 62 75a708-75a709 49->62 61->62
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A03D
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A04E
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A060
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A072
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A083
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A095
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A0A7
                                                    • LoadLibraryA.KERNELBASE(?,?,00755CA3,?,00000034,00000064,00756600,?,0000002C,00000064,007565A0,?,00000030,00000064,Function_00015AD0,?), ref: 0075A0B8
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: d292422dc13c514bd5bf66cc7dd3675cb555c578693facf95f5c8949064fa7d2
                                                    • Instruction ID: 913d38a505d418ff2a44a85ecceae22a6aee6cb150b548c3934eb5d23b956b81
                                                    • Opcode Fuzzy Hash: d292422dc13c514bd5bf66cc7dd3675cb555c578693facf95f5c8949064fa7d2
                                                    • Instruction Fuzzy Hash: FC621AB6938200AFF744DFA8ED8896637F9F74C701714851BA609C3374D639A852FB62

                                                    Control-flow Graph

                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000,007605B6), ref: 007583A4
                                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00758426
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0075847B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Open$Enum
                                                    • String ID: ?
                                                    • API String ID: 462099255-1684325040
                                                    • Opcode ID: 376b0c9b22f5677fb549827025eee17f7d9be4494eb66ae771daf6c5e4d2951c
                                                    • Instruction ID: f410764ab2cadebb7d11e1ddbca428c99562e9720baedb008d53af2f55186b60
                                                    • Opcode Fuzzy Hash: 376b0c9b22f5677fb549827025eee17f7d9be4494eb66ae771daf6c5e4d2951c
                                                    • Instruction Fuzzy Hash: 968120B1910118EBEB64DB50CC95FEA77B8FF08701F008299E509A6140DFB96F89CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 188 757500-75754a 190 757553-7575c7 GetVolumeInformationA call 758d00 * 3 188->190 191 75754c 188->191 198 7575d8-7575df 190->198 191->190 199 7575e1-7575fa call 758d00 198->199 200 7575fc-757617 198->200 199->198 206 757619-757626 call 75a740 200->206 207 757628-757658 call 75a740 200->207 211 75767e-75768e 206->211 207->211
                                                    APIs
                                                    • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0075757F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InformationVolume
                                                    • String ID: :$C$\
                                                    • API String ID: 2039140958-3809124531
                                                    • Opcode ID: 93d61cd2df70b34507f6280c74b6f26857a8d096639c2147b096c3b105db586a
                                                    • Instruction ID: 3d6d9b43d7641996090a698a9482914bebb3a76f04c43b0a89d70b51493dfd30
                                                    • Opcode Fuzzy Hash: 93d61cd2df70b34507f6280c74b6f26857a8d096639c2147b096c3b105db586a
                                                    • Instruction Fuzzy Hash: 394185B1D04248EBDB14DF94DC45BDEBBB8EF08701F100199F90567280E7B96A48CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 214 758100-758161 call 7589b0 GlobalMemoryStatusEx 219 758163-75818b call 75da00 * 2 214->219 220 75818d-758194 214->220 222 75819b-7581e3 219->222 220->222
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,00000040,00000000), ref: 00758158
                                                    • __aulldiv.LIBCMT ref: 00758172
                                                    • __aulldiv.LIBCMT ref: 00758180
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 2185283323-2766056989
                                                    • Opcode ID: 64c9c3a0905cafcb529a381f089724aac02d18bcbb3333e06a2421a71096b305
                                                    • Instruction ID: d35d61a368d7b249109bed372016886ae755a8865b0237a1ef2fb954207780ff
                                                    • Opcode Fuzzy Hash: 64c9c3a0905cafcb529a381f089724aac02d18bcbb3333e06a2421a71096b305
                                                    • Instruction Fuzzy Hash: 73211DB1E44218ABEB10DFD4CC49FAFB7B8FB44B11F104509FA05BB280D7B969058BA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 228 741220-741247 call 7589b0 GlobalMemoryStatusEx 231 741273-74127a 228->231 232 741249-741271 call 75da00 * 2 228->232 234 741281-741285 231->234 232->234 236 741287 234->236 237 74129a-74129d 234->237 239 741292 236->239 240 741289-741290 236->240 239->237 240->237 240->239
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0074123E
                                                    • __aulldiv.LIBCMT ref: 00741258
                                                    • __aulldiv.LIBCMT ref: 00741266
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 2185283323-2766056989
                                                    • Opcode ID: 7be48c5c798d65e6082acfbb6cdd81ec160374e7029c7af20806a69bfdba3e51
                                                    • Instruction ID: 678a3f370d425f4b9b80af8a843483a593328d48c39fdb1623458fb5712803ed
                                                    • Opcode Fuzzy Hash: 7be48c5c798d65e6082acfbb6cdd81ec160374e7029c7af20806a69bfdba3e51
                                                    • Instruction Fuzzy Hash: A70162B0E54308FBEB10EBE0CC49B9EB778BB04701F608045E705F62C0D7B859858759

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 242 746280-74630b call 75a7a0 call 7447b0 call 75a740 InternetOpenA 250 746314-746318 242->250 251 74630d 242->251 252 74631e-746342 InternetConnectA 250->252 253 746509-746525 call 75a7a0 call 75a800 * 2 250->253 251->250 254 7464ff-746502 252->254 255 746348-74634c 252->255 269 746528-74652d 253->269 254->253 257 74634e-746358 255->257 258 74635a 255->258 260 746364-746392 HttpOpenRequestA 257->260 258->260 263 7464f5-7464f8 260->263 264 746398-74639c 260->264 263->254 266 7463c5-7463fc HttpSendRequestA 264->266 267 74639e-7463be 264->267 270 746403-746405 266->270 267->266 271 746407-746427 call 75a740 call 75a800 * 2 270->271 272 74642c-74644b call 758940 270->272 271->269 277 74644d-746454 272->277 278 7464c9-7464e9 call 75a740 call 75a800 * 2 272->278 281 746456-746480 277->281 282 7464c7-7464ee 277->282 278->269 291 746482-746489 281->291 292 74648b 281->292 282->263 291->292 294 74648d-7464c5 call 75a9b0 call 75a8a0 call 75a800 291->294 292->282 294->281
                                                    APIs
                                                      • Part of subcall function 007447B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00744849
                                                    • InternetOpenA.WININET(00760DFE,00000001,00000000,00000000,00000000,00760DFB), ref: 007462E1
                                                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00746335
                                                    • HttpOpenRequestA.WININET(00000000,00761A28,?,?,00000000,00000000,00400100,00000000), ref: 00746385
                                                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007463D1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Internet$HttpOpenRequest$ConnectCrackSend
                                                    • String ID:
                                                    • API String ID: 612470270-0
                                                    • Opcode ID: da244d5e2490fe9f7f30ef999308ac416a57966683ed8cd8f30c249535112c5e
                                                    • Instruction ID: c4068130a1feb70694cd70f13e6c71e5b134f0f6e36bcb1a3128d512b3ac90a1
                                                    • Opcode Fuzzy Hash: da244d5e2490fe9f7f30ef999308ac416a57966683ed8cd8f30c249535112c5e
                                                    • Instruction Fuzzy Hash: DD718271A00218EBDF14DF94CC49BEE7774FB44701F108169F5066B190DBB86A89DF52

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 325 757690-7576bb call 7577a0 330 7576c6-7576e5 RegOpenKeyExA 325->330 331 7576bd-7576c2 325->331 332 757704-75770e 330->332 333 7576e7-7576fe RegQueryValueExA 330->333 334 757711-757714 331->334 332->334 333->332
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,00000000), ref: 007576DD
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,000000FF), ref: 007576FE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID: \v
                                                    • API String ID: 4153817207-4064502150
                                                    • Opcode ID: fcf0b560c4aa75ae1cfe4437d0d32db07ba38d131f88a26ca3beca000a6b03c3
                                                    • Instruction ID: 373cb5d4f9592fdf9646c6858d30920a4e65160066f96392ee64da804603b234
                                                    • Opcode Fuzzy Hash: fcf0b560c4aa75ae1cfe4437d0d32db07ba38d131f88a26ca3beca000a6b03c3
                                                    • Instruction Fuzzy Hash: BB014FB5A18304BBEB04DBE4EC49FAAB7B8EB48701F104456FE0597290D6B89904EB61

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 336 759860-759874 call 759750 339 759a93-759af2 LoadLibraryA * 3 336->339 340 75987a-759a8e call 759780 336->340 346 759af4-759b08 339->346 347 759b0d-759b14 339->347 340->339 346->347 348 759b46-759b4d 347->348 349 759b16-759b41 347->349 351 759b4f-759b63 348->351 352 759b68-759b6f 348->352 349->348 351->352 354 759b71-759b84 352->354 355 759b89-759b90 352->355 354->355 359 759bc1-759bc2 355->359 360 759b92-759bbc 355->360 360->359
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?,?,00756A00), ref: 00759A9A
                                                    • LoadLibraryA.KERNELBASE(?,?,00756A00), ref: 00759AAB
                                                    • LoadLibraryA.KERNELBASE(?,?,00756A00), ref: 00759ACF
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 7d762fcc6c6cb6cd68c74d3f4131f8771e0afb8622e5959cca24b38ecc75270e
                                                    • Instruction ID: f77661bdd04e1b85b5b14c96b70f82ea79bb46bc07a1e4024860d28656d1bfbf
                                                    • Opcode Fuzzy Hash: 7d762fcc6c6cb6cd68c74d3f4131f8771e0afb8622e5959cca24b38ecc75270e
                                                    • Instruction Fuzzy Hash: 8BA14AB692C2409FF344EFA8ED889663BF9F74C701704451BA605C3364D63DA852FB22

                                                    Control-flow Graph

                                                    APIs
                                                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 00744849
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CrackInternet
                                                    • String ID: <
                                                    • API String ID: 1381609488-4251816714
                                                    • Opcode ID: f063bd80a8b60a03a2e7dda2713b284abe79417ec4ceab9caa7e74246acf868f
                                                    • Instruction ID: 3974c39ee433df4be0a9802e738b528efd6c66203f165e029e8ef903a81f83d9
                                                    • Opcode Fuzzy Hash: f063bd80a8b60a03a2e7dda2713b284abe79417ec4ceab9caa7e74246acf868f
                                                    • Instruction Fuzzy Hash: 94211AB1D00209ABDF14DFA4E849ADE7B74FB44321F108225F925A72D0EBB46A05DF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 433 744fb0-74501a RtlAllocateHeap call 75aad0 439 745021-745028 433->439 440 7450a0-7450fb call 75a800 439->440 441 74502a-745051 439->441 444 745062-74506e 441->444 445 745070-74509c KiUserExceptionDispatcher 444->445 446 74509e 444->446 448 745053-74505c 445->448 446->439 448->444
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 00744FD1
                                                    • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 0074508A
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateDispatcherExceptionHeapUser
                                                    • String ID:
                                                    • API String ID: 3515689010-0
                                                    • Opcode ID: 33cea44835b96e253b2589e8b4db23edef2755131bf677634771e71e3e26c83f
                                                    • Instruction ID: 158233a403abe141e61f77b630404968a809cd7d6bf6ec3bae75c717ae0d8b88
                                                    • Opcode Fuzzy Hash: 33cea44835b96e253b2589e8b4db23edef2755131bf677634771e71e3e26c83f
                                                    • Instruction Fuzzy Hash: 083107B4A00218ABDB20CF54DC85BDDB7B4EB48704F5081D9FB09A7281D7746EC59F99

                                                    Control-flow Graph

                                                    APIs
                                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00758426
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0075847B
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400), ref: 007584EC
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00760B34), ref: 00758599
                                                    • RegCloseKey.KERNELBASE(00000000), ref: 00758608
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: QueryValue$CloseEnumOpen
                                                    • String ID:
                                                    • API String ID: 2041898428-0
                                                    • Opcode ID: 8f1d8abc3aa23dfb47c294c833a0c1a474c8b81253eaaaade415228cf3e25176
                                                    • Instruction ID: 2ec124d25884957ff1cabd8d52f3422dbd2636c7bfbb2cc443ebbf6950f0f5c4
                                                    • Opcode Fuzzy Hash: 8f1d8abc3aa23dfb47c294c833a0c1a474c8b81253eaaaade415228cf3e25176
                                                    • Instruction Fuzzy Hash: 61213BB1910218ABEB64DB54CC85FE9B3B8FB48701F00C5D9E609A6240DF75AA85CFE5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 500 757e00-757e66 RegOpenKeyExA 503 757e87-757e8c 500->503 504 757e68-757e85 RegQueryValueExA 500->504 506 757eb6-757ec6 503->506 505 757e8e-757e9b 504->505 505->506
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?), ref: 00757E5E
                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,000000FF,000000FF), ref: 00757E7F
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: 50e2c2a0d35a6a5ad8e20a4f4e9ff4410ea438b3805f8c17454bc0ad63c501d1
                                                    • Instruction ID: 445b78bc2cfa8f153fe60bb9d131470fba7bc105aa014b27d639a2e921320a5f
                                                    • Opcode Fuzzy Hash: 50e2c2a0d35a6a5ad8e20a4f4e9ff4410ea438b3805f8c17454bc0ad63c501d1
                                                    • Instruction Fuzzy Hash: D3114FB1A58205EBE714CF94DD4AFBBBBB8EB04711F10415AFA05A7380D7B85C04DBA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 508 757720-757763 RegOpenKeyExA 511 757765-75777a RegQueryValueExA 508->511 512 757780-75779f call 758940 508->512 511->512
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,007576B9), ref: 0075775B
                                                    • RegQueryValueExA.KERNELBASE(007576B9,00760AAC,00000000,00000000,?,000000FF), ref: 0075777A
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: aa7bc8209e7abfac37f946ba8be1b41538440eb2a633580fad205696ed6c134a
                                                    • Instruction ID: 1953919b96c4c150c128dca91faaf8bda274666d4af3fefae41aeee7161c0a51
                                                    • Opcode Fuzzy Hash: aa7bc8209e7abfac37f946ba8be1b41538440eb2a633580fad205696ed6c134a
                                                    • Instruction Fuzzy Hash: E90144B5E54308BBE700DBE0DC49FAEB7B8EB48701F004555FA05A7281D67455009BA1
                                                    APIs
                                                      • Part of subcall function 00741160: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00756A17,00760AEF), ref: 0074116A
                                                      • Part of subcall function 00741110: VirtualAllocExNuma.KERNELBASE(00000000,?,?,00756A1C), ref: 00741132
                                                      • Part of subcall function 00741220: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0074123E
                                                      • Part of subcall function 00741220: __aulldiv.LIBCMT ref: 00741258
                                                      • Part of subcall function 00741220: __aulldiv.LIBCMT ref: 00741266
                                                    • GetUserDefaultLCID.KERNELBASE ref: 00756A26
                                                      • Part of subcall function 00757850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0075789F
                                                      • Part of subcall function 007578E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0075792F
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoMemoryNumaStatusSystemVirtual
                                                    • String ID:
                                                    • API String ID: 3178950686-0
                                                    • Opcode ID: 01d2cbd3942845e2e12e6de68f2f72a800b91fa1152942564224f376bd9ce0e4
                                                    • Instruction ID: e7ea5e5fc5473b33ce404c0d82a7bc467abeaa8db81f1d9ab3ab480b204264e1
                                                    • Opcode Fuzzy Hash: 01d2cbd3942845e2e12e6de68f2f72a800b91fa1152942564224f376bd9ce0e4
                                                    • Instruction Fuzzy Hash: BB312071D14208EADB05F7F0DC5EAEE7778AF04302F504629F912A2191EFBC6949D7A2
                                                    APIs
                                                    • GetComputerNameA.KERNEL32(?,00000104), ref: 0075792F
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: 37688fe1740ef69d390f596910bd33693993366318ebd9114eaa5dd67681855b
                                                    • Instruction ID: 16282c8d625d390fd527fd35bb2cb5906bf6433e84514dd49960fe28c5bb4493
                                                    • Opcode Fuzzy Hash: 37688fe1740ef69d390f596910bd33693993366318ebd9114eaa5dd67681855b
                                                    • Instruction Fuzzy Hash: 040162B1908204EBD714DF94DD45FAAFBB8F704B11F10421AEA45A2380C7B859048BA1
                                                    APIs
                                                    • GetSystemInfo.KERNELBASE(00760E2C), ref: 00757F00
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoSystem
                                                    • String ID:
                                                    • API String ID: 31276548-0
                                                    • Opcode ID: 86939e5a5fbaabf3462abc34a4d8bbb678973adb7f522ef4fcee26fdbe23ef39
                                                    • Instruction ID: 4daddf8041458a7bc356f78aea91a862637d3bcb386e670ff955243ff75cb017
                                                    • Opcode Fuzzy Hash: 86939e5a5fbaabf3462abc34a4d8bbb678973adb7f522ef4fcee26fdbe23ef39
                                                    • Instruction Fuzzy Hash: 6BF062F1D04208EBD714CF85DC45FAAB7BCF744614F00466AF91592280D7B959448BD1
                                                    APIs
                                                    • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 007594A5
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID:
                                                    • API String ID: 514040917-0
                                                    • Opcode ID: 50754fdfaf25990d4289fb0f0a3a252eca4d0d76f2ada069c4209013095623da
                                                    • Instruction ID: 37b39a01bc741e8436bb3e4b97d64e626b6c8ea031ce64b77f21f7d0e71f0603
                                                    • Opcode Fuzzy Hash: 50754fdfaf25990d4289fb0f0a3a252eca4d0d76f2ada069c4209013095623da
                                                    • Instruction Fuzzy Hash: B8F05E7490020CFBEB04DFA4DC4AFEE7778EB08301F004598BB0997290D6B46E85DB91
                                                    APIs
                                                    • VirtualAllocExNuma.KERNELBASE(00000000,?,?,00756A1C), ref: 00741132
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocNumaVirtual
                                                    • String ID:
                                                    • API String ID: 4233825816-0
                                                    • Opcode ID: bbe0d8e8b5783ac0a6d9d56ed2ca2e26b889e68205eeb7e111c82997d332c8ec
                                                    • Instruction ID: 68ec37bcaaaedf2a5d1279b2c10646505d9bf1cb9319f967524c65211a59deb3
                                                    • Opcode Fuzzy Hash: bbe0d8e8b5783ac0a6d9d56ed2ca2e26b889e68205eeb7e111c82997d332c8ec
                                                    • Instruction Fuzzy Hash: 84E0E67099930CFBF710ABA09C0EB097678AB04B41F504055F709762D0D7B92640A7AA
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0074114E,?,?,00756A1C), ref: 007410B3
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: cee38879f1bd988db2ae84995a2e3d877abe4bcf526c9053cd61c2506472ae6f
                                                    • Instruction ID: 5be293e4c88943a55eee7057e722796cb394cd6bb2f8e53ddd01a3c3e3b3ecbe
                                                    • Opcode Fuzzy Hash: cee38879f1bd988db2ae84995a2e3d877abe4bcf526c9053cd61c2506472ae6f
                                                    • Instruction Fuzzy Hash: ADF0E271641208BBE714AAA4AC49FAAB7ECE705B15F300448F904E3290D671AE40DBA1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                    • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                    • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                    • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0075C74E
                                                      • Part of subcall function 0075BF9F: __getptd_noexit.LIBCMT ref: 0075BFA2
                                                      • Part of subcall function 0075BF9F: __amsg_exit.LIBCMT ref: 0075BFAF
                                                    • __getptd.LIBCMT ref: 0075C765
                                                    • __amsg_exit.LIBCMT ref: 0075C773
                                                    • __lock.LIBCMT ref: 0075C783
                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0075C797
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2408782062.0000000000740000.00000040.00000400.00020000.00000000.sdmp, Offset: 00740000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_740000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                    • String ID:
                                                    • API String ID: 938513278-0
                                                    • Opcode ID: 96e955a7fa83634030a7d482e6f17eab0d3904fad534e672f89dacb33cec4e94
                                                    • Instruction ID: c1a4d91efe66a336bece0f307a154497e203ee45cc0deb5b9de9424b8275fb8a
                                                    • Opcode Fuzzy Hash: 96e955a7fa83634030a7d482e6f17eab0d3904fad534e672f89dacb33cec4e94
                                                    • Instruction Fuzzy Hash: CEF0F032900700EFD722BBB8480B7D933A06F04723F244549FC05A65D2CFEC59898E46

                                                    Execution Graph

                                                    Execution Coverage:19.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:1163
                                                    Total number of Limit Nodes:6
                                                    execution_graph 13432 3001190 13437 30178e0 13432->13437 13434 300119e 13436 30011b7 13434->13436 13441 3017850 13434->13441 13438 3017916 GetComputerNameA 13437->13438 13440 3017939 13438->13440 13440->13434 13442 3017886 GetUserNameA 13441->13442 13444 30178c3 13442->13444 13444->13436 13445 30169f0 13465 3002260 13445->13465 13449 3016a00 13558 3001160 GetSystemInfo 13449->13558 13455 3016a21 13456 3016a26 GetUserDefaultLCID 13455->13456 13457 3017850 GetUserNameA 13456->13457 13458 3016a30 13457->13458 13459 30178e0 GetComputerNameA 13458->13459 13460 3016a43 13459->13460 13462 3016ad9 13460->13462 13463 3016aff Sleep 13460->13463 13569 3015b10 13462->13569 13463->13460 13464 3016b16 13635 30045c0 13465->13635 13467 3002274 13468 30045c0 2 API calls 13467->13468 13469 300228d 13468->13469 13470 30045c0 2 API calls 13469->13470 13471 30022a6 13470->13471 13472 30045c0 2 API calls 13471->13472 13473 30022bf 13472->13473 13474 30045c0 2 API calls 13473->13474 13475 30022d8 13474->13475 13476 30045c0 2 API calls 13475->13476 13477 30022f1 13476->13477 13478 30045c0 2 API calls 13477->13478 13479 300230a 13478->13479 13480 30045c0 2 API calls 13479->13480 13481 3002323 13480->13481 13482 30045c0 2 API calls 13481->13482 13483 300233c 13482->13483 13484 30045c0 2 API calls 13483->13484 13485 3002355 13484->13485 13486 30045c0 2 API calls 13485->13486 13487 300236e 13486->13487 13488 30045c0 2 API calls 13487->13488 13489 3002387 13488->13489 13490 30045c0 2 API calls 13489->13490 13491 30023a0 13490->13491 13492 30045c0 2 API calls 13491->13492 13493 30023b9 13492->13493 13494 30045c0 2 API calls 13493->13494 13495 30023d2 13494->13495 13496 30045c0 2 API calls 13495->13496 13497 30023eb 13496->13497 13498 30045c0 2 API calls 13497->13498 13499 3002404 13498->13499 13500 30045c0 2 API calls 13499->13500 13501 300241d 13500->13501 13502 30045c0 2 API calls 13501->13502 13503 3002436 13502->13503 13504 30045c0 2 API calls 13503->13504 13505 300244f 13504->13505 13506 30045c0 2 API calls 13505->13506 13507 3002468 13506->13507 13508 30045c0 2 API calls 13507->13508 13509 3002481 13508->13509 13510 30045c0 2 API calls 13509->13510 13511 300249a 13510->13511 13512 30045c0 2 API calls 13511->13512 13513 30024b3 13512->13513 13514 30045c0 2 API calls 13513->13514 13515 30024cc 13514->13515 13516 30045c0 2 API calls 13515->13516 13517 30024e5 13516->13517 13518 30045c0 2 API calls 13517->13518 13519 30024fe 13518->13519 13520 30045c0 2 API calls 13519->13520 13521 3002517 13520->13521 13522 30045c0 2 API calls 13521->13522 13523 3002530 13522->13523 13524 30045c0 2 API calls 13523->13524 13525 3002549 13524->13525 13526 30045c0 2 API calls 13525->13526 13527 3002562 13526->13527 13528 30045c0 2 API calls 13527->13528 13529 300257b 13528->13529 13530 30045c0 2 API calls 13529->13530 13531 3002594 13530->13531 13532 30045c0 2 API calls 13531->13532 13533 30025ad 13532->13533 13534 30045c0 2 API calls 13533->13534 13535 30025c6 13534->13535 13536 30045c0 2 API calls 13535->13536 13537 30025df 13536->13537 13538 30045c0 2 API calls 13537->13538 13539 30025f8 13538->13539 13540 30045c0 2 API calls 13539->13540 13541 3002611 13540->13541 13542 30045c0 2 API calls 13541->13542 13543 300262a 13542->13543 13544 30045c0 2 API calls 13543->13544 13545 3002643 13544->13545 13546 30045c0 2 API calls 13545->13546 13547 300265c 13546->13547 13548 30045c0 2 API calls 13547->13548 13549 3002675 13548->13549 13550 30045c0 2 API calls 13549->13550 13551 300268e 13550->13551 13552 3019860 13551->13552 13640 3019750 GetPEB 13552->13640 13554 3019a93 LoadLibraryA LoadLibraryA 13555 3019ac3 LoadLibraryA 13554->13555 13556 3019ae6 13555->13556 13556->13449 13557 3019868 13557->13554 13559 300117c 13558->13559 13560 3001110 13559->13560 13561 3001131 VirtualAllocExNuma 13560->13561 13562 3001141 13561->13562 13641 30010a0 VirtualAlloc 13562->13641 13564 300114e 13565 3001220 13564->13565 13643 30189b0 13565->13643 13568 3001249 __aulldiv 13568->13455 13570 3015b1d 13569->13570 13645 30026a0 13570->13645 13574 3015ca3 14282 3015510 13574->14282 13576 3015cc3 14287 3017500 13576->14287 13578 3015da7 14291 3004880 13578->14291 13580 3015dbe 14295 3005960 13580->14295 13582 3015e03 13583 3005960 InternetCrackUrlA 13582->13583 13584 3015e4c 13583->13584 13585 3005960 InternetCrackUrlA 13584->13585 13586 3015e93 13585->13586 14299 3011a10 13586->14299 13588 3015eba 14329 3004fb0 13588->14329 13590 3015edb 14334 3010740 13590->14334 13592 3015f60 13593 3005960 InternetCrackUrlA 13592->13593 13594 3015fa0 13593->13594 14346 3001e80 13594->14346 13596 3015ff0 13597 3016092 13596->13597 13598 3016000 13596->13598 13599 3005960 InternetCrackUrlA 13597->13599 13600 3005960 InternetCrackUrlA 13598->13600 13601 30160bf 13599->13601 13603 301603a 13600->13603 14356 3013560 13601->14356 14352 3013dc0 13603->14352 13604 301608a 13607 301610b 13604->13607 14360 30140b0 13604->14360 13608 3016130 13607->13608 14378 3014780 13607->14378 13612 3016155 13608->13612 14382 3014bb0 13608->14382 13609 30160ec 14374 3015100 13609->14374 13614 301617a 13612->13614 14396 3014d70 13612->14396 13616 301619f 13614->13616 14404 3014f40 13614->14404 13620 30161c4 13616->13620 14410 3007710 13616->14410 13618 3016210 13624 30162b3 13618->13624 13625 3016220 13618->13625 13621 30161e9 13620->13621 14414 3015050 13620->14414 13621->13618 14418 3019010 13621->14418 13626 3005960 InternetCrackUrlA 13624->13626 13627 3005960 InternetCrackUrlA 13625->13627 13628 30162e0 13626->13628 13630 301625b 13627->13630 13629 3013560 InternetCrackUrlA 13628->13629 13632 30162ab 13629->13632 13631 3013dc0 InternetCrackUrlA 13630->13631 13631->13632 13633 3005960 InternetCrackUrlA 13632->13633 13634 301631c 13633->13634 13634->13464 13636 30045d2 RtlAllocateHeap 13635->13636 13638 3004622 VirtualProtect 13636->13638 13638->13467 13640->13557 13642 30010c2 ctype 13641->13642 13642->13564 13644 3001233 GlobalMemoryStatusEx 13643->13644 13644->13568 13646 30045c0 2 API calls 13645->13646 13647 30026b4 13646->13647 13648 30045c0 2 API calls 13647->13648 13649 30026d7 13648->13649 13650 30045c0 2 API calls 13649->13650 13651 30026f0 13650->13651 13652 30045c0 2 API calls 13651->13652 13653 3002709 13652->13653 13654 30045c0 2 API calls 13653->13654 13655 3002736 13654->13655 13656 30045c0 2 API calls 13655->13656 13657 300274f 13656->13657 13658 30045c0 2 API calls 13657->13658 13659 3002768 13658->13659 13660 30045c0 2 API calls 13659->13660 13661 3002795 13660->13661 13662 30045c0 2 API calls 13661->13662 13663 30027ae 13662->13663 13664 30045c0 2 API calls 13663->13664 13665 30027c7 13664->13665 13666 30045c0 2 API calls 13665->13666 13667 30027e0 13666->13667 13668 30045c0 2 API calls 13667->13668 13669 30027f9 13668->13669 13670 30045c0 2 API calls 13669->13670 13671 3002812 13670->13671 13672 30045c0 2 API calls 13671->13672 13673 300282b 13672->13673 13674 30045c0 2 API calls 13673->13674 13675 3002844 13674->13675 13676 30045c0 2 API calls 13675->13676 13677 300285d 13676->13677 13678 30045c0 2 API calls 13677->13678 13679 3002876 13678->13679 13680 30045c0 2 API calls 13679->13680 13681 300288f 13680->13681 13682 30045c0 2 API calls 13681->13682 13683 30028a8 13682->13683 13684 30045c0 2 API calls 13683->13684 13685 30028c1 13684->13685 13686 30045c0 2 API calls 13685->13686 13687 30028da 13686->13687 13688 30045c0 2 API calls 13687->13688 13689 30028f3 13688->13689 13690 30045c0 2 API calls 13689->13690 13691 300290c 13690->13691 13692 30045c0 2 API calls 13691->13692 13693 3002925 13692->13693 13694 30045c0 2 API calls 13693->13694 13695 300293e 13694->13695 13696 30045c0 2 API calls 13695->13696 13697 3002957 13696->13697 13698 30045c0 2 API calls 13697->13698 13699 3002970 13698->13699 13700 30045c0 2 API calls 13699->13700 13701 3002989 13700->13701 13702 30045c0 2 API calls 13701->13702 13703 30029a2 13702->13703 13704 30045c0 2 API calls 13703->13704 13705 30029bb 13704->13705 13706 30045c0 2 API calls 13705->13706 13707 30029d4 13706->13707 13708 30045c0 2 API calls 13707->13708 13709 30029ed 13708->13709 13710 30045c0 2 API calls 13709->13710 13711 3002a06 13710->13711 13712 30045c0 2 API calls 13711->13712 13713 3002a1f 13712->13713 13714 30045c0 2 API calls 13713->13714 13715 3002a38 13714->13715 13716 30045c0 2 API calls 13715->13716 13717 3002a51 13716->13717 13718 30045c0 2 API calls 13717->13718 13719 3002a6a 13718->13719 13720 30045c0 2 API calls 13719->13720 13721 3002a83 13720->13721 13722 30045c0 2 API calls 13721->13722 13723 3002a9c 13722->13723 13724 30045c0 2 API calls 13723->13724 13725 3002ab5 13724->13725 13726 30045c0 2 API calls 13725->13726 13727 3002ace 13726->13727 13728 30045c0 2 API calls 13727->13728 13729 3002ae7 13728->13729 13730 30045c0 2 API calls 13729->13730 13731 3002b00 13730->13731 13732 30045c0 2 API calls 13731->13732 13733 3002b19 13732->13733 13734 30045c0 2 API calls 13733->13734 13735 3002b32 13734->13735 13736 30045c0 2 API calls 13735->13736 13737 3002b4b 13736->13737 13738 30045c0 2 API calls 13737->13738 13739 3002b64 13738->13739 13740 30045c0 2 API calls 13739->13740 13741 3002b7d 13740->13741 13742 30045c0 2 API calls 13741->13742 13743 3002b96 13742->13743 13744 30045c0 2 API calls 13743->13744 13745 3002baf 13744->13745 13746 30045c0 2 API calls 13745->13746 13747 3002bc8 13746->13747 13748 30045c0 2 API calls 13747->13748 13749 3002be1 13748->13749 13750 30045c0 2 API calls 13749->13750 13751 3002bfa 13750->13751 13752 30045c0 2 API calls 13751->13752 13753 3002c13 13752->13753 13754 30045c0 2 API calls 13753->13754 13755 3002c2c 13754->13755 13756 30045c0 2 API calls 13755->13756 13757 3002c45 13756->13757 13758 30045c0 2 API calls 13757->13758 13759 3002c5e 13758->13759 13760 30045c0 2 API calls 13759->13760 13761 3002c77 13760->13761 13762 30045c0 2 API calls 13761->13762 13763 3002c90 13762->13763 13764 30045c0 2 API calls 13763->13764 13765 3002ca9 13764->13765 13766 30045c0 2 API calls 13765->13766 13767 3002cc2 13766->13767 13768 30045c0 2 API calls 13767->13768 13769 3002cdb 13768->13769 13770 30045c0 2 API calls 13769->13770 13771 3002cf4 13770->13771 13772 30045c0 2 API calls 13771->13772 13773 3002d0d 13772->13773 13774 30045c0 2 API calls 13773->13774 13775 3002d26 13774->13775 13776 30045c0 2 API calls 13775->13776 13777 3002d3f 13776->13777 13778 30045c0 2 API calls 13777->13778 13779 3002d58 13778->13779 13780 30045c0 2 API calls 13779->13780 13781 3002d71 13780->13781 13782 30045c0 2 API calls 13781->13782 13783 3002d8a 13782->13783 13784 30045c0 2 API calls 13783->13784 13785 3002da3 13784->13785 13786 30045c0 2 API calls 13785->13786 13787 3002dbc 13786->13787 13788 30045c0 2 API calls 13787->13788 13789 3002dd5 13788->13789 13790 30045c0 2 API calls 13789->13790 13791 3002dee 13790->13791 13792 30045c0 2 API calls 13791->13792 13793 3002e07 13792->13793 13794 30045c0 2 API calls 13793->13794 13795 3002e20 13794->13795 13796 30045c0 2 API calls 13795->13796 13797 3002e39 13796->13797 13798 30045c0 2 API calls 13797->13798 13799 3002e52 13798->13799 13800 30045c0 2 API calls 13799->13800 13801 3002e6b 13800->13801 13802 30045c0 2 API calls 13801->13802 13803 3002e84 13802->13803 13804 30045c0 2 API calls 13803->13804 13805 3002e9d 13804->13805 13806 30045c0 2 API calls 13805->13806 13807 3002eb6 13806->13807 13808 30045c0 2 API calls 13807->13808 13809 3002ecf 13808->13809 13810 30045c0 2 API calls 13809->13810 13811 3002ee8 13810->13811 13812 30045c0 2 API calls 13811->13812 13813 3002f01 13812->13813 13814 30045c0 2 API calls 13813->13814 13815 3002f1a 13814->13815 13816 30045c0 2 API calls 13815->13816 13817 3002f33 13816->13817 13818 30045c0 2 API calls 13817->13818 13819 3002f4c 13818->13819 13820 30045c0 2 API calls 13819->13820 13821 3002f65 13820->13821 13822 30045c0 2 API calls 13821->13822 13823 3002f7e 13822->13823 13824 30045c0 2 API calls 13823->13824 13825 3002f97 13824->13825 13826 30045c0 2 API calls 13825->13826 13827 3002fb0 13826->13827 13828 30045c0 2 API calls 13827->13828 13829 3002fc9 13828->13829 13830 30045c0 2 API calls 13829->13830 13831 3002fe2 13830->13831 13832 30045c0 2 API calls 13831->13832 13833 3002ffb 13832->13833 13834 30045c0 2 API calls 13833->13834 13835 3003014 13834->13835 13836 30045c0 2 API calls 13835->13836 13837 300302d 13836->13837 13838 30045c0 2 API calls 13837->13838 13839 3003046 13838->13839 13840 30045c0 2 API calls 13839->13840 13841 300305f 13840->13841 13842 30045c0 2 API calls 13841->13842 13843 3003078 13842->13843 13844 30045c0 2 API calls 13843->13844 13845 3003091 13844->13845 13846 30045c0 2 API calls 13845->13846 13847 30030aa 13846->13847 13848 30045c0 2 API calls 13847->13848 13849 30030c3 13848->13849 13850 30045c0 2 API calls 13849->13850 13851 30030dc 13850->13851 13852 30045c0 2 API calls 13851->13852 13853 30030f5 13852->13853 13854 30045c0 2 API calls 13853->13854 13855 300310e 13854->13855 13856 30045c0 2 API calls 13855->13856 13857 3003127 13856->13857 13858 30045c0 2 API calls 13857->13858 13859 3003140 13858->13859 13860 30045c0 2 API calls 13859->13860 13861 3003159 13860->13861 13862 30045c0 2 API calls 13861->13862 13863 3003172 13862->13863 13864 30045c0 2 API calls 13863->13864 13865 300318b 13864->13865 13866 30045c0 2 API calls 13865->13866 13867 30031a4 13866->13867 13868 30045c0 2 API calls 13867->13868 13869 30031bd 13868->13869 13870 30045c0 2 API calls 13869->13870 13871 30031d6 13870->13871 13872 30045c0 2 API calls 13871->13872 13873 30031ef 13872->13873 13874 30045c0 2 API calls 13873->13874 13875 3003208 13874->13875 13876 30045c0 2 API calls 13875->13876 13877 3003221 13876->13877 13878 30045c0 2 API calls 13877->13878 13879 300323a 13878->13879 13880 30045c0 2 API calls 13879->13880 13881 3003253 13880->13881 13882 30045c0 2 API calls 13881->13882 13883 300326c 13882->13883 13884 30045c0 2 API calls 13883->13884 13885 3003285 13884->13885 13886 30045c0 2 API calls 13885->13886 13887 300329e 13886->13887 13888 30045c0 2 API calls 13887->13888 13889 30032b7 13888->13889 13890 30045c0 2 API calls 13889->13890 13891 30032d0 13890->13891 13892 30045c0 2 API calls 13891->13892 13893 30032e9 13892->13893 13894 30045c0 2 API calls 13893->13894 13895 3003302 13894->13895 13896 30045c0 2 API calls 13895->13896 13897 300331b 13896->13897 13898 30045c0 2 API calls 13897->13898 13899 3003334 13898->13899 13900 30045c0 2 API calls 13899->13900 13901 300334d 13900->13901 13902 30045c0 2 API calls 13901->13902 13903 3003366 13902->13903 13904 30045c0 2 API calls 13903->13904 13905 300337f 13904->13905 13906 30045c0 2 API calls 13905->13906 13907 3003398 13906->13907 13908 30045c0 2 API calls 13907->13908 13909 30033b1 13908->13909 13910 30045c0 2 API calls 13909->13910 13911 30033ca 13910->13911 13912 30045c0 2 API calls 13911->13912 13913 30033e3 13912->13913 13914 30045c0 2 API calls 13913->13914 13915 30033fc 13914->13915 13916 30045c0 2 API calls 13915->13916 13917 3003415 13916->13917 13918 30045c0 2 API calls 13917->13918 13919 300342e 13918->13919 13920 30045c0 2 API calls 13919->13920 13921 3003447 13920->13921 13922 30045c0 2 API calls 13921->13922 13923 3003460 13922->13923 13924 30045c0 2 API calls 13923->13924 13925 3003479 13924->13925 13926 30045c0 2 API calls 13925->13926 13927 3003492 13926->13927 13928 30045c0 2 API calls 13927->13928 13929 30034ab 13928->13929 13930 30045c0 2 API calls 13929->13930 13931 30034c4 13930->13931 13932 30045c0 2 API calls 13931->13932 13933 30034dd 13932->13933 13934 30045c0 2 API calls 13933->13934 13935 30034f6 13934->13935 13936 30045c0 2 API calls 13935->13936 13937 300350f 13936->13937 13938 30045c0 2 API calls 13937->13938 13939 3003528 13938->13939 13940 30045c0 2 API calls 13939->13940 13941 3003541 13940->13941 13942 30045c0 2 API calls 13941->13942 13943 300355a 13942->13943 13944 30045c0 2 API calls 13943->13944 13945 3003573 13944->13945 13946 30045c0 2 API calls 13945->13946 13947 300358c 13946->13947 13948 30045c0 2 API calls 13947->13948 13949 30035a5 13948->13949 13950 30045c0 2 API calls 13949->13950 13951 30035be 13950->13951 13952 30045c0 2 API calls 13951->13952 13953 30035d7 13952->13953 13954 30045c0 2 API calls 13953->13954 13955 30035f0 13954->13955 13956 30045c0 2 API calls 13955->13956 13957 3003609 13956->13957 13958 30045c0 2 API calls 13957->13958 13959 3003622 13958->13959 13960 30045c0 2 API calls 13959->13960 13961 300363b 13960->13961 13962 30045c0 2 API calls 13961->13962 13963 3003654 13962->13963 13964 30045c0 2 API calls 13963->13964 13965 300366d 13964->13965 13966 30045c0 2 API calls 13965->13966 13967 3003686 13966->13967 13968 30045c0 2 API calls 13967->13968 13969 300369f 13968->13969 13970 30045c0 2 API calls 13969->13970 13971 30036b8 13970->13971 13972 30045c0 2 API calls 13971->13972 13973 30036d1 13972->13973 13974 30045c0 2 API calls 13973->13974 13975 30036ea 13974->13975 13976 30045c0 2 API calls 13975->13976 13977 3003703 13976->13977 13978 30045c0 2 API calls 13977->13978 13979 300371c 13978->13979 13980 30045c0 2 API calls 13979->13980 13981 3003735 13980->13981 13982 30045c0 2 API calls 13981->13982 13983 300374e 13982->13983 13984 30045c0 2 API calls 13983->13984 13985 3003767 13984->13985 13986 30045c0 2 API calls 13985->13986 13987 3003780 13986->13987 13988 30045c0 2 API calls 13987->13988 13989 3003799 13988->13989 13990 30045c0 2 API calls 13989->13990 13991 30037b2 13990->13991 13992 30045c0 2 API calls 13991->13992 13993 30037cb 13992->13993 13994 30045c0 2 API calls 13993->13994 13995 30037e4 13994->13995 13996 30045c0 2 API calls 13995->13996 13997 30037fd 13996->13997 13998 30045c0 2 API calls 13997->13998 13999 3003816 13998->13999 14000 30045c0 2 API calls 13999->14000 14001 300382f 14000->14001 14002 30045c0 2 API calls 14001->14002 14003 3003848 14002->14003 14004 30045c0 2 API calls 14003->14004 14005 3003861 14004->14005 14006 30045c0 2 API calls 14005->14006 14007 300387a 14006->14007 14008 30045c0 2 API calls 14007->14008 14009 3003893 14008->14009 14010 30045c0 2 API calls 14009->14010 14011 30038ac 14010->14011 14012 30045c0 2 API calls 14011->14012 14013 30038c5 14012->14013 14014 30045c0 2 API calls 14013->14014 14015 30038de 14014->14015 14016 30045c0 2 API calls 14015->14016 14017 30038f7 14016->14017 14018 30045c0 2 API calls 14017->14018 14019 3003910 14018->14019 14020 30045c0 2 API calls 14019->14020 14021 3003929 14020->14021 14022 30045c0 2 API calls 14021->14022 14023 3003942 14022->14023 14024 30045c0 2 API calls 14023->14024 14025 300395b 14024->14025 14026 30045c0 2 API calls 14025->14026 14027 3003974 14026->14027 14028 30045c0 2 API calls 14027->14028 14029 300398d 14028->14029 14030 30045c0 2 API calls 14029->14030 14031 30039a6 14030->14031 14032 30045c0 2 API calls 14031->14032 14033 30039bf 14032->14033 14034 30045c0 2 API calls 14033->14034 14035 30039d8 14034->14035 14036 30045c0 2 API calls 14035->14036 14037 30039f1 14036->14037 14038 30045c0 2 API calls 14037->14038 14039 3003a0a 14038->14039 14040 30045c0 2 API calls 14039->14040 14041 3003a23 14040->14041 14042 30045c0 2 API calls 14041->14042 14043 3003a3c 14042->14043 14044 30045c0 2 API calls 14043->14044 14045 3003a55 14044->14045 14046 30045c0 2 API calls 14045->14046 14047 3003a6e 14046->14047 14048 30045c0 2 API calls 14047->14048 14049 3003a87 14048->14049 14050 30045c0 2 API calls 14049->14050 14051 3003aa0 14050->14051 14052 30045c0 2 API calls 14051->14052 14053 3003ab9 14052->14053 14054 30045c0 2 API calls 14053->14054 14055 3003ad2 14054->14055 14056 30045c0 2 API calls 14055->14056 14057 3003aeb 14056->14057 14058 30045c0 2 API calls 14057->14058 14059 3003b04 14058->14059 14060 30045c0 2 API calls 14059->14060 14061 3003b1d 14060->14061 14062 30045c0 2 API calls 14061->14062 14063 3003b36 14062->14063 14064 30045c0 2 API calls 14063->14064 14065 3003b4f 14064->14065 14066 30045c0 2 API calls 14065->14066 14067 3003b68 14066->14067 14068 30045c0 2 API calls 14067->14068 14069 3003b81 14068->14069 14070 30045c0 2 API calls 14069->14070 14071 3003b9a 14070->14071 14072 30045c0 2 API calls 14071->14072 14073 3003bb3 14072->14073 14074 30045c0 2 API calls 14073->14074 14075 3003bcc 14074->14075 14076 30045c0 2 API calls 14075->14076 14077 3003be5 14076->14077 14078 30045c0 2 API calls 14077->14078 14079 3003bfe 14078->14079 14080 30045c0 2 API calls 14079->14080 14081 3003c17 14080->14081 14082 30045c0 2 API calls 14081->14082 14083 3003c30 14082->14083 14084 30045c0 2 API calls 14083->14084 14085 3003c49 14084->14085 14086 30045c0 2 API calls 14085->14086 14087 3003c62 14086->14087 14088 30045c0 2 API calls 14087->14088 14089 3003c7b 14088->14089 14090 30045c0 2 API calls 14089->14090 14091 3003c94 14090->14091 14092 30045c0 2 API calls 14091->14092 14093 3003cad 14092->14093 14094 30045c0 2 API calls 14093->14094 14095 3003cc6 14094->14095 14096 30045c0 2 API calls 14095->14096 14097 3003cdf 14096->14097 14098 30045c0 2 API calls 14097->14098 14099 3003cf8 14098->14099 14100 30045c0 2 API calls 14099->14100 14101 3003d11 14100->14101 14102 30045c0 2 API calls 14101->14102 14103 3003d2a 14102->14103 14104 30045c0 2 API calls 14103->14104 14105 3003d43 14104->14105 14106 30045c0 2 API calls 14105->14106 14107 3003d5c 14106->14107 14108 30045c0 2 API calls 14107->14108 14109 3003d75 14108->14109 14110 30045c0 2 API calls 14109->14110 14111 3003d8e 14110->14111 14112 30045c0 2 API calls 14111->14112 14113 3003da7 14112->14113 14114 30045c0 2 API calls 14113->14114 14115 3003dc0 14114->14115 14116 30045c0 2 API calls 14115->14116 14117 3003dd9 14116->14117 14118 30045c0 2 API calls 14117->14118 14119 3003df2 14118->14119 14120 30045c0 2 API calls 14119->14120 14121 3003e0b 14120->14121 14122 30045c0 2 API calls 14121->14122 14123 3003e24 14122->14123 14124 30045c0 2 API calls 14123->14124 14125 3003e3d 14124->14125 14126 30045c0 2 API calls 14125->14126 14127 3003e56 14126->14127 14128 30045c0 2 API calls 14127->14128 14129 3003e6f 14128->14129 14130 30045c0 2 API calls 14129->14130 14131 3003e88 14130->14131 14132 30045c0 2 API calls 14131->14132 14133 3003ea1 14132->14133 14134 30045c0 2 API calls 14133->14134 14135 3003eba 14134->14135 14136 30045c0 2 API calls 14135->14136 14137 3003ed3 14136->14137 14138 30045c0 2 API calls 14137->14138 14139 3003eec 14138->14139 14140 30045c0 2 API calls 14139->14140 14141 3003f05 14140->14141 14142 30045c0 2 API calls 14141->14142 14143 3003f1e 14142->14143 14144 30045c0 2 API calls 14143->14144 14145 3003f37 14144->14145 14146 30045c0 2 API calls 14145->14146 14147 3003f50 14146->14147 14148 30045c0 2 API calls 14147->14148 14149 3003f69 14148->14149 14150 30045c0 2 API calls 14149->14150 14151 3003f82 14150->14151 14152 30045c0 2 API calls 14151->14152 14153 3003f9b 14152->14153 14154 30045c0 2 API calls 14153->14154 14155 3003fb4 14154->14155 14156 30045c0 2 API calls 14155->14156 14157 3003fcd 14156->14157 14158 30045c0 2 API calls 14157->14158 14159 3003fe6 14158->14159 14160 30045c0 2 API calls 14159->14160 14161 3003fff 14160->14161 14162 30045c0 2 API calls 14161->14162 14163 3004018 14162->14163 14164 30045c0 2 API calls 14163->14164 14165 3004031 14164->14165 14166 30045c0 2 API calls 14165->14166 14167 300404a 14166->14167 14168 30045c0 2 API calls 14167->14168 14169 3004063 14168->14169 14170 30045c0 2 API calls 14169->14170 14171 300407c 14170->14171 14172 30045c0 2 API calls 14171->14172 14173 3004095 14172->14173 14174 30045c0 2 API calls 14173->14174 14175 30040ae 14174->14175 14176 30045c0 2 API calls 14175->14176 14177 30040c7 14176->14177 14178 30045c0 2 API calls 14177->14178 14179 30040e0 14178->14179 14180 30045c0 2 API calls 14179->14180 14181 30040f9 14180->14181 14182 30045c0 2 API calls 14181->14182 14183 3004112 14182->14183 14184 30045c0 2 API calls 14183->14184 14185 300412b 14184->14185 14186 30045c0 2 API calls 14185->14186 14187 3004144 14186->14187 14188 30045c0 2 API calls 14187->14188 14189 300415d 14188->14189 14190 30045c0 2 API calls 14189->14190 14191 3004176 14190->14191 14192 30045c0 2 API calls 14191->14192 14193 300418f 14192->14193 14194 30045c0 2 API calls 14193->14194 14195 30041a8 14194->14195 14196 30045c0 2 API calls 14195->14196 14197 30041c1 14196->14197 14198 30045c0 2 API calls 14197->14198 14199 30041da 14198->14199 14200 30045c0 2 API calls 14199->14200 14201 30041f3 14200->14201 14202 30045c0 2 API calls 14201->14202 14203 300420c 14202->14203 14204 30045c0 2 API calls 14203->14204 14205 3004225 14204->14205 14206 30045c0 2 API calls 14205->14206 14207 300423e 14206->14207 14208 30045c0 2 API calls 14207->14208 14209 3004257 14208->14209 14210 30045c0 2 API calls 14209->14210 14211 3004270 14210->14211 14212 30045c0 2 API calls 14211->14212 14213 3004289 14212->14213 14214 30045c0 2 API calls 14213->14214 14215 30042a2 14214->14215 14216 30045c0 2 API calls 14215->14216 14217 30042bb 14216->14217 14218 30045c0 2 API calls 14217->14218 14219 30042d4 14218->14219 14220 30045c0 2 API calls 14219->14220 14221 30042ed 14220->14221 14222 30045c0 2 API calls 14221->14222 14223 3004306 14222->14223 14224 30045c0 2 API calls 14223->14224 14225 300431f 14224->14225 14226 30045c0 2 API calls 14225->14226 14227 3004338 14226->14227 14228 30045c0 2 API calls 14227->14228 14229 3004351 14228->14229 14230 30045c0 2 API calls 14229->14230 14231 300436a 14230->14231 14232 30045c0 2 API calls 14231->14232 14233 3004383 14232->14233 14234 30045c0 2 API calls 14233->14234 14235 300439c 14234->14235 14236 30045c0 2 API calls 14235->14236 14237 30043b5 14236->14237 14238 30045c0 2 API calls 14237->14238 14239 30043ce 14238->14239 14240 30045c0 2 API calls 14239->14240 14241 30043e7 14240->14241 14242 30045c0 2 API calls 14241->14242 14243 3004400 14242->14243 14244 30045c0 2 API calls 14243->14244 14245 3004419 14244->14245 14246 30045c0 2 API calls 14245->14246 14247 3004432 14246->14247 14248 30045c0 2 API calls 14247->14248 14249 300444b 14248->14249 14250 30045c0 2 API calls 14249->14250 14251 3004464 14250->14251 14252 30045c0 2 API calls 14251->14252 14253 300447d 14252->14253 14254 30045c0 2 API calls 14253->14254 14255 3004496 14254->14255 14256 30045c0 2 API calls 14255->14256 14257 30044af 14256->14257 14258 30045c0 2 API calls 14257->14258 14259 30044c8 14258->14259 14260 30045c0 2 API calls 14259->14260 14261 30044e1 14260->14261 14262 30045c0 2 API calls 14261->14262 14263 30044fa 14262->14263 14264 30045c0 2 API calls 14263->14264 14265 3004513 14264->14265 14266 30045c0 2 API calls 14265->14266 14267 300452c 14266->14267 14268 30045c0 2 API calls 14267->14268 14269 3004545 14268->14269 14270 30045c0 2 API calls 14269->14270 14271 300455e 14270->14271 14272 30045c0 2 API calls 14271->14272 14273 3004577 14272->14273 14274 30045c0 2 API calls 14273->14274 14275 3004590 14274->14275 14276 30045c0 2 API calls 14275->14276 14277 30045a9 14276->14277 14278 3019c10 14277->14278 14279 301a036 8 API calls 14278->14279 14281 3019c20 14278->14281 14280 301a0cc 14279->14280 14280->13574 14281->14279 14284 3015521 14282->14284 14283 30152c0 InternetCrackUrlA InternetOpenA InternetConnectA HttpSendRequestA 14283->14284 14284->14283 14285 30151f0 InternetCrackUrlA InternetOpenA InternetConnectA HttpSendRequestA 14284->14285 14286 30157dc 14284->14286 14285->14284 14286->13576 14288 3017548 GetVolumeInformationA 14287->14288 14290 3017591 14288->14290 14290->13578 14292 3004899 14291->14292 14422 30047b0 14292->14422 14294 30048a5 ctype 14294->13580 14296 3005979 14295->14296 14297 30047b0 InternetCrackUrlA 14296->14297 14298 3005985 ctype 14297->14298 14298->13582 14300 3011a26 14299->14300 14301 3017500 GetVolumeInformationA 14300->14301 14302 3011b96 14301->14302 14426 3017690 14302->14426 14304 3011c1e 14305 3017850 GetUserNameA 14304->14305 14306 3011d14 14305->14306 14307 30178e0 GetComputerNameA 14306->14307 14308 3011d8e 14307->14308 14433 3017a30 14308->14433 14310 3011e84 14437 3017b90 14310->14437 14312 3011f80 14441 3019470 14312->14441 14314 3012091 14445 3017e00 14314->14445 14316 3012119 14450 3017ed0 GetSystemInfo 14316->14450 14318 301220f 14452 3018100 14318->14452 14320 3012289 14456 3018320 14320->14456 14322 30124d3 14323 3018320 6 API calls 14322->14323 14324 3012568 14323->14324 14469 3018680 14324->14469 14326 3012620 14476 3015190 14326->14476 14328 3012699 14328->13588 14330 3004fd0 RtlAllocateHeap 14329->14330 14332 3004ff0 14330->14332 14331 3005070 KiUserExceptionDispatcher 14331->14332 14332->14331 14333 30050a0 14332->14333 14333->13590 14335 3010759 14334->14335 14336 3010a38 14335->14336 14339 301077d 14335->14339 14514 3010250 14336->14514 14338 3010a4e 14338->13592 14344 3010843 14339->14344 14494 300fb00 14339->14494 14341 3010a2d 14341->13592 14342 301096b 14342->14341 14506 3010030 14342->14506 14344->14342 14500 300fd60 14344->14500 14348 3001e8f 14346->14348 14347 3001f37 14621 3001310 14347->14621 14348->14347 14617 30016d0 14348->14617 14350 3001f4d 14350->13596 14353 3013dcf 14352->14353 14354 3013e18 14353->14354 14625 3013c90 14353->14625 14354->13604 14357 3013587 14356->14357 14358 30136eb 14357->14358 14634 3012e30 14357->14634 14358->13604 14361 30140da ctype 14360->14361 14643 3013ea0 14361->14643 14363 3014185 14364 3013ea0 InternetCrackUrlA 14363->14364 14365 30141af 14364->14365 14366 3013ea0 InternetCrackUrlA 14365->14366 14367 30141d9 14366->14367 14368 3013ea0 InternetCrackUrlA 14367->14368 14369 3014203 14368->14369 14370 3013ea0 InternetCrackUrlA 14369->14370 14371 301422d 14370->14371 14372 3013ea0 InternetCrackUrlA 14371->14372 14373 3014257 ctype 14372->14373 14373->13609 14375 3015113 14374->14375 14376 3015190 InternetCrackUrlA 14375->14376 14377 3015163 14376->14377 14377->13607 14379 301479a ctype 14378->14379 14381 30148af ctype 14379->14381 14647 3014570 14379->14647 14381->13608 14383 3014bca ctype 14382->14383 14651 3014910 14383->14651 14385 3014c3d 14386 3014910 InternetCrackUrlA 14385->14386 14387 3014c72 14386->14387 14388 3014910 InternetCrackUrlA 14387->14388 14389 3014ca8 14388->14389 14390 3014910 InternetCrackUrlA 14389->14390 14391 3014cdd 14390->14391 14392 3014910 InternetCrackUrlA 14391->14392 14393 3014d13 14392->14393 14394 3014910 InternetCrackUrlA 14393->14394 14395 3014d48 ctype 14394->14395 14395->13612 14397 3014d8d 14396->14397 14398 3014910 InternetCrackUrlA 14397->14398 14399 3014dff 14398->14399 14400 3014910 InternetCrackUrlA 14399->14400 14401 3014e8b 14400->14401 14402 3014910 InternetCrackUrlA 14401->14402 14403 3014f17 14402->14403 14403->13614 14405 3014f5a ctype 14404->14405 14406 3014910 InternetCrackUrlA 14405->14406 14407 3014ff3 14406->14407 14408 3014910 InternetCrackUrlA 14407->14408 14409 3015028 ctype 14408->14409 14409->13616 14411 300771d ctype 14410->14411 14412 3015190 InternetCrackUrlA 14411->14412 14413 3007e77 ctype 14411->14413 14412->14413 14413->13620 14415 301506a ctype 14414->14415 14416 3014910 InternetCrackUrlA 14415->14416 14417 30150dd ctype 14416->14417 14417->13621 14419 3019027 ctype 14418->14419 14420 3015190 InternetCrackUrlA 14419->14420 14421 301904d 14419->14421 14420->14421 14421->13618 14423 30047c6 14422->14423 14424 3004848 InternetCrackUrlA 14423->14424 14425 3004867 14424->14425 14425->14294 14427 30176aa 14426->14427 14480 30177a0 14427->14480 14430 30176c6 RegOpenKeyExA 14431 30176bd 14430->14431 14432 30176e7 RegQueryValueExA 14430->14432 14431->14304 14432->14431 14434 3017a69 GetTimeZoneInformation 14433->14434 14436 3017a92 14434->14436 14436->14310 14439 3017bcc 14437->14439 14438 3017c46 GetLocaleInfoA 14438->14439 14439->14438 14440 3017d18 14439->14440 14440->14312 14442 301948a 14441->14442 14443 3019493 K32GetModuleFileNameExA 14442->14443 14444 30194b5 14442->14444 14443->14444 14444->14314 14446 3017e3d RegOpenKeyExA 14445->14446 14448 3017e87 14446->14448 14449 3017e68 RegQueryValueExA 14446->14449 14448->14316 14449->14448 14451 3017f1c 14450->14451 14451->14318 14453 3018136 14452->14453 14454 301814d GlobalMemoryStatusEx 14453->14454 14455 3018163 __aulldiv 14454->14455 14455->14320 14488 301a740 14456->14488 14458 301835c RegOpenKeyExA 14459 30183d0 14458->14459 14465 30183ae 14458->14465 14460 30183f8 RegEnumKeyExA 14459->14460 14459->14465 14461 301843f RegOpenKeyExA 14460->14461 14460->14465 14463 30184c1 RegQueryValueExA 14461->14463 14461->14465 14464 3018601 RegCloseKey 14463->14464 14466 30184fa 14463->14466 14464->14465 14465->14322 14466->14464 14467 301856e RegQueryValueExA 14466->14467 14467->14464 14468 30185a3 14467->14468 14468->14464 14470 301a740 14469->14470 14471 30186bc CreateToolhelp32Snapshot Process32First 14470->14471 14472 30186e8 Process32Next 14471->14472 14473 301875d CloseHandle 14471->14473 14472->14473 14475 30186fd 14472->14475 14474 3018776 14473->14474 14474->14326 14475->14472 14477 30151b5 14476->14477 14490 3005100 14477->14490 14479 30151cf 14479->14328 14483 3017720 14480->14483 14482 30176b9 14482->14430 14482->14431 14484 301773a RegOpenKeyExA 14483->14484 14486 3017765 RegQueryValueExA 14484->14486 14487 3017780 14484->14487 14486->14487 14487->14482 14489 301a750 14488->14489 14489->14458 14491 3005119 14490->14491 14492 30047b0 InternetCrackUrlA 14491->14492 14493 3005125 ctype 14492->14493 14493->14479 14495 300fb16 14494->14495 14518 300be70 14495->14518 14497 300fc9a 14529 300ec30 14497->14529 14499 300fd0c 14499->14344 14501 300fd76 14500->14501 14502 300be70 InternetCrackUrlA 14501->14502 14503 300ff61 14502->14503 14504 300ec30 InternetCrackUrlA 14503->14504 14505 300ffd3 14504->14505 14505->14342 14507 3010046 14506->14507 14509 301021e 14507->14509 14557 30126c0 14507->14557 14509->14341 14510 3010138 14510->14509 14571 300da80 14510->14571 14512 301019f 14579 300f6b0 14512->14579 14515 3010266 14514->14515 14516 30106c4 14515->14516 14517 3015190 InternetCrackUrlA 14515->14517 14516->14338 14517->14516 14520 300be86 14518->14520 14519 300bf04 14519->14497 14520->14519 14522 300be70 InternetCrackUrlA 14520->14522 14523 300a790 InternetCrackUrlA 14520->14523 14526 3015190 InternetCrackUrlA 14520->14526 14533 300a260 14520->14533 14537 300aef0 14520->14537 14541 300b4f0 14520->14541 14545 300ba80 14520->14545 14549 300b230 14520->14549 14522->14520 14523->14520 14526->14520 14531 300ec3f 14529->14531 14530 300ecf9 14530->14499 14531->14530 14553 300e430 14531->14553 14534 300a276 14533->14534 14535 300a6f7 14534->14535 14536 3015190 InternetCrackUrlA 14534->14536 14535->14520 14536->14535 14538 300af06 14537->14538 14539 3015190 InternetCrackUrlA 14538->14539 14540 300b1b9 14538->14540 14539->14540 14540->14520 14542 300b506 14541->14542 14543 300ba11 14542->14543 14544 3015190 InternetCrackUrlA 14542->14544 14543->14520 14544->14543 14548 300ba96 14545->14548 14546 3015190 InternetCrackUrlA 14547 300bdf4 14546->14547 14547->14520 14548->14546 14548->14547 14550 300b246 14549->14550 14551 3015190 InternetCrackUrlA 14550->14551 14552 300b47d 14550->14552 14551->14552 14552->14520 14555 300e44d 14553->14555 14554 300e4b1 14554->14531 14555->14554 14556 300de10 InternetCrackUrlA 14555->14556 14556->14555 14558 30126d6 14557->14558 14570 3012c1b 14557->14570 14584 30060a0 14558->14584 14560 3012b61 14561 30060a0 InternetCrackUrlA 14560->14561 14562 3012b88 14561->14562 14563 30060a0 InternetCrackUrlA 14562->14563 14564 3012bac 14563->14564 14565 30060a0 InternetCrackUrlA 14564->14565 14566 3012bd3 14565->14566 14567 30060a0 InternetCrackUrlA 14566->14567 14568 3012bf7 14567->14568 14569 30060a0 InternetCrackUrlA 14568->14569 14569->14570 14570->14510 14573 300da96 14571->14573 14572 300dafa 14572->14512 14573->14572 14578 300da80 InternetCrackUrlA 14573->14578 14588 300cef0 14573->14588 14592 300d400 14573->14592 14596 300c990 14573->14596 14600 300d780 14573->14600 14578->14573 14581 300f6c6 14579->14581 14580 300f72d 14580->14509 14581->14580 14582 300f6b0 InternetCrackUrlA 14581->14582 14604 300f4a0 14581->14604 14582->14581 14585 30060b9 14584->14585 14586 30047b0 InternetCrackUrlA 14585->14586 14587 30060c5 ctype 14586->14587 14587->14560 14589 300cf06 14588->14589 14590 300d36f 14589->14590 14591 3015190 InternetCrackUrlA 14589->14591 14590->14573 14591->14590 14593 300d416 14592->14593 14594 300d6e7 14593->14594 14595 3015190 InternetCrackUrlA 14593->14595 14594->14573 14595->14594 14599 300c9a4 14596->14599 14597 3015190 InternetCrackUrlA 14598 300ce7f 14597->14598 14598->14573 14599->14597 14599->14598 14602 300d796 14600->14602 14601 300d9ee 14601->14573 14602->14601 14603 3015190 InternetCrackUrlA 14602->14603 14603->14601 14606 300f4bf 14604->14606 14605 300f653 14605->14581 14606->14605 14608 300f300 14606->14608 14609 300f313 14608->14609 14611 300f43c 14609->14611 14612 300ed20 14609->14612 14611->14605 14614 300ed31 14612->14614 14613 300ed6a 14613->14611 14614->14613 14615 3015190 InternetCrackUrlA 14614->14615 14616 300ed20 InternetCrackUrlA 14614->14616 14615->14614 14616->14614 14618 30016e6 ctype 14617->14618 14619 3001932 14618->14619 14620 3015190 InternetCrackUrlA 14618->14620 14619->14348 14620->14618 14622 300132d 14621->14622 14623 3015190 InternetCrackUrlA 14622->14623 14624 30014d2 14622->14624 14623->14624 14624->14350 14626 3013caa 14625->14626 14627 3013d32 ctype 14626->14627 14629 30138b0 14626->14629 14627->14353 14632 30138d2 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z ctype 14629->14632 14630 3013909 14630->14626 14631 30138b0 InternetCrackUrlA 14631->14632 14632->14630 14632->14631 14633 3015190 InternetCrackUrlA 14632->14633 14633->14632 14635 3012e46 14634->14635 14636 30131e5 14635->14636 14637 3013047 14635->14637 14638 301315a 14635->14638 14639 3013398 14635->14639 14642 30060a0 InternetCrackUrlA 14636->14642 14641 30060a0 InternetCrackUrlA 14637->14641 14638->14357 14640 30060a0 InternetCrackUrlA 14639->14640 14640->14638 14641->14638 14642->14638 14644 3013ec9 ctype 14643->14644 14645 3013eef ctype 14644->14645 14646 3015190 InternetCrackUrlA 14644->14646 14645->14363 14646->14644 14649 3014586 ctype 14647->14649 14648 30145d2 ctype 14648->14381 14649->14648 14650 3015190 InternetCrackUrlA 14649->14650 14650->14648 14653 3014932 ctype 14651->14653 14652 3014958 14652->14385 14653->14652 14654 3014910 InternetCrackUrlA 14653->14654 14655 3015190 InternetCrackUrlA 14653->14655 14654->14653 14655->14653 14656 3016af3 14657 3016ab1 14656->14657 14658 3016ad9 14657->14658 14660 3016aff Sleep 14657->14660 14659 3015b10 40 API calls 14658->14659 14661 3016b16 14659->14661 14660->14657 14662 3010765 14663 301076e 14662->14663 14664 3010a38 14663->14664 14667 301077d 14663->14667 14665 3010250 InternetCrackUrlA 14664->14665 14666 3010a4e 14665->14666 14668 300fb00 InternetCrackUrlA 14667->14668 14671 3010843 14667->14671 14668->14671 14669 3010a2d 14670 3010030 InternetCrackUrlA 14670->14669 14672 300fd60 InternetCrackUrlA 14671->14672 14673 301096b 14671->14673 14672->14673 14673->14669 14673->14670 14674 3013bdb 14677 3013916 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z ctype 14674->14677 14675 3013baa 14676 30138b0 InternetCrackUrlA 14676->14677 14677->14675 14677->14676 14678 3015190 InternetCrackUrlA 14677->14678 14678->14677 14679 30183dc 14680 30183eb 14679->14680 14681 30183f8 RegEnumKeyExA 14680->14681 14686 3018485 14680->14686 14682 301843f RegOpenKeyExA 14681->14682 14681->14686 14684 30184c1 RegQueryValueExA 14682->14684 14682->14686 14685 3018601 RegCloseKey 14684->14685 14687 30184fa 14684->14687 14685->14686 14687->14685 14688 301856e RegQueryValueExA 14687->14688 14688->14685 14689 30185a3 14688->14689 14689->14685
                                                    APIs
                                                    • GetLocaleInfoA.KERNELBASE(?,00000002,?,00000200), ref: 03017C62
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 340312ccfc71ec4f54423e031f95974c664b4c5f282b2d1bdab97239308211a3
                                                    • Instruction ID: 576e995357c97a6c95f9a08c79d703fb1d4270a681076a742fd4fae8217ca5e7
                                                    • Opcode Fuzzy Hash: 340312ccfc71ec4f54423e031f95974c664b4c5f282b2d1bdab97239308211a3
                                                    • Instruction Fuzzy Hash: AD413D75942218ABDB24DB94EC98FEEB7B8FB44710F1041D9E00966180DB746F96CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 3019c10-3019c1a 1 3019c20-301a031 0->1 2 301a036-301a0ca LoadLibraryA * 8 0->2 1->2 3 301a146-301a14d 2->3 4 301a0cc-301a141 2->4 6 301a153-301a211 3->6 7 301a216-301a21d 3->7 4->3 6->7 8 301a298-301a29f 7->8 9 301a21f-301a293 7->9 12 301a2a5-301a332 8->12 13 301a337-301a33e 8->13 9->8 12->13 17 301a344-301a41a 13->17 18 301a41f-301a426 13->18 17->18 21 301a4a2-301a4a9 18->21 22 301a428-301a49d 18->22 26 301a4ab-301a4d7 21->26 27 301a4dc-301a4e3 21->27 22->21 26->27 29 301a515-301a51c 27->29 30 301a4e5-301a510 27->30 35 301a612-301a619 29->35 36 301a522-301a60d 29->36 30->29 46 301a61b-301a678 35->46 47 301a67d-301a684 35->47 36->35 46->47 49 301a686-301a699 47->49 50 301a69e-301a6a5 47->50 49->50 56 301a6a7-301a703 50->56 57 301a708-301a709 50->57 56->57
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A03D
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A04E
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A060
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A072
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A083
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A095
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A0A7
                                                    • LoadLibraryA.KERNELBASE(?,?,03015CA3,?,00000034,00000064,03016600,?,0000002C,00000064,030165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0301A0B8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 35b3f4558264589b7a6332e0c426950a34baf5fc7b6dd9b03ac8420b76eb69c7
                                                    • Instruction ID: 1fa9f6cd11fe135e133a047c1b2faa795dcac146f6700dc2c6bd4c35e516f75f
                                                    • Opcode Fuzzy Hash: 35b3f4558264589b7a6332e0c426950a34baf5fc7b6dd9b03ac8420b76eb69c7
                                                    • Instruction Fuzzy Hash: 3F62F9BD6C1240AFD764FFA8FA8C96A3BF9F78C601714C51AA60AC724CD7399441DB60

                                                    Control-flow Graph

                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000,030205B6), ref: 030183A4
                                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 03018426
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0301847B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Open$Enum
                                                    • String ID: ?
                                                    • API String ID: 462099255-1684325040
                                                    • Opcode ID: 2a08078269c94bfcf3d6cea6767f4bce768cda416974f5eb5f2a568c4e522cd7
                                                    • Instruction ID: 5a60551030d21f3e5abb70d81e41107d10900eafa3caff6d0fcf847f66569c57
                                                    • Opcode Fuzzy Hash: 2a08078269c94bfcf3d6cea6767f4bce768cda416974f5eb5f2a568c4e522cd7
                                                    • Instruction Fuzzy Hash: 84810B759522189BEB24EB50DD94FEEB7B8FB48710F00C699E109A6140DF716B85CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 188 3017500-301754a 190 3017553-30175c7 GetVolumeInformationA call 3018d00 * 3 188->190 191 301754c 188->191 198 30175d8-30175df 190->198 191->190 199 30175e1-30175fa call 3018d00 198->199 200 30175fc-3017617 198->200 199->198 206 3017619-3017626 call 301a740 200->206 207 3017628-3017658 call 301a740 200->207 212 301767e-301768e 206->212 207->212
                                                    APIs
                                                    • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0301757F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InformationVolume
                                                    • String ID: :$C$\
                                                    • API String ID: 2039140958-3809124531
                                                    • Opcode ID: 6d0c35c832915b3ff0150f4c67616605f653501574f7d31594df16de58377466
                                                    • Instruction ID: d5e11a0a32162399e5e432ab8457d383bd169be3e76c21952bb6af06b6267975
                                                    • Opcode Fuzzy Hash: 6d0c35c832915b3ff0150f4c67616605f653501574f7d31594df16de58377466
                                                    • Instruction Fuzzy Hash: E5419FB5D41348ABDB10DF94DC88BEEBBB8EF48704F004098F5096B280D774AB54CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 214 3018100-3018161 call 30189b0 GlobalMemoryStatusEx 219 3018163-301818b call 301da00 * 2 214->219 220 301818d-3018194 214->220 221 301819b-30181e3 219->221 220->221
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,00000040,00000000), ref: 03018158
                                                    • __aulldiv.LIBCMT ref: 03018172
                                                    • __aulldiv.LIBCMT ref: 03018180
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 2185283323-2766056989
                                                    • Opcode ID: 2e994ac6bd63ddc2e5ab8bd573bb2c5b8cf64ee3dbd9508fcb41441fe6628007
                                                    • Instruction ID: 0bcf428e438c5a2a05856f018c0595376d531cfc3a8b2954185eecd856172946
                                                    • Opcode Fuzzy Hash: 2e994ac6bd63ddc2e5ab8bd573bb2c5b8cf64ee3dbd9508fcb41441fe6628007
                                                    • Instruction Fuzzy Hash: A7211DB1E45318ABDB00DFD8DC49FAEB7B8FB44B14F108609F615BB284D77869008BA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 228 3001220-3001247 call 30189b0 GlobalMemoryStatusEx 231 3001273-300127a 228->231 232 3001249-3001271 call 301da00 * 2 228->232 234 3001281-3001285 231->234 232->234 236 3001287 234->236 237 300129a-300129d 234->237 239 3001292 236->239 240 3001289-3001290 236->240 239->237 240->237 240->239
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0300123E
                                                    • __aulldiv.LIBCMT ref: 03001258
                                                    • __aulldiv.LIBCMT ref: 03001266
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 2185283323-2766056989
                                                    • Opcode ID: b3a73a8c2b7af1265022a38f42300e8ab44da388ab16a7bd56b124f1033f4da4
                                                    • Instruction ID: baf26bd17701a061df941858a3a33e7986d39236a420958ff795dc4b8ff6697d
                                                    • Opcode Fuzzy Hash: b3a73a8c2b7af1265022a38f42300e8ab44da388ab16a7bd56b124f1033f4da4
                                                    • Instruction Fuzzy Hash: 810186B4D86308FBEB14DBD4DC49B9DB778AB44701F248044F705BB1C0D77495518759

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,030205B7), ref: 030186CA
                                                    • Process32First.KERNEL32(?,00000128), ref: 030186DE
                                                    • Process32Next.KERNEL32(?,00000128), ref: 030186F3
                                                    • CloseHandle.KERNELBASE(?), ref: 03018761
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 420147892-0
                                                    • Opcode ID: d46e82e8a8b263fcb84c4bbdc2eca0840060eb0e795f010c190ffcb58f83a81a
                                                    • Instruction ID: f4ba556a425da5481f0e85d2e9cf31cc99e14c8ae152c6d8af0530f58ea83546
                                                    • Opcode Fuzzy Hash: d46e82e8a8b263fcb84c4bbdc2eca0840060eb0e795f010c190ffcb58f83a81a
                                                    • Instruction Fuzzy Hash: 30316076A03218EBCB24EF54DD44FEEB778EF45710F008199E10AAA190DB706B55CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 265 3019860-3019874 call 3019750 268 3019a93-3019af2 LoadLibraryA * 3 265->268 269 301987a-3019a8e call 3019780 265->269 275 3019af4-3019b08 268->275 276 3019b0d-3019b14 268->276 269->268 275->276 277 3019b46-3019b4d 276->277 278 3019b16-3019b41 276->278 280 3019b68-3019b6f 277->280 281 3019b4f-3019b63 277->281 278->277 283 3019b71-3019b84 280->283 284 3019b89-3019b90 280->284 281->280 283->284 288 3019bc1-3019bc2 284->288 289 3019b92-3019bbc 284->289 289->288
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?,?,03016A00), ref: 03019A9A
                                                    • LoadLibraryA.KERNELBASE(?,?,03016A00), ref: 03019AAB
                                                    • LoadLibraryA.KERNELBASE(?,?,03016A00), ref: 03019ACF
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 9e07d61c7e70f4f4af2ec2c2ea1b36cb5d4bbc755d5708e9f1769f98ad0bfdf8
                                                    • Instruction ID: b3777c8c20aa6326018a03b228bb1e06e5f13f5b3c2e82f8e631730eea2eb448
                                                    • Opcode Fuzzy Hash: 9e07d61c7e70f4f4af2ec2c2ea1b36cb5d4bbc755d5708e9f1769f98ad0bfdf8
                                                    • Instruction Fuzzy Hash: 93A11ABE5C52409FE364FFA8FA9CA6A3BF9F748701704C51AE60A8724CD7399441DB50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 312 3006280-300630b call 301a7a0 call 30047b0 call 301a740 InternetOpenA 320 3006314-3006318 312->320 321 300630d 312->321 322 3006509-3006525 call 301a7a0 call 301a800 * 2 320->322 323 300631e-3006342 InternetConnectA 320->323 321->320 340 3006528-300652d 322->340 324 3006348-300634c 323->324 325 30064ff-3006502 323->325 327 300635a 324->327 328 300634e-3006358 324->328 325->322 330 3006364-3006392 327->330 328->330 335 30064f5-30064f8 330->335 336 3006398-300639c 330->336 335->325 338 30063c5-30063fc HttpSendRequestA 336->338 339 300639e-30063be 336->339 341 3006403-3006405 338->341 339->338 342 3006407-3006427 call 301a740 call 301a800 * 2 341->342 343 300642c-300644b call 3018940 341->343 342->340 349 30064c9-30064e9 call 301a740 call 301a800 * 2 343->349 350 300644d-3006454 343->350 349->340 353 3006456-3006480 350->353 354 30064c7-30064ee 350->354 362 3006482-3006489 353->362 363 300648b 353->363 354->335 362->363 365 300648d-30064c5 call 301a9b0 call 301a8a0 call 301a800 362->365 363->354 365->353
                                                    APIs
                                                      • Part of subcall function 030047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 03004849
                                                    • InternetOpenA.WININET(03020DFE,00000001,00000000,00000000,00000000,03020DFB), ref: 030062E1
                                                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 03006335
                                                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 030063D1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Internet$ConnectCrackHttpOpenRequestSend
                                                    • String ID:
                                                    • API String ID: 906070938-0
                                                    • Opcode ID: 9b29e739940def0c11258315aa6f44cbd95f8833da350ecb980a2c5c1b53a60a
                                                    • Instruction ID: cc5a9190e6c4ac4539052ece69fc4329236e1c61bbd9224c0a2cd4250553a100
                                                    • Opcode Fuzzy Hash: 9b29e739940def0c11258315aa6f44cbd95f8833da350ecb980a2c5c1b53a60a
                                                    • Instruction Fuzzy Hash: 8A715375A42318ABEB14EFA0DC48BDE77B5FB44700F108198F5056B5C4DBB56A85CF50

                                                    Control-flow Graph

                                                    APIs
                                                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 03004849
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CrackInternet
                                                    • String ID: <
                                                    • API String ID: 1381609488-4251816714
                                                    • Opcode ID: 991ac4fe407fc565cf514fbb09cfa8b73e4316d71c501f7f69334fda43eb142c
                                                    • Instruction ID: ddc0d8e7b692cc2fb342f6b433e073c622d7563e3de53fba02bf03a407a37dee
                                                    • Opcode Fuzzy Hash: 991ac4fe407fc565cf514fbb09cfa8b73e4316d71c501f7f69334fda43eb142c
                                                    • Instruction Fuzzy Hash: 3F2129B5D01209ABDF14EFA4E949BDD7B74FF44320F108225F925AB280EB706A15CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 386 30045c0-3004695 RtlAllocateHeap 403 30046a0-30046a6 386->403 404 30046ac-300474a 403->404 405 300474f-30047a9 VirtualProtect 403->405 404->403
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,030169FB), ref: 0300460E
                                                    • VirtualProtect.KERNELBASE(?,00000004,00000100,00000000), ref: 0300479C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeapProtectVirtual
                                                    • String ID:
                                                    • API String ID: 1542196881-0
                                                    • Opcode ID: 53c87bae456867156331a3edb8938b9a3b97c281be398898fc5c28919d107860
                                                    • Instruction ID: e66f7728faaf15cb063b2976baa04f85f752e25749840fae687bccd44aeda8c8
                                                    • Opcode Fuzzy Hash: 53c87bae456867156331a3edb8938b9a3b97c281be398898fc5c28919d107860
                                                    • Instruction Fuzzy Hash: 4041FC71643214EFC71EFBE4EC8DA5DBF74AB49706B408040FA269D149C6B8D581DB3A

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 03001160: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,03016A17,03020AEF), ref: 0300116A
                                                      • Part of subcall function 03001110: VirtualAllocExNuma.KERNELBASE(00000000,?,?,03016A1C), ref: 03001132
                                                      • Part of subcall function 03001220: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0300123E
                                                      • Part of subcall function 03001220: __aulldiv.LIBCMT ref: 03001258
                                                      • Part of subcall function 03001220: __aulldiv.LIBCMT ref: 03001266
                                                    • GetUserDefaultLCID.KERNELBASE ref: 03016A26
                                                      • Part of subcall function 03017850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0301789F
                                                      • Part of subcall function 030178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0301792F
                                                    • Sleep.KERNELBASE(00001770), ref: 03016B04
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoMemoryNumaSleepStatusSystemVirtual
                                                    • String ID:
                                                    • API String ID: 1990115934-0
                                                    • Opcode ID: 548191ace84bd1e8d687dcec2d5851cab8c4ab44e8da7b3be0391eed0f464f76
                                                    • Instruction ID: 50c43d4a6b748a13438552e7209e67e1f942a8f8c48e889f0dcc9885f47feda2
                                                    • Opcode Fuzzy Hash: 548191ace84bd1e8d687dcec2d5851cab8c4ab44e8da7b3be0391eed0f464f76
                                                    • Instruction Fuzzy Hash: AF310E79A43308ABDB08FBF0ED55BEE7778AF84750F404518E512AA180DFB06956CBA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 486 3004fb0-300501a RtlAllocateHeap call 301aad0 492 3005021-3005028 486->492 493 30050a0-30050fb call 301a800 492->493 494 300502a-3005051 492->494 497 3005062-300506e 494->497 498 3005070-300509c KiUserExceptionDispatcher 497->498 499 300509e 497->499 501 3005053-300505c 498->501 499->492 501->497
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 03004FD1
                                                    • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 0300508A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateDispatcherExceptionHeapUser
                                                    • String ID:
                                                    • API String ID: 3515689010-0
                                                    • Opcode ID: ace0ffa0fe90d0189e04c56b7f667d348ca0cc9868648b44dcbaf06e090ed57c
                                                    • Instruction ID: 7f00477b429312138b79485dba771c6d5590afd08f0dcb321dd895127e34ca54
                                                    • Opcode Fuzzy Hash: ace0ffa0fe90d0189e04c56b7f667d348ca0cc9868648b44dcbaf06e090ed57c
                                                    • Instruction Fuzzy Hash: DF3116B4A41218ABEB20DF54DD88BDDB7B4FB48704F1081D8FB09A7284D7706AC58F98

                                                    Control-flow Graph

                                                    APIs
                                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 03018426
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0301847B
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400), ref: 030184EC
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,03020B34), ref: 03018599
                                                    • RegCloseKey.KERNELBASE(00000000), ref: 03018608
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: QueryValue$CloseEnumOpen
                                                    • String ID:
                                                    • API String ID: 2041898428-0
                                                    • Opcode ID: 3c1ddab1e1e2fc495b8b75f483d3fbbb7b950b77f480818bd8b03cdfb0cb63c0
                                                    • Instruction ID: 3171f417cebdf3cacdacc63076334654e4a812c6486e47a7bf01df1550f873e7
                                                    • Opcode Fuzzy Hash: 3c1ddab1e1e2fc495b8b75f483d3fbbb7b950b77f480818bd8b03cdfb0cb63c0
                                                    • Instruction Fuzzy Hash: DB210775A5122CABDB64DB54DC84FE9B3B8FB48704F00C5D8A609A6140DF716A85CFD4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 553 3017e00-3017e66 RegOpenKeyExA 556 3017e87-3017e8c 553->556 557 3017e68-3017e85 RegQueryValueExA 553->557 559 3017eb6-3017ec6 556->559 558 3017e8e-3017e9b 557->558 558->559
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?), ref: 03017E5E
                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,000000FF,000000FF), ref: 03017E7F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: d70d6ed18108f476b7397f00f9b0b143f4d25a9867fc9826adcaca58aec8c67b
                                                    • Instruction ID: da56fe5c6bf95f9e3b0675eea83ae9cf83de47cc32a7c9206718051b7a4810a8
                                                    • Opcode Fuzzy Hash: d70d6ed18108f476b7397f00f9b0b143f4d25a9867fc9826adcaca58aec8c67b
                                                    • Instruction Fuzzy Hash: 09115EB5A80209EBD710DF94E94AFBFBBFCFB08B10F108119F615A7284D77458008BA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 561 3017690-30176bb call 30177a0 566 30176c6-30176e5 RegOpenKeyExA 561->566 567 30176bd-30176c2 561->567 569 3017704-301770e 566->569 570 30176e7-30176fe RegQueryValueExA 566->570 568 3017711-3017714 567->568 569->568 570->569
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,00000000), ref: 030176DD
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,000000FF), ref: 030176FE
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: 2cfe81a1bbcb633de7b3cba97630941a00741b67bf408183887777fba70dc298
                                                    • Instruction ID: 8374164d645a88533f95a60ed2dc300c67e27e27cb3530c15864cf5c31c19afc
                                                    • Opcode Fuzzy Hash: 2cfe81a1bbcb633de7b3cba97630941a00741b67bf408183887777fba70dc298
                                                    • Instruction Fuzzy Hash: 6601FFB9A81308BBE710EBE4F94DFAEB7BCEB48B01F108454FA0597284E77499148B50
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,030176B9), ref: 0301775B
                                                    • RegQueryValueExA.KERNELBASE(030176B9,03020AAC,00000000,00000000,?,000000FF), ref: 0301777A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: 658aae03dfb541944ec6bb47c328ce1dffcd115f36223d5b86f2d80427a4e5ac
                                                    • Instruction ID: d4fd76622e5d63bccb7c5e96d10d6359219f996125a92ccac99d5054f04d4292
                                                    • Opcode Fuzzy Hash: 658aae03dfb541944ec6bb47c328ce1dffcd115f36223d5b86f2d80427a4e5ac
                                                    • Instruction Fuzzy Hash: E90144B9A40308BBE710EBE0EC4DFAEB7BCEB48700F008154FA05A7285D77056008F51
                                                    APIs
                                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,00000000,00000000,?,?,00000000,?,03020E10,00000000,?,00000000,00000000,?), ref: 03017A7D
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InformationTimeZone
                                                    • String ID:
                                                    • API String ID: 565725191-0
                                                    • Opcode ID: e3e0fb6b9507e79d8c374bc2d4851707a5349562b7e314bffb4938cc7d5ecf97
                                                    • Instruction ID: 4d75731ba4c3e5244998a2b97a9316662a2d2a58fab45549f14327a322f33224
                                                    • Opcode Fuzzy Hash: e3e0fb6b9507e79d8c374bc2d4851707a5349562b7e314bffb4938cc7d5ecf97
                                                    • Instruction Fuzzy Hash: FC1152B1946228DFEB10DB54EC49FAAB7B8F744711F004795E51693280D7745A44CF51
                                                    APIs
                                                    • GetComputerNameA.KERNEL32(?,00000104), ref: 0301792F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: 784a74a341ab64cfe0fe320cbf0b3b4554d8f9617343160e6682d0fe3fee76f3
                                                    • Instruction ID: dc9a60619341943e14fd79834870d9ef222a7eecd0140238f9518dbf284593d1
                                                    • Opcode Fuzzy Hash: 784a74a341ab64cfe0fe320cbf0b3b4554d8f9617343160e6682d0fe3fee76f3
                                                    • Instruction Fuzzy Hash: 7101A4B1A45208EFD700DF98E949BAFBBFCFB04B21F10425AFA45E3280C37459048BA1
                                                    APIs
                                                    • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0301789F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 7170628863fa0e261dc163437cf8962038cc222a4faf9d27f898f6dc0316a022
                                                    • Instruction ID: 43c1f7c83430484d8ab736c067ceebd3f7b71a7f59eb26d7c35628ad76d9a3d7
                                                    • Opcode Fuzzy Hash: 7170628863fa0e261dc163437cf8962038cc222a4faf9d27f898f6dc0316a022
                                                    • Instruction Fuzzy Hash: 07F04FB5985208EFC710DF98E949BAEBBB8EB04B11F10465AFA15A2680C77415048BA1
                                                    APIs
                                                    • GetSystemInfo.KERNELBASE(03020E2C), ref: 03017F00
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoSystem
                                                    • String ID:
                                                    • API String ID: 31276548-0
                                                    • Opcode ID: ee2d397246628077d00c16b0ca79215db3a5a111e065cfd3548694313971430e
                                                    • Instruction ID: 4f4ff272cdc2142c07cf4ca5f809034abbc4e654df17799356b8b655075a6e7a
                                                    • Opcode Fuzzy Hash: ee2d397246628077d00c16b0ca79215db3a5a111e065cfd3548694313971430e
                                                    • Instruction Fuzzy Hash: 02F0F6B1940218EFCB10DF84EC45FAEF7BCF744A10F004669F51592640D37529048BD0
                                                    APIs
                                                    • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 030194A5
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID:
                                                    • API String ID: 514040917-0
                                                    • Opcode ID: 4fc58b8528ba46fa34305869a35ca3dbe3baaeedbb67c42330990d985e3d7b9c
                                                    • Instruction ID: a4fb889a383ce071cd376f06bed0114efff40c2afdf8008fcb2cad483e353c72
                                                    • Opcode Fuzzy Hash: 4fc58b8528ba46fa34305869a35ca3dbe3baaeedbb67c42330990d985e3d7b9c
                                                    • Instruction Fuzzy Hash: 67F0547994020CFBDB15EF94EC4DFED7778EB08710F008454BA095B180D7B45A85CB90
                                                    APIs
                                                    • VirtualAllocExNuma.KERNELBASE(00000000,?,?,03016A1C), ref: 03001132
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocNumaVirtual
                                                    • String ID:
                                                    • API String ID: 4233825816-0
                                                    • Opcode ID: 802dfad3297e466209cd6a167a078182725109781702f2aadfdc66f8b16dc2b9
                                                    • Instruction ID: ecac5561627ec86e1c40491935c6ee6ccf9c7d731f742486db4842b189af5f5f
                                                    • Opcode Fuzzy Hash: 802dfad3297e466209cd6a167a078182725109781702f2aadfdc66f8b16dc2b9
                                                    • Instruction Fuzzy Hash: F5E0E678985308FBF754BBA5FD0EB4D76B8EF04B05F504054F7097A1C4D7B526009699
                                                    APIs
                                                    • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,03016A17,03020AEF), ref: 0300116A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoSystem
                                                    • String ID:
                                                    • API String ID: 31276548-0
                                                    • Opcode ID: 0bd171d6c86b6a24e0f6f53f1f3e731d0a6bb3589d387311ef86645ed4c6578a
                                                    • Instruction ID: fd86e55cf88d53bfadebec0238851e73bc238aea7f1e4d5073e88d7288cbf616
                                                    • Opcode Fuzzy Hash: 0bd171d6c86b6a24e0f6f53f1f3e731d0a6bb3589d387311ef86645ed4c6578a
                                                    • Instruction Fuzzy Hash: AFD05E78D4030CDBDB14EFE4E94D6DDBB78FB08311F000594E90562340EB306481CAA5
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0300114E,?,?,03016A1C), ref: 030010B3
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: ddea72b1fba015e6116bee463e87dff8438e9dfc578f0fe217d02666f7775e32
                                                    • Instruction ID: 98e9fb7fba78baa96df9cf5ffcdd829a5adb3f6e956d02cd71c7fbdf7f5c3917
                                                    • Opcode Fuzzy Hash: ddea72b1fba015e6116bee463e87dff8438e9dfc578f0fe217d02666f7775e32
                                                    • Instruction Fuzzy Hash: A0F0E275682308BBE714EAA8AD49FAEB7E8E705B15F304448F544E7280D6719F00CAA0
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0301C74E
                                                      • Part of subcall function 0301BF9F: __getptd_noexit.LIBCMT ref: 0301BFA2
                                                      • Part of subcall function 0301BF9F: __amsg_exit.LIBCMT ref: 0301BFAF
                                                    • __getptd.LIBCMT ref: 0301C765
                                                    • __amsg_exit.LIBCMT ref: 0301C773
                                                    • __lock.LIBCMT ref: 0301C783
                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0301C797
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2655410531.0000000003000000.00000040.00000400.00020000.00000000.sdmp, Offset: 03000000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_3000000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                    • String ID:
                                                    • API String ID: 938513278-0
                                                    • Opcode ID: 9ec809c7665464ed317ac8c52ad5f4da0138a64fc0e979b7f78106c3fda5c408
                                                    • Instruction ID: 109331962446417125b812f4b08c54dcc6bdef115245fc072145cd564ae4f165
                                                    • Opcode Fuzzy Hash: 9ec809c7665464ed317ac8c52ad5f4da0138a64fc0e979b7f78106c3fda5c408
                                                    • Instruction Fuzzy Hash: 9FF0F077A837109FE720FBF8540578E33E06F80724F24414CE004AF1C0CFA898608B45

                                                    Execution Graph

                                                    Execution Coverage:19.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:1163
                                                    Total number of Limit Nodes:6
                                                    execution_graph 14674 3193bdb 14677 3193916 moneypunct __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14674->14677 14675 3193baa 14676 31938b0 InternetCrackUrlA 14676->14677 14677->14675 14677->14676 14678 3195190 InternetCrackUrlA 14677->14678 14678->14677 14679 31983dc 14680 31983eb 14679->14680 14681 31983f8 RegEnumKeyExA 14680->14681 14686 3198485 14680->14686 14682 319843f RegOpenKeyExA 14681->14682 14681->14686 14684 31984c1 RegQueryValueExA 14682->14684 14682->14686 14685 3198601 RegCloseKey 14684->14685 14687 31984fa 14684->14687 14685->14686 14687->14685 14688 319856e RegQueryValueExA 14687->14688 14688->14685 14689 31985a3 14688->14689 14689->14685 13432 3181190 13437 31978e0 13432->13437 13434 318119e 13436 31811b7 13434->13436 13441 3197850 13434->13441 13438 3197916 GetComputerNameA 13437->13438 13440 3197939 13438->13440 13440->13434 13442 3197886 GetUserNameA 13441->13442 13444 31978c3 13442->13444 13444->13436 13445 31969f0 13465 3182260 13445->13465 13449 3196a00 13558 3181160 GetSystemInfo 13449->13558 13455 3196a21 13456 3196a26 GetUserDefaultLCID 13455->13456 13457 3197850 GetUserNameA 13456->13457 13458 3196a30 13457->13458 13459 31978e0 GetComputerNameA 13458->13459 13460 3196a43 13459->13460 13462 3196ad9 13460->13462 13463 3196aff Sleep 13460->13463 13569 3195b10 13462->13569 13463->13460 13464 3196b16 13635 31845c0 13465->13635 13467 3182274 13468 31845c0 2 API calls 13467->13468 13469 318228d 13468->13469 13470 31845c0 2 API calls 13469->13470 13471 31822a6 13470->13471 13472 31845c0 2 API calls 13471->13472 13473 31822bf 13472->13473 13474 31845c0 2 API calls 13473->13474 13475 31822d8 13474->13475 13476 31845c0 2 API calls 13475->13476 13477 31822f1 13476->13477 13478 31845c0 2 API calls 13477->13478 13479 318230a 13478->13479 13480 31845c0 2 API calls 13479->13480 13481 3182323 13480->13481 13482 31845c0 2 API calls 13481->13482 13483 318233c 13482->13483 13484 31845c0 2 API calls 13483->13484 13485 3182355 13484->13485 13486 31845c0 2 API calls 13485->13486 13487 318236e 13486->13487 13488 31845c0 2 API calls 13487->13488 13489 3182387 13488->13489 13490 31845c0 2 API calls 13489->13490 13491 31823a0 13490->13491 13492 31845c0 2 API calls 13491->13492 13493 31823b9 13492->13493 13494 31845c0 2 API calls 13493->13494 13495 31823d2 13494->13495 13496 31845c0 2 API calls 13495->13496 13497 31823eb 13496->13497 13498 31845c0 2 API calls 13497->13498 13499 3182404 13498->13499 13500 31845c0 2 API calls 13499->13500 13501 318241d 13500->13501 13502 31845c0 2 API calls 13501->13502 13503 3182436 13502->13503 13504 31845c0 2 API calls 13503->13504 13505 318244f 13504->13505 13506 31845c0 2 API calls 13505->13506 13507 3182468 13506->13507 13508 31845c0 2 API calls 13507->13508 13509 3182481 13508->13509 13510 31845c0 2 API calls 13509->13510 13511 318249a 13510->13511 13512 31845c0 2 API calls 13511->13512 13513 31824b3 13512->13513 13514 31845c0 2 API calls 13513->13514 13515 31824cc 13514->13515 13516 31845c0 2 API calls 13515->13516 13517 31824e5 13516->13517 13518 31845c0 2 API calls 13517->13518 13519 31824fe 13518->13519 13520 31845c0 2 API calls 13519->13520 13521 3182517 13520->13521 13522 31845c0 2 API calls 13521->13522 13523 3182530 13522->13523 13524 31845c0 2 API calls 13523->13524 13525 3182549 13524->13525 13526 31845c0 2 API calls 13525->13526 13527 3182562 13526->13527 13528 31845c0 2 API calls 13527->13528 13529 318257b 13528->13529 13530 31845c0 2 API calls 13529->13530 13531 3182594 13530->13531 13532 31845c0 2 API calls 13531->13532 13533 31825ad 13532->13533 13534 31845c0 2 API calls 13533->13534 13535 31825c6 13534->13535 13536 31845c0 2 API calls 13535->13536 13537 31825df 13536->13537 13538 31845c0 2 API calls 13537->13538 13539 31825f8 13538->13539 13540 31845c0 2 API calls 13539->13540 13541 3182611 13540->13541 13542 31845c0 2 API calls 13541->13542 13543 318262a 13542->13543 13544 31845c0 2 API calls 13543->13544 13545 3182643 13544->13545 13546 31845c0 2 API calls 13545->13546 13547 318265c 13546->13547 13548 31845c0 2 API calls 13547->13548 13549 3182675 13548->13549 13550 31845c0 2 API calls 13549->13550 13551 318268e 13550->13551 13552 3199860 13551->13552 13640 3199750 GetPEB 13552->13640 13554 3199a93 LoadLibraryA LoadLibraryA 13555 3199ac3 LoadLibraryA 13554->13555 13556 3199ae6 13555->13556 13556->13449 13557 3199868 13557->13554 13559 318117c 13558->13559 13560 3181110 13559->13560 13561 3181131 VirtualAllocExNuma 13560->13561 13562 3181141 13561->13562 13641 31810a0 VirtualAlloc 13562->13641 13564 318114e 13565 3181220 13564->13565 13643 31989b0 13565->13643 13568 3181249 __aulldiv 13568->13455 13570 3195b1d 13569->13570 13645 31826a0 13570->13645 13574 3195ca3 14282 3195510 13574->14282 13576 3195cc3 14287 3197500 13576->14287 13578 3195da7 14291 3184880 13578->14291 13580 3195dbe 14295 3185960 13580->14295 13582 3195e03 13583 3185960 InternetCrackUrlA 13582->13583 13584 3195e4c 13583->13584 13585 3185960 InternetCrackUrlA 13584->13585 13586 3195e93 13585->13586 14299 3191a10 13586->14299 13588 3195eba 14329 3184fb0 13588->14329 13590 3195edb 14334 3190740 13590->14334 13592 3195f60 13593 3185960 InternetCrackUrlA 13592->13593 13594 3195fa0 13593->13594 14346 3181e80 13594->14346 13596 3195ff0 13597 3196092 13596->13597 13598 3196000 13596->13598 13599 3185960 InternetCrackUrlA 13597->13599 13600 3185960 InternetCrackUrlA 13598->13600 13601 31960bf 13599->13601 13603 319603a 13600->13603 14356 3193560 13601->14356 14352 3193dc0 13603->14352 13604 319608a 13606 319610b 13604->13606 14360 31940b0 13604->14360 13609 3196130 13606->13609 14378 3194780 13606->14378 13612 3196155 13609->13612 14382 3194bb0 13609->14382 13610 31960ec 14374 3195100 13610->14374 13614 319617a 13612->13614 14396 3194d70 13612->14396 13617 319619f 13614->13617 14404 3194f40 13614->14404 13615 3196210 13624 31962b3 13615->13624 13625 3196220 13615->13625 13619 31961c4 13617->13619 14410 3187710 13617->14410 13622 31961e9 13619->13622 14414 3195050 13619->14414 13622->13615 14418 3199010 13622->14418 13627 3185960 InternetCrackUrlA 13624->13627 13626 3185960 InternetCrackUrlA 13625->13626 13630 319625b 13626->13630 13628 31962e0 13627->13628 13629 3193560 InternetCrackUrlA 13628->13629 13632 31962ab 13629->13632 13631 3193dc0 InternetCrackUrlA 13630->13631 13631->13632 13633 3185960 InternetCrackUrlA 13632->13633 13634 319631c 13633->13634 13634->13464 13636 31845d2 RtlAllocateHeap 13635->13636 13639 3184622 VirtualProtect 13636->13639 13639->13467 13640->13557 13642 31810c2 moneypunct 13641->13642 13642->13564 13644 3181233 GlobalMemoryStatusEx 13643->13644 13644->13568 13646 31845c0 2 API calls 13645->13646 13647 31826b4 13646->13647 13648 31845c0 2 API calls 13647->13648 13649 31826d7 13648->13649 13650 31845c0 2 API calls 13649->13650 13651 31826f0 13650->13651 13652 31845c0 2 API calls 13651->13652 13653 3182709 13652->13653 13654 31845c0 2 API calls 13653->13654 13655 3182736 13654->13655 13656 31845c0 2 API calls 13655->13656 13657 318274f 13656->13657 13658 31845c0 2 API calls 13657->13658 13659 3182768 13658->13659 13660 31845c0 2 API calls 13659->13660 13661 3182795 13660->13661 13662 31845c0 2 API calls 13661->13662 13663 31827ae 13662->13663 13664 31845c0 2 API calls 13663->13664 13665 31827c7 13664->13665 13666 31845c0 2 API calls 13665->13666 13667 31827e0 13666->13667 13668 31845c0 2 API calls 13667->13668 13669 31827f9 13668->13669 13670 31845c0 2 API calls 13669->13670 13671 3182812 13670->13671 13672 31845c0 2 API calls 13671->13672 13673 318282b 13672->13673 13674 31845c0 2 API calls 13673->13674 13675 3182844 13674->13675 13676 31845c0 2 API calls 13675->13676 13677 318285d 13676->13677 13678 31845c0 2 API calls 13677->13678 13679 3182876 13678->13679 13680 31845c0 2 API calls 13679->13680 13681 318288f 13680->13681 13682 31845c0 2 API calls 13681->13682 13683 31828a8 13682->13683 13684 31845c0 2 API calls 13683->13684 13685 31828c1 13684->13685 13686 31845c0 2 API calls 13685->13686 13687 31828da 13686->13687 13688 31845c0 2 API calls 13687->13688 13689 31828f3 13688->13689 13690 31845c0 2 API calls 13689->13690 13691 318290c 13690->13691 13692 31845c0 2 API calls 13691->13692 13693 3182925 13692->13693 13694 31845c0 2 API calls 13693->13694 13695 318293e 13694->13695 13696 31845c0 2 API calls 13695->13696 13697 3182957 13696->13697 13698 31845c0 2 API calls 13697->13698 13699 3182970 13698->13699 13700 31845c0 2 API calls 13699->13700 13701 3182989 13700->13701 13702 31845c0 2 API calls 13701->13702 13703 31829a2 13702->13703 13704 31845c0 2 API calls 13703->13704 13705 31829bb 13704->13705 13706 31845c0 2 API calls 13705->13706 13707 31829d4 13706->13707 13708 31845c0 2 API calls 13707->13708 13709 31829ed 13708->13709 13710 31845c0 2 API calls 13709->13710 13711 3182a06 13710->13711 13712 31845c0 2 API calls 13711->13712 13713 3182a1f 13712->13713 13714 31845c0 2 API calls 13713->13714 13715 3182a38 13714->13715 13716 31845c0 2 API calls 13715->13716 13717 3182a51 13716->13717 13718 31845c0 2 API calls 13717->13718 13719 3182a6a 13718->13719 13720 31845c0 2 API calls 13719->13720 13721 3182a83 13720->13721 13722 31845c0 2 API calls 13721->13722 13723 3182a9c 13722->13723 13724 31845c0 2 API calls 13723->13724 13725 3182ab5 13724->13725 13726 31845c0 2 API calls 13725->13726 13727 3182ace 13726->13727 13728 31845c0 2 API calls 13727->13728 13729 3182ae7 13728->13729 13730 31845c0 2 API calls 13729->13730 13731 3182b00 13730->13731 13732 31845c0 2 API calls 13731->13732 13733 3182b19 13732->13733 13734 31845c0 2 API calls 13733->13734 13735 3182b32 13734->13735 13736 31845c0 2 API calls 13735->13736 13737 3182b4b 13736->13737 13738 31845c0 2 API calls 13737->13738 13739 3182b64 13738->13739 13740 31845c0 2 API calls 13739->13740 13741 3182b7d 13740->13741 13742 31845c0 2 API calls 13741->13742 13743 3182b96 13742->13743 13744 31845c0 2 API calls 13743->13744 13745 3182baf 13744->13745 13746 31845c0 2 API calls 13745->13746 13747 3182bc8 13746->13747 13748 31845c0 2 API calls 13747->13748 13749 3182be1 13748->13749 13750 31845c0 2 API calls 13749->13750 13751 3182bfa 13750->13751 13752 31845c0 2 API calls 13751->13752 13753 3182c13 13752->13753 13754 31845c0 2 API calls 13753->13754 13755 3182c2c 13754->13755 13756 31845c0 2 API calls 13755->13756 13757 3182c45 13756->13757 13758 31845c0 2 API calls 13757->13758 13759 3182c5e 13758->13759 13760 31845c0 2 API calls 13759->13760 13761 3182c77 13760->13761 13762 31845c0 2 API calls 13761->13762 13763 3182c90 13762->13763 13764 31845c0 2 API calls 13763->13764 13765 3182ca9 13764->13765 13766 31845c0 2 API calls 13765->13766 13767 3182cc2 13766->13767 13768 31845c0 2 API calls 13767->13768 13769 3182cdb 13768->13769 13770 31845c0 2 API calls 13769->13770 13771 3182cf4 13770->13771 13772 31845c0 2 API calls 13771->13772 13773 3182d0d 13772->13773 13774 31845c0 2 API calls 13773->13774 13775 3182d26 13774->13775 13776 31845c0 2 API calls 13775->13776 13777 3182d3f 13776->13777 13778 31845c0 2 API calls 13777->13778 13779 3182d58 13778->13779 13780 31845c0 2 API calls 13779->13780 13781 3182d71 13780->13781 13782 31845c0 2 API calls 13781->13782 13783 3182d8a 13782->13783 13784 31845c0 2 API calls 13783->13784 13785 3182da3 13784->13785 13786 31845c0 2 API calls 13785->13786 13787 3182dbc 13786->13787 13788 31845c0 2 API calls 13787->13788 13789 3182dd5 13788->13789 13790 31845c0 2 API calls 13789->13790 13791 3182dee 13790->13791 13792 31845c0 2 API calls 13791->13792 13793 3182e07 13792->13793 13794 31845c0 2 API calls 13793->13794 13795 3182e20 13794->13795 13796 31845c0 2 API calls 13795->13796 13797 3182e39 13796->13797 13798 31845c0 2 API calls 13797->13798 13799 3182e52 13798->13799 13800 31845c0 2 API calls 13799->13800 13801 3182e6b 13800->13801 13802 31845c0 2 API calls 13801->13802 13803 3182e84 13802->13803 13804 31845c0 2 API calls 13803->13804 13805 3182e9d 13804->13805 13806 31845c0 2 API calls 13805->13806 13807 3182eb6 13806->13807 13808 31845c0 2 API calls 13807->13808 13809 3182ecf 13808->13809 13810 31845c0 2 API calls 13809->13810 13811 3182ee8 13810->13811 13812 31845c0 2 API calls 13811->13812 13813 3182f01 13812->13813 13814 31845c0 2 API calls 13813->13814 13815 3182f1a 13814->13815 13816 31845c0 2 API calls 13815->13816 13817 3182f33 13816->13817 13818 31845c0 2 API calls 13817->13818 13819 3182f4c 13818->13819 13820 31845c0 2 API calls 13819->13820 13821 3182f65 13820->13821 13822 31845c0 2 API calls 13821->13822 13823 3182f7e 13822->13823 13824 31845c0 2 API calls 13823->13824 13825 3182f97 13824->13825 13826 31845c0 2 API calls 13825->13826 13827 3182fb0 13826->13827 13828 31845c0 2 API calls 13827->13828 13829 3182fc9 13828->13829 13830 31845c0 2 API calls 13829->13830 13831 3182fe2 13830->13831 13832 31845c0 2 API calls 13831->13832 13833 3182ffb 13832->13833 13834 31845c0 2 API calls 13833->13834 13835 3183014 13834->13835 13836 31845c0 2 API calls 13835->13836 13837 318302d 13836->13837 13838 31845c0 2 API calls 13837->13838 13839 3183046 13838->13839 13840 31845c0 2 API calls 13839->13840 13841 318305f 13840->13841 13842 31845c0 2 API calls 13841->13842 13843 3183078 13842->13843 13844 31845c0 2 API calls 13843->13844 13845 3183091 13844->13845 13846 31845c0 2 API calls 13845->13846 13847 31830aa 13846->13847 13848 31845c0 2 API calls 13847->13848 13849 31830c3 13848->13849 13850 31845c0 2 API calls 13849->13850 13851 31830dc 13850->13851 13852 31845c0 2 API calls 13851->13852 13853 31830f5 13852->13853 13854 31845c0 2 API calls 13853->13854 13855 318310e 13854->13855 13856 31845c0 2 API calls 13855->13856 13857 3183127 13856->13857 13858 31845c0 2 API calls 13857->13858 13859 3183140 13858->13859 13860 31845c0 2 API calls 13859->13860 13861 3183159 13860->13861 13862 31845c0 2 API calls 13861->13862 13863 3183172 13862->13863 13864 31845c0 2 API calls 13863->13864 13865 318318b 13864->13865 13866 31845c0 2 API calls 13865->13866 13867 31831a4 13866->13867 13868 31845c0 2 API calls 13867->13868 13869 31831bd 13868->13869 13870 31845c0 2 API calls 13869->13870 13871 31831d6 13870->13871 13872 31845c0 2 API calls 13871->13872 13873 31831ef 13872->13873 13874 31845c0 2 API calls 13873->13874 13875 3183208 13874->13875 13876 31845c0 2 API calls 13875->13876 13877 3183221 13876->13877 13878 31845c0 2 API calls 13877->13878 13879 318323a 13878->13879 13880 31845c0 2 API calls 13879->13880 13881 3183253 13880->13881 13882 31845c0 2 API calls 13881->13882 13883 318326c 13882->13883 13884 31845c0 2 API calls 13883->13884 13885 3183285 13884->13885 13886 31845c0 2 API calls 13885->13886 13887 318329e 13886->13887 13888 31845c0 2 API calls 13887->13888 13889 31832b7 13888->13889 13890 31845c0 2 API calls 13889->13890 13891 31832d0 13890->13891 13892 31845c0 2 API calls 13891->13892 13893 31832e9 13892->13893 13894 31845c0 2 API calls 13893->13894 13895 3183302 13894->13895 13896 31845c0 2 API calls 13895->13896 13897 318331b 13896->13897 13898 31845c0 2 API calls 13897->13898 13899 3183334 13898->13899 13900 31845c0 2 API calls 13899->13900 13901 318334d 13900->13901 13902 31845c0 2 API calls 13901->13902 13903 3183366 13902->13903 13904 31845c0 2 API calls 13903->13904 13905 318337f 13904->13905 13906 31845c0 2 API calls 13905->13906 13907 3183398 13906->13907 13908 31845c0 2 API calls 13907->13908 13909 31833b1 13908->13909 13910 31845c0 2 API calls 13909->13910 13911 31833ca 13910->13911 13912 31845c0 2 API calls 13911->13912 13913 31833e3 13912->13913 13914 31845c0 2 API calls 13913->13914 13915 31833fc 13914->13915 13916 31845c0 2 API calls 13915->13916 13917 3183415 13916->13917 13918 31845c0 2 API calls 13917->13918 13919 318342e 13918->13919 13920 31845c0 2 API calls 13919->13920 13921 3183447 13920->13921 13922 31845c0 2 API calls 13921->13922 13923 3183460 13922->13923 13924 31845c0 2 API calls 13923->13924 13925 3183479 13924->13925 13926 31845c0 2 API calls 13925->13926 13927 3183492 13926->13927 13928 31845c0 2 API calls 13927->13928 13929 31834ab 13928->13929 13930 31845c0 2 API calls 13929->13930 13931 31834c4 13930->13931 13932 31845c0 2 API calls 13931->13932 13933 31834dd 13932->13933 13934 31845c0 2 API calls 13933->13934 13935 31834f6 13934->13935 13936 31845c0 2 API calls 13935->13936 13937 318350f 13936->13937 13938 31845c0 2 API calls 13937->13938 13939 3183528 13938->13939 13940 31845c0 2 API calls 13939->13940 13941 3183541 13940->13941 13942 31845c0 2 API calls 13941->13942 13943 318355a 13942->13943 13944 31845c0 2 API calls 13943->13944 13945 3183573 13944->13945 13946 31845c0 2 API calls 13945->13946 13947 318358c 13946->13947 13948 31845c0 2 API calls 13947->13948 13949 31835a5 13948->13949 13950 31845c0 2 API calls 13949->13950 13951 31835be 13950->13951 13952 31845c0 2 API calls 13951->13952 13953 31835d7 13952->13953 13954 31845c0 2 API calls 13953->13954 13955 31835f0 13954->13955 13956 31845c0 2 API calls 13955->13956 13957 3183609 13956->13957 13958 31845c0 2 API calls 13957->13958 13959 3183622 13958->13959 13960 31845c0 2 API calls 13959->13960 13961 318363b 13960->13961 13962 31845c0 2 API calls 13961->13962 13963 3183654 13962->13963 13964 31845c0 2 API calls 13963->13964 13965 318366d 13964->13965 13966 31845c0 2 API calls 13965->13966 13967 3183686 13966->13967 13968 31845c0 2 API calls 13967->13968 13969 318369f 13968->13969 13970 31845c0 2 API calls 13969->13970 13971 31836b8 13970->13971 13972 31845c0 2 API calls 13971->13972 13973 31836d1 13972->13973 13974 31845c0 2 API calls 13973->13974 13975 31836ea 13974->13975 13976 31845c0 2 API calls 13975->13976 13977 3183703 13976->13977 13978 31845c0 2 API calls 13977->13978 13979 318371c 13978->13979 13980 31845c0 2 API calls 13979->13980 13981 3183735 13980->13981 13982 31845c0 2 API calls 13981->13982 13983 318374e 13982->13983 13984 31845c0 2 API calls 13983->13984 13985 3183767 13984->13985 13986 31845c0 2 API calls 13985->13986 13987 3183780 13986->13987 13988 31845c0 2 API calls 13987->13988 13989 3183799 13988->13989 13990 31845c0 2 API calls 13989->13990 13991 31837b2 13990->13991 13992 31845c0 2 API calls 13991->13992 13993 31837cb 13992->13993 13994 31845c0 2 API calls 13993->13994 13995 31837e4 13994->13995 13996 31845c0 2 API calls 13995->13996 13997 31837fd 13996->13997 13998 31845c0 2 API calls 13997->13998 13999 3183816 13998->13999 14000 31845c0 2 API calls 13999->14000 14001 318382f 14000->14001 14002 31845c0 2 API calls 14001->14002 14003 3183848 14002->14003 14004 31845c0 2 API calls 14003->14004 14005 3183861 14004->14005 14006 31845c0 2 API calls 14005->14006 14007 318387a 14006->14007 14008 31845c0 2 API calls 14007->14008 14009 3183893 14008->14009 14010 31845c0 2 API calls 14009->14010 14011 31838ac 14010->14011 14012 31845c0 2 API calls 14011->14012 14013 31838c5 14012->14013 14014 31845c0 2 API calls 14013->14014 14015 31838de 14014->14015 14016 31845c0 2 API calls 14015->14016 14017 31838f7 14016->14017 14018 31845c0 2 API calls 14017->14018 14019 3183910 14018->14019 14020 31845c0 2 API calls 14019->14020 14021 3183929 14020->14021 14022 31845c0 2 API calls 14021->14022 14023 3183942 14022->14023 14024 31845c0 2 API calls 14023->14024 14025 318395b 14024->14025 14026 31845c0 2 API calls 14025->14026 14027 3183974 14026->14027 14028 31845c0 2 API calls 14027->14028 14029 318398d 14028->14029 14030 31845c0 2 API calls 14029->14030 14031 31839a6 14030->14031 14032 31845c0 2 API calls 14031->14032 14033 31839bf 14032->14033 14034 31845c0 2 API calls 14033->14034 14035 31839d8 14034->14035 14036 31845c0 2 API calls 14035->14036 14037 31839f1 14036->14037 14038 31845c0 2 API calls 14037->14038 14039 3183a0a 14038->14039 14040 31845c0 2 API calls 14039->14040 14041 3183a23 14040->14041 14042 31845c0 2 API calls 14041->14042 14043 3183a3c 14042->14043 14044 31845c0 2 API calls 14043->14044 14045 3183a55 14044->14045 14046 31845c0 2 API calls 14045->14046 14047 3183a6e 14046->14047 14048 31845c0 2 API calls 14047->14048 14049 3183a87 14048->14049 14050 31845c0 2 API calls 14049->14050 14051 3183aa0 14050->14051 14052 31845c0 2 API calls 14051->14052 14053 3183ab9 14052->14053 14054 31845c0 2 API calls 14053->14054 14055 3183ad2 14054->14055 14056 31845c0 2 API calls 14055->14056 14057 3183aeb 14056->14057 14058 31845c0 2 API calls 14057->14058 14059 3183b04 14058->14059 14060 31845c0 2 API calls 14059->14060 14061 3183b1d 14060->14061 14062 31845c0 2 API calls 14061->14062 14063 3183b36 14062->14063 14064 31845c0 2 API calls 14063->14064 14065 3183b4f 14064->14065 14066 31845c0 2 API calls 14065->14066 14067 3183b68 14066->14067 14068 31845c0 2 API calls 14067->14068 14069 3183b81 14068->14069 14070 31845c0 2 API calls 14069->14070 14071 3183b9a 14070->14071 14072 31845c0 2 API calls 14071->14072 14073 3183bb3 14072->14073 14074 31845c0 2 API calls 14073->14074 14075 3183bcc 14074->14075 14076 31845c0 2 API calls 14075->14076 14077 3183be5 14076->14077 14078 31845c0 2 API calls 14077->14078 14079 3183bfe 14078->14079 14080 31845c0 2 API calls 14079->14080 14081 3183c17 14080->14081 14082 31845c0 2 API calls 14081->14082 14083 3183c30 14082->14083 14084 31845c0 2 API calls 14083->14084 14085 3183c49 14084->14085 14086 31845c0 2 API calls 14085->14086 14087 3183c62 14086->14087 14088 31845c0 2 API calls 14087->14088 14089 3183c7b 14088->14089 14090 31845c0 2 API calls 14089->14090 14091 3183c94 14090->14091 14092 31845c0 2 API calls 14091->14092 14093 3183cad 14092->14093 14094 31845c0 2 API calls 14093->14094 14095 3183cc6 14094->14095 14096 31845c0 2 API calls 14095->14096 14097 3183cdf 14096->14097 14098 31845c0 2 API calls 14097->14098 14099 3183cf8 14098->14099 14100 31845c0 2 API calls 14099->14100 14101 3183d11 14100->14101 14102 31845c0 2 API calls 14101->14102 14103 3183d2a 14102->14103 14104 31845c0 2 API calls 14103->14104 14105 3183d43 14104->14105 14106 31845c0 2 API calls 14105->14106 14107 3183d5c 14106->14107 14108 31845c0 2 API calls 14107->14108 14109 3183d75 14108->14109 14110 31845c0 2 API calls 14109->14110 14111 3183d8e 14110->14111 14112 31845c0 2 API calls 14111->14112 14113 3183da7 14112->14113 14114 31845c0 2 API calls 14113->14114 14115 3183dc0 14114->14115 14116 31845c0 2 API calls 14115->14116 14117 3183dd9 14116->14117 14118 31845c0 2 API calls 14117->14118 14119 3183df2 14118->14119 14120 31845c0 2 API calls 14119->14120 14121 3183e0b 14120->14121 14122 31845c0 2 API calls 14121->14122 14123 3183e24 14122->14123 14124 31845c0 2 API calls 14123->14124 14125 3183e3d 14124->14125 14126 31845c0 2 API calls 14125->14126 14127 3183e56 14126->14127 14128 31845c0 2 API calls 14127->14128 14129 3183e6f 14128->14129 14130 31845c0 2 API calls 14129->14130 14131 3183e88 14130->14131 14132 31845c0 2 API calls 14131->14132 14133 3183ea1 14132->14133 14134 31845c0 2 API calls 14133->14134 14135 3183eba 14134->14135 14136 31845c0 2 API calls 14135->14136 14137 3183ed3 14136->14137 14138 31845c0 2 API calls 14137->14138 14139 3183eec 14138->14139 14140 31845c0 2 API calls 14139->14140 14141 3183f05 14140->14141 14142 31845c0 2 API calls 14141->14142 14143 3183f1e 14142->14143 14144 31845c0 2 API calls 14143->14144 14145 3183f37 14144->14145 14146 31845c0 2 API calls 14145->14146 14147 3183f50 14146->14147 14148 31845c0 2 API calls 14147->14148 14149 3183f69 14148->14149 14150 31845c0 2 API calls 14149->14150 14151 3183f82 14150->14151 14152 31845c0 2 API calls 14151->14152 14153 3183f9b 14152->14153 14154 31845c0 2 API calls 14153->14154 14155 3183fb4 14154->14155 14156 31845c0 2 API calls 14155->14156 14157 3183fcd 14156->14157 14158 31845c0 2 API calls 14157->14158 14159 3183fe6 14158->14159 14160 31845c0 2 API calls 14159->14160 14161 3183fff 14160->14161 14162 31845c0 2 API calls 14161->14162 14163 3184018 14162->14163 14164 31845c0 2 API calls 14163->14164 14165 3184031 14164->14165 14166 31845c0 2 API calls 14165->14166 14167 318404a 14166->14167 14168 31845c0 2 API calls 14167->14168 14169 3184063 14168->14169 14170 31845c0 2 API calls 14169->14170 14171 318407c 14170->14171 14172 31845c0 2 API calls 14171->14172 14173 3184095 14172->14173 14174 31845c0 2 API calls 14173->14174 14175 31840ae 14174->14175 14176 31845c0 2 API calls 14175->14176 14177 31840c7 14176->14177 14178 31845c0 2 API calls 14177->14178 14179 31840e0 14178->14179 14180 31845c0 2 API calls 14179->14180 14181 31840f9 14180->14181 14182 31845c0 2 API calls 14181->14182 14183 3184112 14182->14183 14184 31845c0 2 API calls 14183->14184 14185 318412b 14184->14185 14186 31845c0 2 API calls 14185->14186 14187 3184144 14186->14187 14188 31845c0 2 API calls 14187->14188 14189 318415d 14188->14189 14190 31845c0 2 API calls 14189->14190 14191 3184176 14190->14191 14192 31845c0 2 API calls 14191->14192 14193 318418f 14192->14193 14194 31845c0 2 API calls 14193->14194 14195 31841a8 14194->14195 14196 31845c0 2 API calls 14195->14196 14197 31841c1 14196->14197 14198 31845c0 2 API calls 14197->14198 14199 31841da 14198->14199 14200 31845c0 2 API calls 14199->14200 14201 31841f3 14200->14201 14202 31845c0 2 API calls 14201->14202 14203 318420c 14202->14203 14204 31845c0 2 API calls 14203->14204 14205 3184225 14204->14205 14206 31845c0 2 API calls 14205->14206 14207 318423e 14206->14207 14208 31845c0 2 API calls 14207->14208 14209 3184257 14208->14209 14210 31845c0 2 API calls 14209->14210 14211 3184270 14210->14211 14212 31845c0 2 API calls 14211->14212 14213 3184289 14212->14213 14214 31845c0 2 API calls 14213->14214 14215 31842a2 14214->14215 14216 31845c0 2 API calls 14215->14216 14217 31842bb 14216->14217 14218 31845c0 2 API calls 14217->14218 14219 31842d4 14218->14219 14220 31845c0 2 API calls 14219->14220 14221 31842ed 14220->14221 14222 31845c0 2 API calls 14221->14222 14223 3184306 14222->14223 14224 31845c0 2 API calls 14223->14224 14225 318431f 14224->14225 14226 31845c0 2 API calls 14225->14226 14227 3184338 14226->14227 14228 31845c0 2 API calls 14227->14228 14229 3184351 14228->14229 14230 31845c0 2 API calls 14229->14230 14231 318436a 14230->14231 14232 31845c0 2 API calls 14231->14232 14233 3184383 14232->14233 14234 31845c0 2 API calls 14233->14234 14235 318439c 14234->14235 14236 31845c0 2 API calls 14235->14236 14237 31843b5 14236->14237 14238 31845c0 2 API calls 14237->14238 14239 31843ce 14238->14239 14240 31845c0 2 API calls 14239->14240 14241 31843e7 14240->14241 14242 31845c0 2 API calls 14241->14242 14243 3184400 14242->14243 14244 31845c0 2 API calls 14243->14244 14245 3184419 14244->14245 14246 31845c0 2 API calls 14245->14246 14247 3184432 14246->14247 14248 31845c0 2 API calls 14247->14248 14249 318444b 14248->14249 14250 31845c0 2 API calls 14249->14250 14251 3184464 14250->14251 14252 31845c0 2 API calls 14251->14252 14253 318447d 14252->14253 14254 31845c0 2 API calls 14253->14254 14255 3184496 14254->14255 14256 31845c0 2 API calls 14255->14256 14257 31844af 14256->14257 14258 31845c0 2 API calls 14257->14258 14259 31844c8 14258->14259 14260 31845c0 2 API calls 14259->14260 14261 31844e1 14260->14261 14262 31845c0 2 API calls 14261->14262 14263 31844fa 14262->14263 14264 31845c0 2 API calls 14263->14264 14265 3184513 14264->14265 14266 31845c0 2 API calls 14265->14266 14267 318452c 14266->14267 14268 31845c0 2 API calls 14267->14268 14269 3184545 14268->14269 14270 31845c0 2 API calls 14269->14270 14271 318455e 14270->14271 14272 31845c0 2 API calls 14271->14272 14273 3184577 14272->14273 14274 31845c0 2 API calls 14273->14274 14275 3184590 14274->14275 14276 31845c0 2 API calls 14275->14276 14277 31845a9 14276->14277 14278 3199c10 14277->14278 14279 319a036 8 API calls 14278->14279 14281 3199c20 14278->14281 14280 319a0cc 14279->14280 14280->13574 14281->14279 14285 3195521 14282->14285 14283 31952c0 InternetCrackUrlA InternetOpenA InternetConnectA HttpSendRequestA 14283->14285 14284 31957dc 14284->13576 14285->14283 14285->14284 14286 31951f0 InternetCrackUrlA InternetOpenA InternetConnectA HttpSendRequestA 14285->14286 14286->14285 14288 3197548 GetVolumeInformationA 14287->14288 14290 3197591 14288->14290 14290->13578 14292 3184899 14291->14292 14422 31847b0 14292->14422 14294 31848a5 moneypunct 14294->13580 14296 3185979 14295->14296 14297 31847b0 InternetCrackUrlA 14296->14297 14298 3185985 moneypunct 14297->14298 14298->13582 14300 3191a26 14299->14300 14301 3197500 GetVolumeInformationA 14300->14301 14302 3191b96 14301->14302 14426 3197690 14302->14426 14304 3191c1e 14305 3197850 GetUserNameA 14304->14305 14306 3191d14 14305->14306 14307 31978e0 GetComputerNameA 14306->14307 14308 3191d8e 14307->14308 14433 3197a30 14308->14433 14310 3191e84 14437 3197b90 14310->14437 14312 3191f80 14441 3199470 14312->14441 14314 3192091 14445 3197e00 14314->14445 14316 3192119 14450 3197ed0 GetSystemInfo 14316->14450 14318 319220f 14452 3198100 14318->14452 14320 3192289 14456 3198320 14320->14456 14322 31924d3 14323 3198320 6 API calls 14322->14323 14324 3192568 14323->14324 14469 3198680 14324->14469 14326 3192620 14476 3195190 14326->14476 14328 3192699 14328->13588 14330 3184fd0 RtlAllocateHeap 14329->14330 14331 3184ff0 14330->14331 14332 3185070 KiUserExceptionDispatcher 14331->14332 14333 31850a0 14331->14333 14332->14331 14333->13590 14335 3190759 14334->14335 14336 3190a38 14335->14336 14339 319077d 14335->14339 14514 3190250 14336->14514 14338 3190a4e 14338->13592 14344 3190843 14339->14344 14494 318fb00 14339->14494 14341 3190a2d 14341->13592 14342 319096b 14342->14341 14506 3190030 14342->14506 14344->14342 14500 318fd60 14344->14500 14350 3181e8f 14346->14350 14347 3181f37 14621 3181310 14347->14621 14349 3181f4d 14349->13596 14350->14347 14617 31816d0 14350->14617 14354 3193dcf 14352->14354 14353 3193e18 14353->13604 14354->14353 14625 3193c90 14354->14625 14357 3193587 14356->14357 14358 31936eb 14357->14358 14634 3192e30 14357->14634 14358->13604 14361 31940da moneypunct 14360->14361 14643 3193ea0 14361->14643 14363 3194185 14364 3193ea0 InternetCrackUrlA 14363->14364 14365 31941af 14364->14365 14366 3193ea0 InternetCrackUrlA 14365->14366 14367 31941d9 14366->14367 14368 3193ea0 InternetCrackUrlA 14367->14368 14369 3194203 14368->14369 14370 3193ea0 InternetCrackUrlA 14369->14370 14371 319422d 14370->14371 14372 3193ea0 InternetCrackUrlA 14371->14372 14373 3194257 moneypunct 14372->14373 14373->13610 14375 3195113 14374->14375 14376 3195190 InternetCrackUrlA 14375->14376 14377 3195163 14376->14377 14377->13606 14379 319479a moneypunct 14378->14379 14381 31948af moneypunct 14379->14381 14647 3194570 14379->14647 14381->13609 14383 3194bca moneypunct 14382->14383 14651 3194910 14383->14651 14385 3194c3d 14386 3194910 InternetCrackUrlA 14385->14386 14387 3194c72 14386->14387 14388 3194910 InternetCrackUrlA 14387->14388 14389 3194ca8 14388->14389 14390 3194910 InternetCrackUrlA 14389->14390 14391 3194cdd 14390->14391 14392 3194910 InternetCrackUrlA 14391->14392 14393 3194d13 14392->14393 14394 3194910 InternetCrackUrlA 14393->14394 14395 3194d48 moneypunct 14394->14395 14395->13612 14397 3194d8d 14396->14397 14398 3194910 InternetCrackUrlA 14397->14398 14399 3194dff 14398->14399 14400 3194910 InternetCrackUrlA 14399->14400 14401 3194e8b 14400->14401 14402 3194910 InternetCrackUrlA 14401->14402 14403 3194f17 14402->14403 14403->13614 14405 3194f5a moneypunct 14404->14405 14406 3194910 InternetCrackUrlA 14405->14406 14407 3194ff3 14406->14407 14408 3194910 InternetCrackUrlA 14407->14408 14409 3195028 moneypunct 14408->14409 14409->13617 14411 318771d moneypunct 14410->14411 14412 3195190 InternetCrackUrlA 14411->14412 14413 3187e77 moneypunct 14411->14413 14412->14413 14413->13619 14415 319506a moneypunct 14414->14415 14416 3194910 InternetCrackUrlA 14415->14416 14417 31950dd moneypunct 14416->14417 14417->13622 14420 3199027 moneypunct 14418->14420 14419 319904d 14419->13615 14420->14419 14421 3195190 InternetCrackUrlA 14420->14421 14421->14419 14423 31847c6 14422->14423 14424 3184848 InternetCrackUrlA 14423->14424 14425 3184867 14424->14425 14425->14294 14427 31976aa 14426->14427 14480 31977a0 14427->14480 14430 31976c6 RegOpenKeyExA 14431 31976bd 14430->14431 14432 31976e7 RegQueryValueExA 14430->14432 14431->14304 14432->14431 14434 3197a69 GetTimeZoneInformation 14433->14434 14436 3197a92 14434->14436 14436->14310 14440 3197bcc 14437->14440 14438 3197c46 GetLocaleInfoA 14438->14440 14439 3197d18 14439->14312 14440->14438 14440->14439 14442 319948a 14441->14442 14443 3199493 K32GetModuleFileNameExA 14442->14443 14444 31994b5 14442->14444 14443->14444 14444->14314 14446 3197e3d RegOpenKeyExA 14445->14446 14448 3197e68 RegQueryValueExA 14446->14448 14449 3197e87 14446->14449 14448->14449 14449->14316 14451 3197f1c 14450->14451 14451->14318 14453 3198136 14452->14453 14454 319814d GlobalMemoryStatusEx 14453->14454 14455 3198163 __aulldiv 14454->14455 14455->14320 14488 319a740 14456->14488 14458 319835c RegOpenKeyExA 14459 31983d0 14458->14459 14465 31983ae 14458->14465 14460 31983f8 RegEnumKeyExA 14459->14460 14459->14465 14461 319843f RegOpenKeyExA 14460->14461 14460->14465 14463 31984c1 RegQueryValueExA 14461->14463 14461->14465 14464 3198601 RegCloseKey 14463->14464 14466 31984fa 14463->14466 14464->14465 14465->14322 14466->14464 14467 319856e RegQueryValueExA 14466->14467 14467->14464 14468 31985a3 14467->14468 14468->14464 14470 319a740 14469->14470 14471 31986bc CreateToolhelp32Snapshot Process32First 14470->14471 14472 31986e8 Process32Next 14471->14472 14473 319875d CloseHandle 14471->14473 14472->14473 14475 31986fd 14472->14475 14474 3198776 14473->14474 14474->14326 14475->14472 14477 31951b5 14476->14477 14490 3185100 14477->14490 14479 31951cf 14479->14328 14483 3197720 14480->14483 14482 31976b9 14482->14430 14482->14431 14484 319773a RegOpenKeyExA 14483->14484 14486 3197765 RegQueryValueExA 14484->14486 14487 3197780 14484->14487 14486->14487 14487->14482 14489 319a750 14488->14489 14489->14458 14491 3185119 14490->14491 14492 31847b0 InternetCrackUrlA 14491->14492 14493 3185125 moneypunct 14492->14493 14493->14479 14495 318fb16 14494->14495 14518 318be70 14495->14518 14497 318fc9a 14529 318ec30 14497->14529 14499 318fd0c 14499->14344 14501 318fd76 14500->14501 14502 318be70 InternetCrackUrlA 14501->14502 14503 318ff61 14502->14503 14504 318ec30 InternetCrackUrlA 14503->14504 14505 318ffd3 14504->14505 14505->14342 14507 3190046 14506->14507 14509 319021e 14507->14509 14557 31926c0 14507->14557 14509->14341 14510 3190138 14510->14509 14571 318da80 14510->14571 14512 319019f 14579 318f6b0 14512->14579 14517 3190266 14514->14517 14515 31906c4 14515->14338 14516 3195190 InternetCrackUrlA 14516->14515 14517->14515 14517->14516 14520 318be86 14518->14520 14519 318bf04 14519->14497 14520->14519 14522 318a790 InternetCrackUrlA 14520->14522 14523 318be70 InternetCrackUrlA 14520->14523 14525 3195190 InternetCrackUrlA 14520->14525 14533 318a260 14520->14533 14537 318aef0 14520->14537 14541 318b4f0 14520->14541 14545 318ba80 14520->14545 14549 318b230 14520->14549 14522->14520 14523->14520 14525->14520 14532 318ec3f 14529->14532 14530 318ecf9 14530->14499 14532->14530 14553 318e430 14532->14553 14534 318a276 14533->14534 14535 318a6f7 14534->14535 14536 3195190 InternetCrackUrlA 14534->14536 14535->14520 14536->14535 14540 318af06 14537->14540 14538 3195190 InternetCrackUrlA 14539 318b1b9 14538->14539 14539->14520 14540->14538 14540->14539 14544 318b506 14541->14544 14542 3195190 InternetCrackUrlA 14543 318ba11 14542->14543 14543->14520 14544->14542 14544->14543 14548 318ba96 14545->14548 14546 3195190 InternetCrackUrlA 14547 318bdf4 14546->14547 14547->14520 14548->14546 14548->14547 14550 318b246 14549->14550 14551 318b47d 14550->14551 14552 3195190 InternetCrackUrlA 14550->14552 14551->14520 14552->14551 14555 318e44d 14553->14555 14554 318e4b1 14554->14532 14555->14554 14556 318de10 InternetCrackUrlA 14555->14556 14556->14555 14558 31926d6 14557->14558 14570 3192c1b 14557->14570 14584 31860a0 14558->14584 14560 3192b61 14561 31860a0 InternetCrackUrlA 14560->14561 14562 3192b88 14561->14562 14563 31860a0 InternetCrackUrlA 14562->14563 14564 3192bac 14563->14564 14565 31860a0 InternetCrackUrlA 14564->14565 14566 3192bd3 14565->14566 14567 31860a0 InternetCrackUrlA 14566->14567 14568 3192bf7 14567->14568 14569 31860a0 InternetCrackUrlA 14568->14569 14569->14570 14570->14510 14572 318da96 14571->14572 14573 318dafa 14572->14573 14578 318da80 InternetCrackUrlA 14572->14578 14588 318cef0 14572->14588 14592 318d400 14572->14592 14596 318c990 14572->14596 14600 318d780 14572->14600 14573->14512 14578->14572 14582 318f6c6 14579->14582 14580 318f72d 14580->14509 14581 318f6b0 InternetCrackUrlA 14581->14582 14582->14580 14582->14581 14604 318f4a0 14582->14604 14585 31860b9 14584->14585 14586 31847b0 InternetCrackUrlA 14585->14586 14587 31860c5 moneypunct 14586->14587 14587->14560 14589 318cf06 14588->14589 14590 318d36f 14589->14590 14591 3195190 InternetCrackUrlA 14589->14591 14590->14572 14591->14590 14595 318d416 14592->14595 14593 318d6e7 14593->14572 14594 3195190 InternetCrackUrlA 14594->14593 14595->14593 14595->14594 14599 318c9a4 14596->14599 14597 318ce7f 14597->14572 14598 3195190 InternetCrackUrlA 14598->14597 14599->14597 14599->14598 14602 318d796 14600->14602 14601 318d9ee 14601->14572 14602->14601 14603 3195190 InternetCrackUrlA 14602->14603 14603->14601 14606 318f4bf 14604->14606 14605 318f653 14605->14582 14606->14605 14608 318f300 14606->14608 14609 318f313 14608->14609 14611 318f43c 14609->14611 14612 318ed20 14609->14612 14611->14605 14614 318ed31 14612->14614 14613 318ed6a 14613->14611 14614->14613 14615 3195190 InternetCrackUrlA 14614->14615 14616 318ed20 InternetCrackUrlA 14614->14616 14615->14614 14616->14614 14619 31816e6 moneypunct 14617->14619 14618 3181932 14618->14350 14619->14618 14620 3195190 InternetCrackUrlA 14619->14620 14620->14619 14622 318132d 14621->14622 14623 3195190 InternetCrackUrlA 14622->14623 14624 31814d2 14622->14624 14623->14624 14624->14349 14626 3193caa 14625->14626 14628 3193d32 moneypunct 14626->14628 14629 31938b0 14626->14629 14628->14354 14631 31938d2 moneypunct __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14629->14631 14630 3193909 14630->14626 14631->14630 14632 31938b0 InternetCrackUrlA 14631->14632 14633 3195190 InternetCrackUrlA 14631->14633 14632->14631 14633->14631 14635 3192e46 14634->14635 14636 319315a 14635->14636 14637 3193398 14635->14637 14639 31931e5 14635->14639 14640 3193047 14635->14640 14636->14357 14638 31860a0 InternetCrackUrlA 14637->14638 14638->14636 14641 31860a0 InternetCrackUrlA 14639->14641 14642 31860a0 InternetCrackUrlA 14640->14642 14641->14636 14642->14636 14645 3193ec9 moneypunct 14643->14645 14644 3193eef moneypunct 14644->14363 14645->14644 14646 3195190 InternetCrackUrlA 14645->14646 14646->14645 14649 3194586 moneypunct 14647->14649 14648 31945d2 moneypunct 14648->14381 14649->14648 14650 3195190 InternetCrackUrlA 14649->14650 14650->14648 14654 3194932 moneypunct 14651->14654 14652 3194958 14652->14385 14653 3194910 InternetCrackUrlA 14653->14654 14654->14652 14654->14653 14655 3195190 InternetCrackUrlA 14654->14655 14655->14654 14656 3196af3 14657 3196ab1 14656->14657 14658 3196ad9 14657->14658 14660 3196aff Sleep 14657->14660 14659 3195b10 40 API calls 14658->14659 14661 3196b16 14659->14661 14660->14657 14662 3190765 14663 319076e 14662->14663 14664 3190a38 14663->14664 14667 319077d 14663->14667 14665 3190250 InternetCrackUrlA 14664->14665 14666 3190a4e 14665->14666 14668 318fb00 InternetCrackUrlA 14667->14668 14672 3190843 14667->14672 14668->14672 14669 3190a2d 14670 319096b 14670->14669 14671 3190030 InternetCrackUrlA 14670->14671 14671->14669 14672->14670 14673 318fd60 InternetCrackUrlA 14672->14673 14673->14670
                                                    APIs
                                                    • GetLocaleInfoA.KERNELBASE(?,00000002,?,00000200), ref: 03197C62
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 197df7a1ea7ca13079d964ab4362b006bd7ae55af18a0a6e83c715f5c1846b5e
                                                    • Instruction ID: 59b1a0372aee4d5e45ce97d2423e0160a5172b8d7a8733a5d5d962c192000562
                                                    • Opcode Fuzzy Hash: 197df7a1ea7ca13079d964ab4362b006bd7ae55af18a0a6e83c715f5c1846b5e
                                                    • Instruction Fuzzy Hash: 89413C75950218ABEF24DB94DC98BEEB7B8FF48701F5041DAE00966180DB346F89CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 3199c10-3199c1a 1 3199c20-319a031 0->1 2 319a036-319a0ca LoadLibraryA * 8 0->2 1->2 3 319a0cc-319a141 2->3 4 319a146-319a14d 2->4 3->4 6 319a153-319a211 4->6 7 319a216-319a21d 4->7 6->7 8 319a298-319a29f 7->8 9 319a21f-319a293 7->9 11 319a2a5-319a332 8->11 12 319a337-319a33e 8->12 9->8 11->12 15 319a41f-319a426 12->15 16 319a344-319a41a 12->16 19 319a428-319a49d 15->19 20 319a4a2-319a4a9 15->20 16->15 19->20 24 319a4ab-319a4d7 20->24 25 319a4dc-319a4e3 20->25 24->25 29 319a515-319a51c 25->29 30 319a4e5-319a510 25->30 38 319a612-319a619 29->38 39 319a522-319a60d 29->39 30->29 41 319a61b-319a678 38->41 42 319a67d-319a684 38->42 39->38 41->42 51 319a69e-319a6a5 42->51 52 319a686-319a699 42->52 55 319a708-319a709 51->55 56 319a6a7-319a703 51->56 52->51 56->55
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A03D
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A04E
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A060
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A072
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A083
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A095
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A0A7
                                                    • LoadLibraryA.KERNELBASE(?,?,03195CA3,?,00000034,00000064,03196600,?,0000002C,00000064,031965A0,?,00000030,00000064,Function_00015AD0,?), ref: 0319A0B8
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: d9740c5cf27f5f3c9be43b683bd5fb0386f7d401136714d810cf3fff9c313d2a
                                                    • Instruction ID: 61d22691fe8d52311e94164383e3e4dcb553aa4e27a8afead5d70da87b54c4fa
                                                    • Opcode Fuzzy Hash: d9740c5cf27f5f3c9be43b683bd5fb0386f7d401136714d810cf3fff9c313d2a
                                                    • Instruction Fuzzy Hash: D562F9B6520208AFD744FFA8E9D89663BFDF78C702F14851AB609C324CDA39B851DB54

                                                    Control-flow Graph

                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000,031A05B6), ref: 031983A4
                                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 03198426
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0319847B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Open$Enum
                                                    • String ID: ?
                                                    • API String ID: 462099255-1684325040
                                                    • Opcode ID: 6d95b2f35f1b949f156435190ca20865f8595999f161a1ad28d92d9ab6864a2c
                                                    • Instruction ID: 46d8649f85c7a820fff90b490975e29313ed7cfd5bdc7a5ba4edf33e8d081931
                                                    • Opcode Fuzzy Hash: 6d95b2f35f1b949f156435190ca20865f8595999f161a1ad28d92d9ab6864a2c
                                                    • Instruction Fuzzy Hash: F881ED7592021C9BEB28EB54CD95FEAB7BCBF48701F0082D9E109A6140DF756B89CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 188 3197500-319754a 190 319754c 188->190 191 3197553-31975c7 GetVolumeInformationA call 3198d00 * 3 188->191 190->191 198 31975d8-31975df 191->198 199 31975fc-3197617 198->199 200 31975e1-31975fa call 3198d00 198->200 206 3197619-3197626 call 319a740 199->206 207 3197628-3197658 call 319a740 199->207 200->198 212 319767e-319768e 206->212 207->212
                                                    APIs
                                                    • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0319757F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InformationVolume
                                                    • String ID: :$C$\
                                                    • API String ID: 2039140958-3809124531
                                                    • Opcode ID: e00fa41c4ff01edd4f88242fcbb0ba0e162b2bdbc33f6e641d21f394d3f463e4
                                                    • Instruction ID: 2586ef0586b15d784d35ee9648aca4be2b49e133e8a69830f5cf7ef9235336e9
                                                    • Opcode Fuzzy Hash: e00fa41c4ff01edd4f88242fcbb0ba0e162b2bdbc33f6e641d21f394d3f463e4
                                                    • Instruction Fuzzy Hash: 154194B5D10358ABEF10DF94DC85BEEBBB8EF0C704F000199E509AB280D7756A84CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 214 3198100-3198161 call 31989b0 GlobalMemoryStatusEx 219 319818d-3198194 214->219 220 3198163-319818b call 319da00 * 2 214->220 221 319819b-31981e3 219->221 220->221
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,00000040,00000000), ref: 03198158
                                                    • __aulldiv.LIBCMT ref: 03198172
                                                    • __aulldiv.LIBCMT ref: 03198180
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 2185283323-2766056989
                                                    • Opcode ID: 989007267a273c8575987b43778335dfae08703a0cac9f25825c7d2a0a7118b6
                                                    • Instruction ID: 8060b1d21f03210d298361f0978b17b4e9af270bef3a676f16bfa626bf904419
                                                    • Opcode Fuzzy Hash: 989007267a273c8575987b43778335dfae08703a0cac9f25825c7d2a0a7118b6
                                                    • Instruction Fuzzy Hash: 5F213BB1E44308ABEB00DFD4DD49FAEB7B8FB49B01F104119F605BB280C77869008BA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 228 3181220-3181247 call 31989b0 GlobalMemoryStatusEx 231 3181249-3181271 call 319da00 * 2 228->231 232 3181273-318127a 228->232 234 3181281-3181285 231->234 232->234 236 318129a-318129d 234->236 237 3181287 234->237 239 3181289-3181290 237->239 240 3181292 237->240 239->236 239->240 240->236
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0318123E
                                                    • __aulldiv.LIBCMT ref: 03181258
                                                    • __aulldiv.LIBCMT ref: 03181266
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __aulldiv$GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 2185283323-2766056989
                                                    • Opcode ID: 2297d5de4116f02b8d47c405d2184f20356bc5988db09d2743a706fe56b12b91
                                                    • Instruction ID: f4e860dbe8561afb797f760a535edbaaa35722ba5f883e506589e249bca8fe69
                                                    • Opcode Fuzzy Hash: 2297d5de4116f02b8d47c405d2184f20356bc5988db09d2743a706fe56b12b91
                                                    • Instruction Fuzzy Hash: 1A01FBB1D44308BBEF10EBE4DC49B9EBB79AB0C705F248059E605BA280D774A5468B9D

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,031A05B7), ref: 031986CA
                                                    • Process32First.KERNEL32(?,00000128), ref: 031986DE
                                                    • Process32Next.KERNEL32(?,00000128), ref: 031986F3
                                                    • CloseHandle.KERNELBASE(?), ref: 03198761
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 420147892-0
                                                    • Opcode ID: bb758eb9bc775b669406012e7b6f577e74728e46df1a704b0db95855ea32c081
                                                    • Instruction ID: d2f5781430de1f044c384423d005415cb36db3bec09e808369a8e3face9cdeef
                                                    • Opcode Fuzzy Hash: bb758eb9bc775b669406012e7b6f577e74728e46df1a704b0db95855ea32c081
                                                    • Instruction Fuzzy Hash: 3B315E75911218ABDF28EF95DC94FEEB77CFF49701F00419AE10AA6190DB306A49CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 265 3199860-3199874 call 3199750 268 319987a-3199a8e call 3199780 265->268 269 3199a93-3199af2 LoadLibraryA * 3 265->269 268->269 275 3199b0d-3199b14 269->275 276 3199af4-3199b08 269->276 277 3199b46-3199b4d 275->277 278 3199b16-3199b41 275->278 276->275 281 3199b68-3199b6f 277->281 282 3199b4f-3199b63 277->282 278->277 283 3199b89-3199b90 281->283 284 3199b71-3199b84 281->284 282->281 288 3199bc1-3199bc2 283->288 289 3199b92-3199bbc 283->289 284->283 289->288
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?,?,03196A00), ref: 03199A9A
                                                    • LoadLibraryA.KERNELBASE(?,?,03196A00), ref: 03199AAB
                                                    • LoadLibraryA.KERNELBASE(?,?,03196A00), ref: 03199ACF
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 28dd0660db64834f4d80bdd472951e124dad8c28a6277bb2e9b32d5e46230f96
                                                    • Instruction ID: 710e733630aa584e0f8584122193e4ac1e1ac5a6a25e4d58e8cce5df4f774361
                                                    • Opcode Fuzzy Hash: 28dd0660db64834f4d80bdd472951e124dad8c28a6277bb2e9b32d5e46230f96
                                                    • Instruction Fuzzy Hash: 40A108B55202489FD344FBA8F9C8A663BFDF74C302F14851AB6158324CDB39B852DB54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 312 3186280-318630b call 319a7a0 call 31847b0 call 319a740 InternetOpenA 320 318630d 312->320 321 3186314-3186318 312->321 320->321 322 3186509-3186525 call 319a7a0 call 319a800 * 2 321->322 323 318631e-3186342 InternetConnectA 321->323 340 3186528-318652d 322->340 324 3186348-318634c 323->324 325 31864ff-3186502 323->325 327 318635a 324->327 328 318634e-3186358 324->328 325->322 330 3186364-3186392 327->330 328->330 335 3186398-318639c 330->335 336 31864f5-31864f8 330->336 338 318639e-31863be 335->338 339 31863c5-31863fc HttpSendRequestA 335->339 336->325 338->339 341 3186403-3186405 339->341 342 318642c-318644b call 3198940 341->342 343 3186407-3186427 call 319a740 call 319a800 * 2 341->343 348 31864c9-31864e9 call 319a740 call 319a800 * 2 342->348 349 318644d-3186454 342->349 343->340 348->340 352 3186456-3186480 349->352 353 31864c7-31864ee 349->353 362 318648b 352->362 363 3186482-3186489 352->363 353->336 362->353 363->362 365 318648d-31864c5 call 319a9b0 call 319a8a0 call 319a800 363->365 365->352
                                                    APIs
                                                      • Part of subcall function 031847B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 03184849
                                                    • InternetOpenA.WININET(031A0DFE,00000001,00000000,00000000,00000000,031A0DFB), ref: 031862E1
                                                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 03186335
                                                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 031863D1
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Internet$ConnectCrackHttpOpenRequestSend
                                                    • String ID:
                                                    • API String ID: 906070938-0
                                                    • Opcode ID: 774f6448bc9ab2bac47a86613b447205f53d21f2b7ae97cbd678caf5d49bba9a
                                                    • Instruction ID: 6686b654b552a4a4f8bc50c47c490009c8eef3d21a9bfcae67a8578fd449cdef
                                                    • Opcode Fuzzy Hash: 774f6448bc9ab2bac47a86613b447205f53d21f2b7ae97cbd678caf5d49bba9a
                                                    • Instruction Fuzzy Hash: 91715275A10318ABEF14EF94CC49BEEB778BF48701F104199E6096B184DB746A89CF50

                                                    Control-flow Graph

                                                    APIs
                                                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 03184849
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CrackInternet
                                                    • String ID: <
                                                    • API String ID: 1381609488-4251816714
                                                    • Opcode ID: 4fa6c58432d2c69b48a522038071f9cb7a35550f80ab6906d539a845191b8c9b
                                                    • Instruction ID: 5a7e3ae9b849178a858a56ce611dd3ff07464430a23854f24782c928f8d6d992
                                                    • Opcode Fuzzy Hash: 4fa6c58432d2c69b48a522038071f9cb7a35550f80ab6906d539a845191b8c9b
                                                    • Instruction Fuzzy Hash: 80210EB5D00219ABDF14EFA4E845BDD7B74FF44321F108225F915AB280EB706A15CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 386 31845c0-3184695 RtlAllocateHeap 403 31846a0-31846a6 386->403 404 31846ac-318474a 403->404 405 318474f-31847a9 VirtualProtect 403->405 404->403
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,031969FB), ref: 0318460E
                                                    • VirtualProtect.KERNELBASE(?,00000004,00000100,00000000), ref: 0318479C
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeapProtectVirtual
                                                    • String ID:
                                                    • API String ID: 1542196881-0
                                                    • Opcode ID: 157f6698090a99676dcb43f0f2f846eaf06462e09a222e16519fcc68235cb491
                                                    • Instruction ID: 97d9a48e7e0a3748aff9d00d1733dd740506d49265337954b3883b272894806b
                                                    • Opcode Fuzzy Hash: 157f6698090a99676dcb43f0f2f846eaf06462e09a222e16519fcc68235cb491
                                                    • Instruction Fuzzy Hash: 1641C979744604EFC71CFBE8E8CDA5C7B72BB4D603B4A8046F5629910ACBB0D5819B32

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 03181160: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,03196A17,031A0AEF), ref: 0318116A
                                                      • Part of subcall function 03181110: VirtualAllocExNuma.KERNELBASE(00000000,?,?,03196A1C), ref: 03181132
                                                      • Part of subcall function 03181220: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0318123E
                                                      • Part of subcall function 03181220: __aulldiv.LIBCMT ref: 03181258
                                                      • Part of subcall function 03181220: __aulldiv.LIBCMT ref: 03181266
                                                    • GetUserDefaultLCID.KERNELBASE ref: 03196A26
                                                      • Part of subcall function 03197850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0319789F
                                                      • Part of subcall function 031978E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0319792F
                                                    • Sleep.KERNELBASE(00001770), ref: 03196B04
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoMemoryNumaSleepStatusSystemVirtual
                                                    • String ID:
                                                    • API String ID: 1990115934-0
                                                    • Opcode ID: d24fe0a241ebe362e9b51716534f2246f04a7b7ce4e8879049943b8004b75db4
                                                    • Instruction ID: 706771be6f874207d4694c121ce62883b4b30e6ffa012656953c2c1d909ed0b8
                                                    • Opcode Fuzzy Hash: d24fe0a241ebe362e9b51716534f2246f04a7b7ce4e8879049943b8004b75db4
                                                    • Instruction Fuzzy Hash: 2F311A79A50308ABEF04FBF0DC55AEE7778BF0C741F40456AE112AA180EF706909CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 486 3184fb0-318501a RtlAllocateHeap call 319aad0 492 3185021-3185028 486->492 493 318502a-3185051 492->493 494 31850a0-31850fb call 319a800 492->494 497 3185062-318506e 493->497 499 318509e 497->499 500 3185070-318509c KiUserExceptionDispatcher 497->500 499->492 502 3185053-318505c 500->502 502->497
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 03184FD1
                                                    • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 0318508A
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateDispatcherExceptionHeapUser
                                                    • String ID:
                                                    • API String ID: 3515689010-0
                                                    • Opcode ID: c14bfa4dc583be234af3da9e4b56cfc585df15b1c787e6c9f29d5fac722cecaf
                                                    • Instruction ID: 82e96ba516e0d5895d52bd106eca9dfa783efd84335c09ea6c3fd0203d014e90
                                                    • Opcode Fuzzy Hash: c14bfa4dc583be234af3da9e4b56cfc585df15b1c787e6c9f29d5fac722cecaf
                                                    • Instruction Fuzzy Hash: 5A31F7B4A4021CABDB24DF54DC85BDCB7B9FB48705F1081D9F609A7284D7706AC58FA8

                                                    Control-flow Graph

                                                    APIs
                                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 03198426
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0319847B
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400), ref: 031984EC
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,031A0B34), ref: 03198599
                                                    • RegCloseKey.KERNELBASE(00000000), ref: 03198608
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: QueryValue$CloseEnumOpen
                                                    • String ID:
                                                    • API String ID: 2041898428-0
                                                    • Opcode ID: cd49d97c5300413459ced9047d3b83341159e109e0881070fcb00776009173e9
                                                    • Instruction ID: d74e9dc112953635b50f0e87ac7b2e0dd001bc517c9936bb35a682720486b0ce
                                                    • Opcode Fuzzy Hash: cd49d97c5300413459ced9047d3b83341159e109e0881070fcb00776009173e9
                                                    • Instruction Fuzzy Hash: 8321197191022CABEB24DB54DC85FE9B7B8FB48701F00C1D9E609A6140DF71AA85CFD4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 553 3197e00-3197e66 RegOpenKeyExA 556 3197e68-3197e85 RegQueryValueExA 553->556 557 3197e87-3197e8c 553->557 558 3197e8e-3197e9b 556->558 559 3197eb6-3197ec6 557->559 558->559
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?), ref: 03197E5E
                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,000000FF,000000FF), ref: 03197E7F
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: 9c9f04e6177d42f6147be3cb72731168d00d92bcc05e389e93c47c6c52361394
                                                    • Instruction ID: 67c157dd5baa58de05e86e3b37b15cbdc1ad394bb0be99ce87853f497aa59d7c
                                                    • Opcode Fuzzy Hash: 9c9f04e6177d42f6147be3cb72731168d00d92bcc05e389e93c47c6c52361394
                                                    • Instruction Fuzzy Hash: 4D115EB1A54209EFEB04DFD5D989FBBBBBCFB48B11F10411AF615A7284D77468008BA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 561 3197690-31976bb call 31977a0 566 31976bd-31976c2 561->566 567 31976c6-31976e5 RegOpenKeyExA 561->567 568 3197711-3197714 566->568 569 3197704-319770e 567->569 570 31976e7-31976fe RegQueryValueExA 567->570 569->568 570->569
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,00000000), ref: 031976DD
                                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,000000FF), ref: 031976FE
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: 9c32544b159ffc645d988d67d7e5cb45e86dc6fed905aaf59f6cc3c6d44d3a27
                                                    • Instruction ID: 6eb8e91911fe44518add5922862e7ea9075b8dc87214ec0264e45dac224213a3
                                                    • Opcode Fuzzy Hash: 9c32544b159ffc645d988d67d7e5cb45e86dc6fed905aaf59f6cc3c6d44d3a27
                                                    • Instruction Fuzzy Hash: 95014FB9A10308BBEB04EBE4DD8DFA9BBBCEB48701F004055FA04D7284D770A9448B50
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,031976B9), ref: 0319775B
                                                    • RegQueryValueExA.KERNELBASE(031976B9,031A0AAC,00000000,00000000,?,000000FF), ref: 0319777A
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: OpenQueryValue
                                                    • String ID:
                                                    • API String ID: 4153817207-0
                                                    • Opcode ID: a2f7b4dbdddd16a06fad838a7c297a7f297f96835b22d372e5746d49aaf224e5
                                                    • Instruction ID: ec71cb6f565e0fcb711596bcfdfad8df6d9d494016187c0c1f8e294cd0bc43f9
                                                    • Opcode Fuzzy Hash: a2f7b4dbdddd16a06fad838a7c297a7f297f96835b22d372e5746d49aaf224e5
                                                    • Instruction Fuzzy Hash: 4701F4B9A50308BBEB00EBE4DC89FAEB7BCFB48705F104555FA05A7285D77065408B51
                                                    APIs
                                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,00000000,00000000,?,?,00000000,?,031A0E10,00000000,?,00000000,00000000,?), ref: 03197A7D
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InformationTimeZone
                                                    • String ID:
                                                    • API String ID: 565725191-0
                                                    • Opcode ID: 289178865a20f3157423bb443d7ee5a0e75e78e3bbca86063a90d1e0a2811052
                                                    • Instruction ID: 0e813ffbba7047547efd35f0e0bea5b2a8dcd529fca44eb470c84a3ebba31788
                                                    • Opcode Fuzzy Hash: 289178865a20f3157423bb443d7ee5a0e75e78e3bbca86063a90d1e0a2811052
                                                    • Instruction Fuzzy Hash: B7115EB1945218EFEB20DB54DD49FA9BBBCFB08722F00479AE91A932C0D7746A44CF51
                                                    APIs
                                                    • GetComputerNameA.KERNEL32(?,00000104), ref: 0319792F
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: d489fed550e30467e7d48c6dfc2c8748108ab7e7c53325af16400c74df24d15b
                                                    • Instruction ID: a9091cf2d4ed59bb9f183ed7ebd4023a503dd08858e9d4d36c207124e3b0f673
                                                    • Opcode Fuzzy Hash: d489fed550e30467e7d48c6dfc2c8748108ab7e7c53325af16400c74df24d15b
                                                    • Instruction Fuzzy Hash: 8E0186B1A14208EFDB04EF98D945BAEBBBCFB08B22F10425AF545E3280C37455048BA1
                                                    APIs
                                                    • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0319789F
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 8a50c8a40e7cd7ae2c3095dad535f8d0f41ee79c76ea3480ab35d044fe451161
                                                    • Instruction ID: 2a8942105ae5f748ff0fa7809590d3cc17ef451b33c6402315e5854f866a3aaa
                                                    • Opcode Fuzzy Hash: 8a50c8a40e7cd7ae2c3095dad535f8d0f41ee79c76ea3480ab35d044fe451161
                                                    • Instruction Fuzzy Hash: 02F044B1D54208AFDB14DF95D945BAEBBBCFB09711F10015AF615A2680C77425048BA1
                                                    APIs
                                                    • GetSystemInfo.KERNELBASE(031A0E2C), ref: 03197F00
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoSystem
                                                    • String ID:
                                                    • API String ID: 31276548-0
                                                    • Opcode ID: 25b8f9af2181f60d120b75c616d4c710056bb07dd782996418179b8f7bde367c
                                                    • Instruction ID: ca7819d1ffd6c64e61b991edc0b4b78c85e6b8f29844ba40343e10eeaafd0631
                                                    • Opcode Fuzzy Hash: 25b8f9af2181f60d120b75c616d4c710056bb07dd782996418179b8f7bde367c
                                                    • Instruction Fuzzy Hash: E7F096B1910608EFDB14DF84DC45FAAF7BCFB48A15F00066AF51592280D77569448BD0
                                                    APIs
                                                    • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 031994A5
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID:
                                                    • API String ID: 514040917-0
                                                    • Opcode ID: 106b1e6de074b9973e97802a6996886e69919c41b917c06bea6eb4511aca0536
                                                    • Instruction ID: 29d1eaa9e611a97cc99bfdb450b23863c965cc3b117f06181eabdbd02fda4a85
                                                    • Opcode Fuzzy Hash: 106b1e6de074b9973e97802a6996886e69919c41b917c06bea6eb4511aca0536
                                                    • Instruction Fuzzy Hash: 31F0307490020CEBDB05EFA4D88AFED7778FB08701F004558BA0957180D7B06A85CB90
                                                    APIs
                                                    • VirtualAllocExNuma.KERNELBASE(00000000,?,?,03196A1C), ref: 03181132
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocNumaVirtual
                                                    • String ID:
                                                    • API String ID: 4233825816-0
                                                    • Opcode ID: f52190c9b4b3b525d2147d9e5ab221d1a4fb5286177574c95ff3ab5dcf9cd4de
                                                    • Instruction ID: 22003b47b384828875f0913440eda86e520129dc85635045e3c1253ace4bd203
                                                    • Opcode Fuzzy Hash: f52190c9b4b3b525d2147d9e5ab221d1a4fb5286177574c95ff3ab5dcf9cd4de
                                                    • Instruction Fuzzy Hash: 28E0E67199530CFBE710BBA19C4EB097A7CBB04B02F104154F6097A1C4D7B536019B99
                                                    APIs
                                                    • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,03196A17,031A0AEF), ref: 0318116A
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: InfoSystem
                                                    • String ID:
                                                    • API String ID: 31276548-0
                                                    • Opcode ID: a389cb6c74f0ef370e0dc56550b07a180e0dd44a2b5da63f2dca1cd4392a4ef9
                                                    • Instruction ID: 7f8a06a559bae3d59396a72aa95c2eedcd4ca3a2d9c75ae44f78c18be4a8f57d
                                                    • Opcode Fuzzy Hash: a389cb6c74f0ef370e0dc56550b07a180e0dd44a2b5da63f2dca1cd4392a4ef9
                                                    • Instruction Fuzzy Hash: 2AD0177490020C9BCB00EBE0D88969DBB7CFB08312F000594E80562340EA3064828BA5
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0318114E,?,?,03196A1C), ref: 031810B3
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 4bdbe47adea3508d3bf0b9cf2d320a58b04c4e7046ba325c147084b436346a65
                                                    • Instruction ID: 1818f0494564ac0be8e1bdd8269dd32cb042e6e2233113a377f273bdbf6ecba7
                                                    • Opcode Fuzzy Hash: 4bdbe47adea3508d3bf0b9cf2d320a58b04c4e7046ba325c147084b436346a65
                                                    • Instruction Fuzzy Hash: F3F0E971641308BBE714E7A49C49FAAB7ECE709715F300454F504E7280D6716E00CB54
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0319C74E
                                                      • Part of subcall function 0319BF9F: __getptd_noexit.LIBCMT ref: 0319BFA2
                                                      • Part of subcall function 0319BF9F: __amsg_exit.LIBCMT ref: 0319BFAF
                                                    • __getptd.LIBCMT ref: 0319C765
                                                    • __amsg_exit.LIBCMT ref: 0319C773
                                                    • __lock.LIBCMT ref: 0319C783
                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0319C797
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.2661315717.0000000003180000.00000040.00000400.00020000.00000000.sdmp, Offset: 03180000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_3180000_aspnet_regiis.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                    • String ID:
                                                    • API String ID: 938513278-0
                                                    • Opcode ID: d6948bfd0cceedd3d3c4ed296984fd955fc3f649873c3feec903f6bf49530e32
                                                    • Instruction ID: 260f208b5584e1812254d615652e13ca3d03dec74f8fcab5b7143dd6fd7f4ee9
                                                    • Opcode Fuzzy Hash: d6948bfd0cceedd3d3c4ed296984fd955fc3f649873c3feec903f6bf49530e32
                                                    • Instruction Fuzzy Hash: 34F0B47A908B009BFF28FBBC684175E77A06F0C721F15818BE454AF1C0DB6459809AD6