Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1465166
MD5:edda8f53633b4ea2270424b850d700bf
SHA1:d1cb6ed8d18f40ed4fafd70a70c8168396912f45
SHA256:bb8fd576341c8f75f014515016614c9b84505d2704fe3e960c32afebab2c19b0
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Loader.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: EDDA8F53633B4EA2270424B850D700BF)
    • conhost.exe (PID: 7344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7452 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["deadtrainingactioniw.xyz", "qualificationjdwko.xyz", "grandcommonyktsju.xyz", "wordingnatturedowo.xyz", "crisisrottenyjs.xyz", "sweetcalcutangkdow.xyz", "cooperatvassquaidmew.xyz", "exuberanttjdkwo.xyz", "crisisrottenyjs.xyz"], "Build id": "LPnhqo--@fondnesssw"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: Loader.exe PID: 7336JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      Timestamp:07/01/24-12:00:10.337833
      SID:2054131
      Source Port:50034
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.444343
      SID:2054121
      Source Port:55685
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.368659
      SID:2054129
      Source Port:61762
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.563116
      SID:2054119
      Source Port:57788
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.575107
      SID:2054117
      Source Port:58515
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.405895
      SID:2054123
      Source Port:51384
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.230604
      SID:2054125
      Source Port:50884
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:07/01/24-12:00:10.385037
      SID:2054127
      Source Port:55520
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Loader.exeAvira: detected
      Source: https://qualificationjdwko.xyz/apiAvira URL Cloud: Label: malware
      Source: https://sweetcalcutangkdow.xyz/apiAvira URL Cloud: Label: malware
      Source: https://exuberanttjdkwo.xyz/apiAvira URL Cloud: Label: malware
      Source: https://cooperatvassquaidmew.xyz/apiAvira URL Cloud: Label: malware
      Source: 3.2.aspnet_regiis.exe.550000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["deadtrainingactioniw.xyz", "qualificationjdwko.xyz", "grandcommonyktsju.xyz", "wordingnatturedowo.xyz", "crisisrottenyjs.xyz", "sweetcalcutangkdow.xyz", "cooperatvassquaidmew.xyz", "exuberanttjdkwo.xyz", "crisisrottenyjs.xyz"], "Build id": "LPnhqo--@fondnesssw"}
      Source: https://qualificationjdwko.xyz/apiVirustotal: Detection: 6%Perma Link
      Source: https://sweetcalcutangkdow.xyz/apiVirustotal: Detection: 7%Perma Link
      Source: https://exuberanttjdkwo.xyz/apiVirustotal: Detection: 6%Perma Link
      Source: https://cooperatvassquaidmew.xyz/apiVirustotal: Detection: 6%Perma Link
      Source: C:\Users\user\AppData\Roaming\d3d9.dllReversingLabs: Detection: 57%
      Source: Loader.exeVirustotal: Detection: 72%Perma Link
      Source: Loader.exeReversingLabs: Detection: 79%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\d3d9.dllJoe Sandbox ML: detected
      Source: Loader.exeJoe Sandbox ML: detected
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: deadtrainingactioniw.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: qualificationjdwko.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: grandcommonyktsju.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: wordingnatturedowo.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: crisisrottenyjs.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: sweetcalcutangkdow.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: cooperatvassquaidmew.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: exuberanttjdkwo.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: crisisrottenyjs.xyz
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpString decryptor: LPnhqo--@fondnesssw
      Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D331178 FindFirstFileExW,0_2_6D331178
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 00D23749h3_2_00587090
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00587090
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00587090
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edi], ax3_2_00563F6C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, word ptr [edi+esi*4]3_2_00558170
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then lea eax, dword ptr [edi+04h]3_2_00571135
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ecx+edx*8], 3BEBD150h3_2_00584934
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, dword ptr [esi]3_2_005889DF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0055D1C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_005891FB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp esi3_2_0058A192
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [edi+ebx+01h], 00000000h3_2_0056CA4C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ebx+edi+01h], 00000000h3_2_00563A7E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ebx+edi+01h], 00000000h3_2_00563A7A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp esi3_2_0058A260
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp edx3_2_00571A15
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esp]3_2_00570239
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esi+40h]3_2_00577239
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_00586A90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]3_2_00566340
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ecx+ebx*8], 0850A6E6h3_2_0058BB40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00573329
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_0056E3F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp edx3_2_00571BF0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then inc ebx3_2_00565390
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00575BB5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_005763BB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0057644B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then inc eax3_2_00562470
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then xor eax, eax3_2_0056D413
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], B33E16A3h3_2_00586CC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000890h]3_2_0056E4F4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0057638D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_0056E490
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, dword ptr [esp+5Ch]3_2_00566CB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00574D50
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00572D7E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [edi], 00000000h3_2_00562D60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, dword ptr [esi+04h]3_2_00573517
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0056551E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]3_2_00563500
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ebx+edi+01h], 00000000h3_2_00563D28
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]3_2_005635C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_0056FDFC
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, eax3_2_005535A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esi+40h]3_2_00577602
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, word ptr [edx]3_2_00587E00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp esi3_2_0058A630
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp+24h], 0000005Ch3_2_00584695
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00582680
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esp+18h]3_2_0055FE8B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00551755
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edi], ax3_2_00564F78
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00553760
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]3_2_00558F60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then or ebp, 04h3_2_0055171B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], dl3_2_00576704
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esp]3_2_00559F20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00575FE4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add ecx, 03h3_2_00573FBB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi], ebp3_2_00551FA0

      Networking

      barindex
      Source: TrafficSnort IDS: 2054125 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (crisisrottenyjs .xyz) 192.168.2.9:50884 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054131 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (exuberanttjdkwo .xyz) 192.168.2.9:50034 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054129 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (cooperatvassquaidmew .xyz) 192.168.2.9:61762 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054127 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (sweetcalcutangkdow .xyz) 192.168.2.9:55520 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054123 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (wordingnatturedowo .xyz) 192.168.2.9:51384 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054121 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (grandcommonyktsju .xyz) 192.168.2.9:55685 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054119 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (qualificationjdwko .xyz) 192.168.2.9:57788 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2054117 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (deadtrainingactioniw .xyz) 192.168.2.9:58515 -> 1.1.1.1:53
      Source: Malware configuration extractorURLs: deadtrainingactioniw.xyz
      Source: Malware configuration extractorURLs: qualificationjdwko.xyz
      Source: Malware configuration extractorURLs: grandcommonyktsju.xyz
      Source: Malware configuration extractorURLs: wordingnatturedowo.xyz
      Source: Malware configuration extractorURLs: crisisrottenyjs.xyz
      Source: Malware configuration extractorURLs: sweetcalcutangkdow.xyz
      Source: Malware configuration extractorURLs: cooperatvassquaidmew.xyz
      Source: Malware configuration extractorURLs: exuberanttjdkwo.xyz
      Source: Malware configuration extractorURLs: crisisrottenyjs.xyz
      Source: DNS query: crisisrottenyjs.xyz
      Source: DNS query: exuberanttjdkwo.xyz
      Source: DNS query: cooperatvassquaidmew.xyz
      Source: DNS query: sweetcalcutangkdow.xyz
      Source: DNS query: wordingnatturedowo.xyz
      Source: DNS query: grandcommonyktsju.xyz
      Source: DNS query: qualificationjdwko.xyz
      Source: DNS query: deadtrainingactioniw.xyz
      Source: unknownDNS traffic detected: query: grandcommonyktsju.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: deadtrainingactioniw.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: sweetcalcutangkdow.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: crisisrottenyjs.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: wordingnatturedowo.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: cooperatvassquaidmew.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: exuberanttjdkwo.xyz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: qualificationjdwko.xyz replaycode: Name error (3)
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: crisisrottenyjs.xyz
      Source: global trafficDNS traffic detected: DNS query: exuberanttjdkwo.xyz
      Source: global trafficDNS traffic detected: DNS query: cooperatvassquaidmew.xyz
      Source: global trafficDNS traffic detected: DNS query: sweetcalcutangkdow.xyz
      Source: global trafficDNS traffic detected: DNS query: wordingnatturedowo.xyz
      Source: global trafficDNS traffic detected: DNS query: grandcommonyktsju.xyz
      Source: global trafficDNS traffic detected: DNS query: qualificationjdwko.xyz
      Source: global trafficDNS traffic detected: DNS query: deadtrainingactioniw.xyz
      Source: aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cooperatvassquaidmew.xyz/
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cooperatvassquaidmew.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crisisrottenyjs.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/
      Source: aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/0
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exuberanttjdkwo.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://grandcommonyktsju.xyz/
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://grandcommonyktsju.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://grandcommonyktsju.xyz/apiz?
      Source: aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/
      Source: aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/7
      Source: aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/A
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/apidO
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/apizC
      Source: aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sweetcalcutangkdow.xyz/
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sweetcalcutangkdow.xyz/api
      Source: aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sweetcalcutangkdow.xyz/apiz9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0057ED60 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_0057ED60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0057ED60 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_0057ED60

      System Summary

      barindex
      Source: Loader.exeStatic PE information: section name: "GT]\
      Source: Loader.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D322ED0 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,0_2_6D322ED0
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D3210900_2_6D321090
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D3237500_2_6D323750
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D322ED00_2_6D322ED0
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D32BC400_2_6D32BC40
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D3377150_2_6D337715
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D3233E00_2_6D3233E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0055F0703_2_0055F070
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005510003_2_00551000
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005870903_2_00587090
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005581703_2_00558170
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005671713_2_00567171
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005711353_2_00571135
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0058A1923_2_0058A192
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005749A03_2_005749A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0058C2503_2_0058C250
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00555A403_2_00555A40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0056CA4C3_2_0056CA4C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0058A2603_2_0058A260
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00571A153_2_00571A15
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005702393_2_00570239
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00553AA03_2_00553AA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00576BF93_2_00576BF9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00575BEA3_2_00575BEA
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0056D4133_2_0056D413
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00570C003_2_00570C00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00556CB03_2_00556CB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00566CB03_2_00566CB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005545403_2_00554540
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00572D7E3_2_00572D7E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0056F5113_2_0056F511
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00577DF33_2_00577DF3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0058A6303_2_0058A630
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00554F503_2_00554F50
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0058A7403_2_0058A740
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0058BF403_2_0058BF40
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00558F603_2_00558F60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_005567803_2_00556780
      Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 6D32CCA0 appears 33 times
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 00559550 appears 149 times
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 00558C40 appears 45 times
      Source: Loader.exe, 00000000.00000000.1370386916.0000000000CDA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCosmicEdge40765084938.exeT vs Loader.exe
      Source: Loader.exe, 00000000.00000002.1387171648.00000000014BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Loader.exe
      Source: Loader.exeBinary or memory string: OriginalFilenameCosmicEdge40765084938.exeT vs Loader.exe
      Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: Loader.exeStatic PE information: Section: "GT]\ ZLIB complexity 1.0003398362810707
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/2@8/0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0057C16B CoCreateInstance,3_2_0057C16B
      Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7344:120:WilError_03
      Source: Loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Loader.exeVirustotal: Detection: 72%
      Source: Loader.exeReversingLabs: Detection: 79%
      Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
      Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\Loader.exeUnpacked PE file: 0.2.Loader.exe.c70000.0.unpack "GT]\:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
      Source: Loader.exeStatic PE information: section name: "GT]\
      Source: Loader.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D337E44 push ecx; ret 0_2_6D337E57
      Source: Loader.exeStatic PE information: section name: "GT]\ entropy: 7.999307018864717
      Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7336, type: MEMORYSTR
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 1340000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 56C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 66C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 67F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 77F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 7B40000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 8B40000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 9B40000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
      Source: C:\Users\user\Desktop\Loader.exe TID: 7432Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7476Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D331178 FindFirstFileExW,0_2_6D331178
      Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00588AA0 LdrInitializeThunk,3_2_00588AA0
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D32CB2A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D32CB2A
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D33289B GetProcessHeap,0_2_6D33289B
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D32CB2A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D32CB2A
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D32C651 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6D32C651
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D330AC7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D330AC7
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\Loader.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 550000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D323750 HonorInc,GetConsoleWindow,ShowWindow,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,0_2_6D323750
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 550000 value starts with: 4D5AJump to behavior
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: deadtrainingactioniw.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: qualificationjdwko.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: grandcommonyktsju.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: wordingnatturedowo.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: crisisrottenyjs.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: sweetcalcutangkdow.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: cooperatvassquaidmew.xyz
      Source: Loader.exe, 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: exuberanttjdkwo.xyz
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 550000Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 551000Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 58D000Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 590000Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 5A2000Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A6008Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D32CCE8 cpuid 0_2_6D32CCE8
      Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\Users\user\Desktop\Loader.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_6D32C773 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6D32C773

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      DLL Side-Loading
      411
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory121
      Security Software Discovery
      Remote Desktop Protocol2
      Clipboard Data
      1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive11
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
      Process Injection
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Deobfuscate/Decode Files or Information
      LSA Secrets22
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
      Software Packing
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Loader.exe73%VirustotalBrowse
      Loader.exe79%ReversingLabsWin32.Spyware.Lummastealer
      Loader.exe100%AviraHEUR/AGEN.1311437
      Loader.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\d3d9.dll100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\d3d9.dll58%ReversingLabsWin32.Trojan.LummaStealer
      No Antivirus matches
      SourceDetectionScannerLabelLink
      deadtrainingactioniw.xyz1%VirustotalBrowse
      qualificationjdwko.xyz1%VirustotalBrowse
      sweetcalcutangkdow.xyz1%VirustotalBrowse
      cooperatvassquaidmew.xyz1%VirustotalBrowse
      exuberanttjdkwo.xyz1%VirustotalBrowse
      crisisrottenyjs.xyz1%VirustotalBrowse
      wordingnatturedowo.xyz1%VirustotalBrowse
      grandcommonyktsju.xyz0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://sweetcalcutangkdow.xyz/0%Avira URL Cloudsafe
      https://cooperatvassquaidmew.xyz/0%Avira URL Cloudsafe
      https://sweetcalcutangkdow.xyz/0%VirustotalBrowse
      https://qualificationjdwko.xyz/api100%Avira URL Cloudmalware
      https://sweetcalcutangkdow.xyz/api100%Avira URL Cloudmalware
      grandcommonyktsju.xyz0%Avira URL Cloudsafe
      https://sweetcalcutangkdow.xyz/apiz90%Avira URL Cloudsafe
      https://exuberanttjdkwo.xyz/api100%Avira URL Cloudmalware
      https://qualificationjdwko.xyz/api6%VirustotalBrowse
      cooperatvassquaidmew.xyz0%Avira URL Cloudsafe
      https://grandcommonyktsju.xyz/0%Avira URL Cloudsafe
      https://sweetcalcutangkdow.xyz/api7%VirustotalBrowse
      exuberanttjdkwo.xyz0%Avira URL Cloudsafe
      cooperatvassquaidmew.xyz1%VirustotalBrowse
      qualificationjdwko.xyz0%Avira URL Cloudsafe
      grandcommonyktsju.xyz0%VirustotalBrowse
      https://exuberanttjdkwo.xyz/api6%VirustotalBrowse
      https://cooperatvassquaidmew.xyz/0%VirustotalBrowse
      https://grandcommonyktsju.xyz/0%VirustotalBrowse
      https://deadtrainingactioniw.xyz/api0%Avira URL Cloudsafe
      qualificationjdwko.xyz1%VirustotalBrowse
      https://grandcommonyktsju.xyz/api0%Avira URL Cloudsafe
      https://qualificationjdwko.xyz/apidO0%Avira URL Cloudsafe
      https://qualificationjdwko.xyz/A0%Avira URL Cloudsafe
      https://grandcommonyktsju.xyz/apiz?0%Avira URL Cloudsafe
      exuberanttjdkwo.xyz1%VirustotalBrowse
      https://qualificationjdwko.xyz/0%Avira URL Cloudsafe
      https://deadtrainingactioniw.xyz/api4%VirustotalBrowse
      https://deadtrainingactioniw.xyz/00%Avira URL Cloudsafe
      https://crisisrottenyjs.xyz/api0%Avira URL Cloudsafe
      https://grandcommonyktsju.xyz/api4%VirustotalBrowse
      wordingnatturedowo.xyz0%Avira URL Cloudsafe
      https://qualificationjdwko.xyz/70%Avira URL Cloudsafe
      https://cooperatvassquaidmew.xyz/api100%Avira URL Cloudmalware
      https://deadtrainingactioniw.xyz/0%Avira URL Cloudsafe
      https://qualificationjdwko.xyz/0%VirustotalBrowse
      deadtrainingactioniw.xyz0%Avira URL Cloudsafe
      https://crisisrottenyjs.xyz/api4%VirustotalBrowse
      crisisrottenyjs.xyz0%Avira URL Cloudsafe
      https://cooperatvassquaidmew.xyz/api6%VirustotalBrowse
      https://qualificationjdwko.xyz/apizC0%Avira URL Cloudsafe
      wordingnatturedowo.xyz1%VirustotalBrowse
      sweetcalcutangkdow.xyz0%Avira URL Cloudsafe
      crisisrottenyjs.xyz1%VirustotalBrowse
      https://deadtrainingactioniw.xyz/0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      qualificationjdwko.xyz
      unknown
      unknowntrueunknown
      crisisrottenyjs.xyz
      unknown
      unknowntrueunknown
      deadtrainingactioniw.xyz
      unknown
      unknowntrueunknown
      grandcommonyktsju.xyz
      unknown
      unknowntrueunknown
      cooperatvassquaidmew.xyz
      unknown
      unknowntrueunknown
      sweetcalcutangkdow.xyz
      unknown
      unknowntrueunknown
      exuberanttjdkwo.xyz
      unknown
      unknowntrueunknown
      wordingnatturedowo.xyz
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      grandcommonyktsju.xyztrue
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      cooperatvassquaidmew.xyztrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      exuberanttjdkwo.xyztrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      qualificationjdwko.xyztrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      wordingnatturedowo.xyztrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      deadtrainingactioniw.xyztrue
      • Avira URL Cloud: safe
      unknown
      crisisrottenyjs.xyztrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      sweetcalcutangkdow.xyztrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://sweetcalcutangkdow.xyz/aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://cooperatvassquaidmew.xyz/aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://qualificationjdwko.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • 6%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://sweetcalcutangkdow.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • 7%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://sweetcalcutangkdow.xyz/apiz9aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://exuberanttjdkwo.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • 6%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://grandcommonyktsju.xyz/aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://deadtrainingactioniw.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpfalse
      • 4%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://grandcommonyktsju.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • 4%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://qualificationjdwko.xyz/apidOaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://qualificationjdwko.xyz/Aaspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://grandcommonyktsju.xyz/apiz?aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://qualificationjdwko.xyz/aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://crisisrottenyjs.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpfalse
      • 4%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://deadtrainingactioniw.xyz/0aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://qualificationjdwko.xyz/7aspnet_regiis.exe, 00000003.00000002.1383006597.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.00000000005FB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://cooperatvassquaidmew.xyz/apiaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • 6%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://deadtrainingactioniw.xyz/aspnet_regiis.exe, 00000003.00000003.1382509177.0000000000624000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.1383027287.0000000000624000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://qualificationjdwko.xyz/apizCaspnet_regiis.exe, 00000003.00000002.1383027287.000000000060D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.1382384827.000000000060D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1465166
      Start date and time:2024-07-01 11:59:12 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Loader.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@4/2@8/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 93%
      • Number of executed functions: 17
      • Number of non-executed functions: 85
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      06:00:09API Interceptor2x Sleep call for process: aspnet_regiis.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\Loader.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):42
      Entropy (8bit):4.0050635535766075
      Encrypted:false
      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
      MD5:84CFDB4B995B1DBF543B26B86C863ADC
      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
      Process:C:\Users\user\Desktop\Loader.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):440320
      Entropy (8bit):6.951373265521596
      Encrypted:false
      SSDEEP:12288:4pYXcezO1zLj1KXu4HYkmhrvHfOa3rHk2i4je:VXWiemnmhr/Oa3zk2i4je
      MD5:7A74C48C7D0FF3C094E5FF5CBFEE32BA
      SHA1:D92E038971C0C7AD44878A795428E157FD987B08
      SHA-256:E5F29466C1187FA88876FD5FAE1CE988CA069612A0D3616C267ED1D9C684F9B9
      SHA-512:709E16799C2003CC3716199C3909EC3E1CB509877D0EC571A6AFE11BC090D993E035BDC7E2B39BEC69BCFDF33EED626CE03149763824BCB33FCDCAA3557F5087
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: ReversingLabs, Detection: 58%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.)...GQ..GQ..GQL.DP..GQL.BP..GQL.CP..GQL.FP..GQ z<Q..GQ..FQe.GQ.=BP..GQ.=CP..GQ.=DP..GQ..GQ..GQj=GP..GQj=EP..GQRich..GQ........................PE..L.....}f...........!...&.r...L............................................................@.............................x...x...<................................... ...............................`...@...............P............................text....p.......r.................. ..`.rdata...d.......f...v..............@..@.data...T...........................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.3280468055909305
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      • Win32 Executable (generic) a (10002005/4) 49.96%
      • Win16/32 Executable Delphi generic (2074/23) 0.01%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:Loader.exe
      File size:419'840 bytes
      MD5:edda8f53633b4ea2270424b850d700bf
      SHA1:d1cb6ed8d18f40ed4fafd70a70c8168396912f45
      SHA256:bb8fd576341c8f75f014515016614c9b84505d2704fe3e960c32afebab2c19b0
      SHA512:62637cebf5931eb6c9df407cf82ee37ad2ac6c335dd00cb2c152e9bf6df496875b9740e9862084ac5e7cb1c7c2b3630d6ae764c1efa8ba1e8cc3b2c4366eecc8
      SSDEEP:12288:jfS5v+TGic+7Lq0W4iHIkSZ96dY4NPj49KQ6appN3vgM4d4L2rW48mX8:bS5aTc+fHiokSZQ
      TLSH:9094B4DCB56076DFC867D462DEB82CA8EA6075BB932F4203912715ADDA0C897CF140F2
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}f.................D... ...........@... ....@.. ....................................@................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x46e00a
      Entrypoint Section:
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x667D0C86 [Thu Jun 27 06:53:58 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [0046E000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x447e40x57.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x6a0000x708.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x6e0000x8
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x440000x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      "GT]\0x20000x415a00x4160019c8e2e581877a08584ccfb85da11e85False1.0003398362810707data7.999307018864717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .text0x440000x241480x24200595a7af8b52fe53451d2e840cc15346bFalse0.3641800929930796data4.658647890992144IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x6a0000x7080x800627dcae02794fcc58a3e2ad6057b0ec0False0.373046875data3.8045470753302264IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x6c0000xc0x20003b4a7742d43ef56ec303d17318ca02eFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      0x6e0000x100x200e88e96fdc3c61391a0140a395536d408False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x6a0a00x478data0.40384615384615385
      RT_MANIFEST0x6a5180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
      DLLImport
      mscoree.dll_CorExeMain
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      07/01/24-12:00:10.337833UDP2054131ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (exuberanttjdkwo .xyz)5003453192.168.2.91.1.1.1
      07/01/24-12:00:10.444343UDP2054121ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (grandcommonyktsju .xyz)5568553192.168.2.91.1.1.1
      07/01/24-12:00:10.368659UDP2054129ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (cooperatvassquaidmew .xyz)6176253192.168.2.91.1.1.1
      07/01/24-12:00:10.563116UDP2054119ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (qualificationjdwko .xyz)5778853192.168.2.91.1.1.1
      07/01/24-12:00:10.575107UDP2054117ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (deadtrainingactioniw .xyz)5851553192.168.2.91.1.1.1
      07/01/24-12:00:10.405895UDP2054123ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (wordingnatturedowo .xyz)5138453192.168.2.91.1.1.1
      07/01/24-12:00:10.230604UDP2054125ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (crisisrottenyjs .xyz)5088453192.168.2.91.1.1.1
      07/01/24-12:00:10.385037UDP2054127ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (sweetcalcutangkdow .xyz)5552053192.168.2.91.1.1.1
      TimestampSource PortDest PortSource IPDest IP
      Jul 1, 2024 12:00:10.230603933 CEST5088453192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.333440065 CEST53508841.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.337832928 CEST5003453192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.365691900 CEST53500341.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.368659019 CEST6176253192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.383558035 CEST53617621.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.385036945 CEST5552053192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.402679920 CEST53555201.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.405894995 CEST5138453192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.436476946 CEST53513841.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.444343090 CEST5568553192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.471892118 CEST53556851.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.563116074 CEST5778853192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.573378086 CEST53577881.1.1.1192.168.2.9
      Jul 1, 2024 12:00:10.575107098 CEST5851553192.168.2.91.1.1.1
      Jul 1, 2024 12:00:10.585148096 CEST53585151.1.1.1192.168.2.9
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Jul 1, 2024 12:00:10.230603933 CEST192.168.2.91.1.1.10x6ef2Standard query (0)crisisrottenyjs.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.337832928 CEST192.168.2.91.1.1.10x36c1Standard query (0)exuberanttjdkwo.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.368659019 CEST192.168.2.91.1.1.10x53d9Standard query (0)cooperatvassquaidmew.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.385036945 CEST192.168.2.91.1.1.10xe488Standard query (0)sweetcalcutangkdow.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.405894995 CEST192.168.2.91.1.1.10xd977Standard query (0)wordingnatturedowo.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.444343090 CEST192.168.2.91.1.1.10x6304Standard query (0)grandcommonyktsju.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.563116074 CEST192.168.2.91.1.1.10xdd95Standard query (0)qualificationjdwko.xyzA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.575107098 CEST192.168.2.91.1.1.10x1586Standard query (0)deadtrainingactioniw.xyzA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jul 1, 2024 12:00:10.333440065 CEST1.1.1.1192.168.2.90x6ef2Name error (3)crisisrottenyjs.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.365691900 CEST1.1.1.1192.168.2.90x36c1Name error (3)exuberanttjdkwo.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.383558035 CEST1.1.1.1192.168.2.90x53d9Name error (3)cooperatvassquaidmew.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.402679920 CEST1.1.1.1192.168.2.90xe488Name error (3)sweetcalcutangkdow.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.436476946 CEST1.1.1.1192.168.2.90xd977Name error (3)wordingnatturedowo.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.471892118 CEST1.1.1.1192.168.2.90x6304Name error (3)grandcommonyktsju.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.573378086 CEST1.1.1.1192.168.2.90xdd95Name error (3)qualificationjdwko.xyznonenoneA (IP address)IN (0x0001)false
      Jul 1, 2024 12:00:10.585148096 CEST1.1.1.1192.168.2.90x1586Name error (3)deadtrainingactioniw.xyznonenoneA (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:06:00:08
      Start date:01/07/2024
      Path:C:\Users\user\Desktop\Loader.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\Loader.exe"
      Imagebase:0xc70000
      File size:419'840 bytes
      MD5 hash:EDDA8F53633B4EA2270424B850D700BF
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:06:00:08
      Start date:01/07/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff70f010000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:06:00:08
      Start date:01/07/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      Imagebase:0x7c0000
      File size:43'016 bytes
      MD5 hash:5D1D74198D75640E889F0A577BBF31FC
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:20.9%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:5.2%
        Total number of Nodes:1844
        Total number of Limit Nodes:32
        execution_graph 9404 6d3309b2 9406 6d3309bd 9404->9406 9405 6d332778 6 API calls 9405->9406 9406->9405 9407 6d3309e6 9406->9407 9408 6d3309e2 9406->9408 9410 6d330a0a 9407->9410 9411 6d330a36 9410->9411 9412 6d330a17 9410->9412 9411->9408 9413 6d330a21 DeleteCriticalSection 9412->9413 9413->9411 9413->9413 8921 6d335b31 8922 6d335b51 8921->8922 8925 6d335b88 8922->8925 8924 6d335b7b 8926 6d335b8f 8925->8926 8927 6d335c2e 8926->8927 8930 6d335baf 8926->8930 8934 6d336d27 8927->8934 8929 6d336c50 8929->8924 8930->8924 8930->8929 8932 6d336d27 20 API calls 8930->8932 8933 6d336c4e 8932->8933 8933->8924 8935 6d336d30 8934->8935 8938 6d33724c 8935->8938 8939 6d33728b __startOneArgErrorHandling 8938->8939 8941 6d337313 __startOneArgErrorHandling 8939->8941 8946 6d3376f2 8939->8946 8943 6d337348 8941->8943 8949 6d337a06 8941->8949 8944 6d32c2e0 _ValidateLocalCookies 5 API calls 8943->8944 8945 6d335c3e 8944->8945 8945->8924 8956 6d337715 8946->8956 8950 6d337a13 8949->8950 8951 6d337a2a 8949->8951 8953 6d337a2f 8950->8953 8954 6d330da4 __dosmaperr 14 API calls 8950->8954 8952 6d330da4 __dosmaperr 14 API calls 8951->8952 8952->8953 8953->8943 8955 6d337a22 8954->8955 8955->8943 8957 6d337740 __raise_exc 8956->8957 8958 6d337939 RaiseException 8957->8958 8959 6d337710 8958->8959 8959->8941 9414 6d3332b6 9415 6d3331e5 ___scrt_uninitialize_crt 68 API calls 9414->9415 9416 6d3332be 9415->9416 9424 6d335361 9416->9424 9418 6d3332c3 9434 6d33540c 9418->9434 9421 6d3332ed 9422 6d330e14 ___free_lconv_mon 14 API calls 9421->9422 9423 6d3332f8 9422->9423 9425 6d33536d ___scrt_is_nonwritable_in_current_image 9424->9425 9438 6d3309f3 EnterCriticalSection 9425->9438 9427 6d3353e4 9443 6d335403 9427->9443 9429 6d335378 9429->9427 9431 6d3353b8 DeleteCriticalSection 9429->9431 9439 6d335aff 9429->9439 9433 6d330e14 ___free_lconv_mon 14 API calls 9431->9433 9433->9429 9435 6d335423 9434->9435 9436 6d3332d2 DeleteCriticalSection 9434->9436 9435->9436 9437 6d330e14 ___free_lconv_mon 14 API calls 9435->9437 9436->9418 9436->9421 9437->9436 9438->9429 9440 6d335b12 ___std_exception_copy 9439->9440 9446 6d3359da 9440->9446 9442 6d335b1e ___std_exception_copy 9442->9429 9534 6d330a3b LeaveCriticalSection 9443->9534 9445 6d3353f0 9445->9418 9447 6d3359e6 ___scrt_is_nonwritable_in_current_image 9446->9447 9448 6d335a13 9447->9448 9449 6d3359f0 9447->9449 9456 6d335a0b 9448->9456 9457 6d333302 EnterCriticalSection 9448->9457 9450 6d330c46 ___std_exception_copy 29 API calls 9449->9450 9450->9456 9452 6d335a31 9458 6d335a71 9452->9458 9454 6d335a3e 9472 6d335a69 9454->9472 9456->9442 9457->9452 9459 6d335aa1 9458->9459 9460 6d335a7e 9458->9460 9462 6d333117 ___scrt_uninitialize_crt 64 API calls 9459->9462 9463 6d335a99 9459->9463 9461 6d330c46 ___std_exception_copy 29 API calls 9460->9461 9461->9463 9464 6d335ab9 9462->9464 9463->9454 9465 6d33540c 14 API calls 9464->9465 9466 6d335ac1 9465->9466 9467 6d333567 ___scrt_uninitialize_crt 29 API calls 9466->9467 9468 6d335acd 9467->9468 9475 6d3362ec 9468->9475 9471 6d330e14 ___free_lconv_mon 14 API calls 9471->9463 9533 6d333316 LeaveCriticalSection 9472->9533 9474 6d335a6f 9474->9456 9478 6d336315 9475->9478 9481 6d335ad4 9475->9481 9476 6d336364 9477 6d330c46 ___std_exception_copy 29 API calls 9476->9477 9477->9481 9478->9476 9479 6d33633c 9478->9479 9482 6d33625b 9479->9482 9481->9463 9481->9471 9483 6d336267 ___scrt_is_nonwritable_in_current_image 9482->9483 9490 6d334632 EnterCriticalSection 9483->9490 9485 6d336275 9486 6d3362a6 9485->9486 9491 6d33638f 9485->9491 9504 6d3362e0 9486->9504 9490->9485 9507 6d334709 9491->9507 9493 6d3363a5 9520 6d334678 9493->9520 9495 6d33639f 9495->9493 9496 6d334709 ___scrt_uninitialize_crt 29 API calls 9495->9496 9503 6d3363d7 9495->9503 9499 6d3363ce 9496->9499 9497 6d334709 ___scrt_uninitialize_crt 29 API calls 9500 6d3363e3 CloseHandle 9497->9500 9498 6d3363fd ___scrt_uninitialize_crt 9498->9486 9501 6d334709 ___scrt_uninitialize_crt 29 API calls 9499->9501 9500->9493 9502 6d3363ef GetLastError 9500->9502 9501->9503 9502->9493 9503->9493 9503->9497 9532 6d334655 LeaveCriticalSection 9504->9532 9506 6d3362c9 9506->9481 9508 6d334716 9507->9508 9509 6d33472b 9507->9509 9529 6d330d91 9508->9529 9512 6d330d91 __dosmaperr 14 API calls 9509->9512 9514 6d334750 9509->9514 9515 6d33475b 9512->9515 9513 6d330da4 __dosmaperr 14 API calls 9517 6d334723 9513->9517 9514->9495 9516 6d330da4 __dosmaperr 14 API calls 9515->9516 9518 6d334763 9516->9518 9517->9495 9519 6d330cc3 ___std_exception_copy 29 API calls 9518->9519 9519->9517 9521 6d334687 9520->9521 9522 6d3346ee 9520->9522 9521->9522 9528 6d3346b1 9521->9528 9523 6d330da4 __dosmaperr 14 API calls 9522->9523 9524 6d3346f3 9523->9524 9525 6d330d91 __dosmaperr 14 API calls 9524->9525 9526 6d3346de 9525->9526 9526->9498 9527 6d3346d8 SetStdHandle 9527->9526 9528->9526 9528->9527 9530 6d330818 __dosmaperr 14 API calls 9529->9530 9531 6d330d96 9530->9531 9531->9513 9532->9506 9533->9474 9534->9445 9535 6d3343bd 9538 6d331e18 9535->9538 9539 6d331e21 9538->9539 9540 6d331e53 9538->9540 9544 6d330782 9539->9544 9545 6d330793 9544->9545 9546 6d33078d 9544->9546 9547 6d332736 _unexpected 6 API calls 9545->9547 9566 6d330799 9545->9566 9548 6d3326f7 _unexpected 6 API calls 9546->9548 9549 6d3307ad 9547->9549 9548->9545 9550 6d330db7 _unexpected 14 API calls 9549->9550 9549->9566 9552 6d3307bd 9550->9552 9551 6d3300a9 CallUnexpected 39 API calls 9553 6d330817 9551->9553 9554 6d3307c5 9552->9554 9555 6d3307da 9552->9555 9556 6d332736 _unexpected 6 API calls 9554->9556 9557 6d332736 _unexpected 6 API calls 9555->9557 9564 6d3307d1 9556->9564 9558 6d3307e6 9557->9558 9559 6d3307ea 9558->9559 9560 6d3307f9 9558->9560 9561 6d332736 _unexpected 6 API calls 9559->9561 9562 6d3304c9 _unexpected 14 API calls 9560->9562 9561->9564 9565 6d330804 9562->9565 9563 6d330e14 ___free_lconv_mon 14 API calls 9563->9566 9564->9563 9567 6d330e14 ___free_lconv_mon 14 API calls 9565->9567 9566->9551 9568 6d33079e 9566->9568 9567->9568 9569 6d331c23 9568->9569 9592 6d331d78 9569->9592 9574 6d331c66 9574->9540 9575 6d33332a 15 API calls 9576 6d331c77 9575->9576 9577 6d331c7f 9576->9577 9578 6d331c8d 9576->9578 9579 6d330e14 ___free_lconv_mon 14 API calls 9577->9579 9610 6d331e73 9578->9610 9579->9574 9582 6d331cc5 9583 6d330da4 __dosmaperr 14 API calls 9582->9583 9584 6d331cca 9583->9584 9586 6d330e14 ___free_lconv_mon 14 API calls 9584->9586 9585 6d331ce0 9587 6d330e14 ___free_lconv_mon 14 API calls 9585->9587 9590 6d331d0c 9585->9590 9586->9574 9587->9590 9589 6d330e14 ___free_lconv_mon 14 API calls 9589->9574 9591 6d331d55 9590->9591 9621 6d33189c 9590->9621 9591->9589 9593 6d331d84 ___scrt_is_nonwritable_in_current_image 9592->9593 9595 6d331d9e 9593->9595 9629 6d3309f3 EnterCriticalSection 9593->9629 9596 6d331c4d 9595->9596 9599 6d3300a9 CallUnexpected 39 API calls 9595->9599 9603 6d3319aa 9596->9603 9597 6d331dda 9630 6d331df7 9597->9630 9601 6d331e17 9599->9601 9600 6d331dae 9600->9597 9602 6d330e14 ___free_lconv_mon 14 API calls 9600->9602 9602->9597 9634 6d3314ae 9603->9634 9606 6d3319cb GetOEMCP 9608 6d3319f4 9606->9608 9607 6d3319dd 9607->9608 9609 6d3319e2 GetACP 9607->9609 9608->9574 9608->9575 9609->9608 9611 6d3319aa 41 API calls 9610->9611 9612 6d331e93 9611->9612 9613 6d331f98 9612->9613 9615 6d331ed0 IsValidCodePage 9612->9615 9620 6d331eeb __CreateFrameInfo 9612->9620 9614 6d32c2e0 _ValidateLocalCookies 5 API calls 9613->9614 9616 6d331cba 9614->9616 9615->9613 9617 6d331ee2 9615->9617 9616->9582 9616->9585 9618 6d331f0b GetCPInfo 9617->9618 9617->9620 9618->9613 9618->9620 9673 6d331a7e 9620->9673 9622 6d3318a8 ___scrt_is_nonwritable_in_current_image 9621->9622 9759 6d3309f3 EnterCriticalSection 9622->9759 9624 6d3318b2 9760 6d3318e9 9624->9760 9629->9600 9633 6d330a3b LeaveCriticalSection 9630->9633 9632 6d331dfe 9632->9595 9633->9632 9635 6d3314cc 9634->9635 9641 6d3314c5 9634->9641 9636 6d3306c7 _unexpected 39 API calls 9635->9636 9635->9641 9637 6d3314ed 9636->9637 9642 6d333378 9637->9642 9641->9606 9641->9607 9643 6d33338b 9642->9643 9645 6d331503 9642->9645 9643->9645 9650 6d3338f7 9643->9650 9646 6d3333d6 9645->9646 9647 6d3333fe 9646->9647 9648 6d3333e9 9646->9648 9647->9641 9648->9647 9668 6d331e60 9648->9668 9651 6d333903 ___scrt_is_nonwritable_in_current_image 9650->9651 9652 6d3306c7 _unexpected 39 API calls 9651->9652 9653 6d33390c 9652->9653 9660 6d333952 9653->9660 9663 6d3309f3 EnterCriticalSection 9653->9663 9655 6d33392a 9656 6d333978 ___scrt_uninitialize_crt 14 API calls 9655->9656 9657 6d33393b 9656->9657 9664 6d333957 9657->9664 9660->9645 9661 6d3300a9 CallUnexpected 39 API calls 9662 6d333977 9661->9662 9663->9655 9667 6d330a3b LeaveCriticalSection 9664->9667 9666 6d33394e 9666->9660 9666->9661 9667->9666 9669 6d3306c7 _unexpected 39 API calls 9668->9669 9670 6d331e65 9669->9670 9671 6d331d78 ___scrt_uninitialize_crt 39 API calls 9670->9671 9672 6d331e70 9671->9672 9672->9647 9674 6d331aa6 GetCPInfo 9673->9674 9675 6d331b6f 9673->9675 9674->9675 9680 6d331abe 9674->9680 9676 6d32c2e0 _ValidateLocalCookies 5 API calls 9675->9676 9678 6d331c21 9676->9678 9678->9613 9684 6d334064 9680->9684 9683 6d334374 43 API calls 9683->9675 9685 6d3314ae 39 API calls 9684->9685 9686 6d334084 9685->9686 9704 6d332212 9686->9704 9688 6d334140 9690 6d32c2e0 _ValidateLocalCookies 5 API calls 9688->9690 9689 6d334138 9707 6d334165 9689->9707 9693 6d331b26 9690->9693 9691 6d3340b1 9691->9688 9691->9689 9692 6d33332a 15 API calls 9691->9692 9695 6d3340d6 __CreateFrameInfo __alloca_probe_16 9691->9695 9692->9695 9699 6d334374 9693->9699 9695->9689 9696 6d332212 ___scrt_uninitialize_crt MultiByteToWideChar 9695->9696 9697 6d33411f 9696->9697 9697->9689 9698 6d334126 GetStringTypeW 9697->9698 9698->9689 9700 6d3314ae 39 API calls 9699->9700 9701 6d334387 9700->9701 9713 6d334185 9701->9713 9711 6d33217a 9704->9711 9708 6d334182 9707->9708 9709 6d334171 9707->9709 9708->9688 9709->9708 9710 6d330e14 ___free_lconv_mon 14 API calls 9709->9710 9710->9708 9712 6d33218b MultiByteToWideChar 9711->9712 9712->9691 9714 6d3341a0 9713->9714 9715 6d332212 ___scrt_uninitialize_crt MultiByteToWideChar 9714->9715 9718 6d3341e4 9715->9718 9716 6d33435f 9717 6d32c2e0 _ValidateLocalCookies 5 API calls 9716->9717 9719 6d331b47 9717->9719 9718->9716 9720 6d33332a 15 API calls 9718->9720 9722 6d33420a __alloca_probe_16 9718->9722 9733 6d3342b2 9718->9733 9719->9683 9720->9722 9721 6d334165 __freea 14 API calls 9721->9716 9723 6d332212 ___scrt_uninitialize_crt MultiByteToWideChar 9722->9723 9722->9733 9724 6d334253 9723->9724 9724->9733 9741 6d3327c3 9724->9741 9727 6d3342c1 9729 6d33434a 9727->9729 9731 6d33332a 15 API calls 9727->9731 9734 6d3342d3 __alloca_probe_16 9727->9734 9728 6d334289 9730 6d3327c3 6 API calls 9728->9730 9728->9733 9732 6d334165 __freea 14 API calls 9729->9732 9730->9733 9731->9734 9732->9733 9733->9721 9734->9729 9735 6d3327c3 6 API calls 9734->9735 9736 6d334316 9735->9736 9736->9729 9747 6d3322cc 9736->9747 9738 6d334330 9738->9729 9739 6d334339 9738->9739 9740 6d334165 __freea 14 API calls 9739->9740 9740->9733 9750 6d332496 9741->9750 9745 6d332814 LCMapStringW 9746 6d3327d4 9745->9746 9746->9727 9746->9728 9746->9733 9749 6d3322df ___scrt_uninitialize_crt 9747->9749 9748 6d33231d WideCharToMultiByte 9748->9738 9749->9748 9751 6d332595 _unexpected 5 API calls 9750->9751 9752 6d3324ac 9751->9752 9752->9746 9753 6d332820 9752->9753 9756 6d3324b0 9753->9756 9755 6d33282b 9755->9745 9757 6d332595 _unexpected 5 API calls 9756->9757 9758 6d3324c6 9757->9758 9758->9755 9759->9624 9770 6d332078 9760->9770 9762 6d33190b 9763 6d332078 29 API calls 9762->9763 9764 6d33192a 9763->9764 9765 6d330e14 ___free_lconv_mon 14 API calls 9764->9765 9766 6d3318bf 9764->9766 9765->9766 9767 6d3318dd 9766->9767 9784 6d330a3b LeaveCriticalSection 9767->9784 9769 6d3318cb 9769->9591 9771 6d332089 9770->9771 9774 6d332085 __InternalCxxFrameHandler 9770->9774 9772 6d332090 9771->9772 9776 6d3320a3 __CreateFrameInfo 9771->9776 9773 6d330da4 __dosmaperr 14 API calls 9772->9773 9775 6d332095 9773->9775 9774->9762 9777 6d330cc3 ___std_exception_copy 29 API calls 9775->9777 9776->9774 9778 6d3320d1 9776->9778 9779 6d3320da 9776->9779 9777->9774 9780 6d330da4 __dosmaperr 14 API calls 9778->9780 9779->9774 9781 6d330da4 __dosmaperr 14 API calls 9779->9781 9782 6d3320d6 9780->9782 9781->9782 9783 6d330cc3 ___std_exception_copy 29 API calls 9782->9783 9783->9774 9784->9769 8960 6d32ed20 8967 6d32db9e 8960->8967 8962 6d32ed28 __FrameHandler3::FrameUnwindToState 8980 6d32eefa 8962->8980 8964 6d32eda4 8989 6d32eddd 8964->8989 8966 6d32edc5 8968 6d32dbac __CreateFrameInfo 23 API calls 8967->8968 8969 6d32dba3 8968->8969 8969->8962 8998 6d332ca5 8969->8998 8972 6d3300b9 8974 6d3300c3 IsProcessorFeaturePresent 8972->8974 8979 6d3300e2 8972->8979 8976 6d3300cf 8974->8976 9028 6d330ac7 8976->9028 9034 6d32f7ae 8979->9034 8981 6d32ef06 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 8980->8981 8982 6d32db9e __CreateFrameInfo 49 API calls 8981->8982 8988 6d32ef21 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 8982->8988 8984 6d32efa1 8985 6d3300a9 CallUnexpected 39 API calls 8984->8985 8986 6d32efa6 __FrameHandler3::FrameUnwindToState 8984->8986 8987 6d32efe1 8985->8987 8986->8964 8988->8984 9093 6d32efc8 8988->9093 9098 6d32dfc7 8989->9098 8991 6d32edee 8992 6d32db9e __CreateFrameInfo 49 API calls 8991->8992 8993 6d32edf4 8992->8993 8994 6d32db9e __CreateFrameInfo 49 API calls 8993->8994 8995 6d32edff 8994->8995 8997 6d32ee40 __InternalCxxFrameHandler 8995->8997 9115 6d32d914 8995->9115 8997->8966 9037 6d332bd3 8998->9037 9001 6d332cea 9002 6d332cf6 ___scrt_is_nonwritable_in_current_image 9001->9002 9003 6d330818 __dosmaperr 14 API calls 9002->9003 9004 6d332d46 9002->9004 9005 6d332d58 __CreateFrameInfo 9002->9005 9009 6d332d27 __CreateFrameInfo 9002->9009 9003->9009 9006 6d330da4 __dosmaperr 14 API calls 9004->9006 9011 6d332d8e __CreateFrameInfo 9005->9011 9048 6d3309f3 EnterCriticalSection 9005->9048 9007 6d332d4b 9006->9007 9010 6d330cc3 ___std_exception_copy 29 API calls 9007->9010 9009->9004 9009->9005 9012 6d332d30 9009->9012 9010->9012 9013 6d332ec8 9011->9013 9016 6d332dcb 9011->9016 9025 6d332df9 9011->9025 9012->8972 9017 6d332ed3 9013->9017 9080 6d330a3b LeaveCriticalSection 9013->9080 9016->9025 9049 6d3306c7 GetLastError 9016->9049 9019 6d32f7ae __CreateFrameInfo 21 API calls 9017->9019 9021 6d332edb 9019->9021 9022 6d3306c7 _unexpected 39 API calls 9026 6d332e4e 9022->9026 9024 6d3306c7 _unexpected 39 API calls 9024->9025 9076 6d332e74 9025->9076 9026->9012 9027 6d3306c7 _unexpected 39 API calls 9026->9027 9027->9012 9029 6d330ae3 __CreateFrameInfo 9028->9029 9030 6d330b0f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9029->9030 9031 6d330be0 __CreateFrameInfo 9030->9031 9032 6d32c2e0 _ValidateLocalCookies 5 API calls 9031->9032 9033 6d330bfe 9032->9033 9033->8979 9035 6d32f5eb __CreateFrameInfo 21 API calls 9034->9035 9036 6d32f7bf 9035->9036 9038 6d332bdf ___scrt_is_nonwritable_in_current_image 9037->9038 9043 6d3309f3 EnterCriticalSection 9038->9043 9040 6d332bed 9044 6d332c2f 9040->9044 9043->9040 9047 6d330a3b LeaveCriticalSection 9044->9047 9046 6d3300ae 9046->8972 9046->9001 9047->9046 9048->9011 9050 6d3306e3 9049->9050 9051 6d3306dd 9049->9051 9053 6d332736 _unexpected 6 API calls 9050->9053 9075 6d3306e7 SetLastError 9050->9075 9052 6d3326f7 _unexpected 6 API calls 9051->9052 9052->9050 9054 6d3306ff 9053->9054 9056 6d330db7 _unexpected 14 API calls 9054->9056 9054->9075 9057 6d330714 9056->9057 9060 6d33072d 9057->9060 9061 6d33071c 9057->9061 9058 6d330777 9058->9024 9059 6d33077c 9081 6d3300a9 9059->9081 9064 6d332736 _unexpected 6 API calls 9060->9064 9063 6d332736 _unexpected 6 API calls 9061->9063 9066 6d33072a 9063->9066 9067 6d330739 9064->9067 9071 6d330e14 ___free_lconv_mon 14 API calls 9066->9071 9068 6d330754 9067->9068 9069 6d33073d 9067->9069 9072 6d3304c9 _unexpected 14 API calls 9068->9072 9070 6d332736 _unexpected 6 API calls 9069->9070 9070->9066 9071->9075 9073 6d33075f 9072->9073 9074 6d330e14 ___free_lconv_mon 14 API calls 9073->9074 9074->9075 9075->9058 9075->9059 9077 6d332e78 9076->9077 9079 6d332e40 9076->9079 9092 6d330a3b LeaveCriticalSection 9077->9092 9079->9012 9079->9022 9079->9026 9080->9017 9082 6d332ca5 __CreateFrameInfo 2 API calls 9081->9082 9083 6d3300ae 9082->9083 9084 6d3300b9 9083->9084 9085 6d332cea __CreateFrameInfo 38 API calls 9083->9085 9086 6d3300c3 IsProcessorFeaturePresent 9084->9086 9091 6d3300e2 9084->9091 9085->9084 9088 6d3300cf 9086->9088 9087 6d32f7ae __CreateFrameInfo 21 API calls 9089 6d3300ec 9087->9089 9090 6d330ac7 __CreateFrameInfo 8 API calls 9088->9090 9090->9091 9091->9087 9092->9079 9094 6d32db9e __CreateFrameInfo 49 API calls 9093->9094 9095 6d32efcd 9094->9095 9096 6d32efd8 9095->9096 9097 6d32db9e __CreateFrameInfo 49 API calls 9095->9097 9096->8984 9097->9096 9099 6d32db9e __CreateFrameInfo 49 API calls 9098->9099 9100 6d32dfd0 9099->9100 9101 6d32dfe6 9100->9101 9102 6d32dfd8 9100->9102 9103 6d32db9e __CreateFrameInfo 49 API calls 9101->9103 9104 6d32db9e __CreateFrameInfo 49 API calls 9102->9104 9106 6d32dfeb 9103->9106 9105 6d32dfe0 9104->9105 9105->8991 9106->9105 9107 6d3300a9 CallUnexpected 39 API calls 9106->9107 9108 6d32e00e 9107->9108 9109 6d32c2e0 _ValidateLocalCookies 5 API calls 9108->9109 9111 6d32e023 CatchGuardHandler 9109->9111 9110 6d32e02e 9110->8991 9111->9110 9112 6d32e07d 9111->9112 9118 6d32df1f RtlUnwind 9111->9118 9119 6d32ddff 9112->9119 9116 6d32db9e __CreateFrameInfo 49 API calls 9115->9116 9117 6d32d91c 9116->9117 9117->8997 9118->9112 9120 6d32de21 __InternalCxxFrameHandler 9119->9120 9122 6d32de0f 9119->9122 9121 6d32db9e __CreateFrameInfo 49 API calls 9120->9121 9121->9122 9122->9110 9123 6d32c927 9124 6d32c92f ___scrt_release_startup_lock 9123->9124 9127 6d32f335 9124->9127 9126 6d32c957 9128 6d32f344 9127->9128 9129 6d32f348 9127->9129 9128->9126 9132 6d32f355 9129->9132 9133 6d330818 __dosmaperr 14 API calls 9132->9133 9134 6d32f351 9133->9134 9134->9126 9135 6d32e424 9136 6d32e43b 9135->9136 9137 6d3300a9 CallUnexpected 39 API calls 9136->9137 9138 6d32e440 9137->9138 8159 6d32c62e 8160 6d32c637 8159->8160 8161 6d32c63c 8159->8161 8176 6d32c7c0 8160->8176 8165 6d32c4f8 8161->8165 8166 6d32c504 ___scrt_is_nonwritable_in_current_image 8165->8166 8167 6d32c52d dllmain_raw 8166->8167 8172 6d32c528 __DllMainCRTStartup@12 8166->8172 8173 6d32c513 8166->8173 8168 6d32c547 dllmain_crt_dispatch 8167->8168 8167->8173 8168->8172 8168->8173 8169 6d32c599 8170 6d32c5a2 dllmain_crt_dispatch 8169->8170 8169->8173 8171 6d32c5b5 dllmain_raw 8170->8171 8170->8173 8171->8173 8172->8169 8180 6d32c448 8172->8180 8175 6d32c58e dllmain_raw 8175->8169 8177 6d32c7d6 8176->8177 8178 6d32c7df 8177->8178 8496 6d32c773 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8177->8496 8178->8161 8182 6d32c454 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 8180->8182 8181 6d32c45d 8181->8175 8182->8181 8183 6d32c4f0 8182->8183 8184 6d32c485 8182->8184 8224 6d32cb2a IsProcessorFeaturePresent 8183->8224 8203 6d32c95b 8184->8203 8187 6d32c48a 8212 6d32c817 8187->8212 8189 6d32c4f7 ___scrt_is_nonwritable_in_current_image 8190 6d32c52d dllmain_raw 8189->8190 8199 6d32c528 __DllMainCRTStartup@12 8189->8199 8200 6d32c513 8189->8200 8192 6d32c547 dllmain_crt_dispatch 8190->8192 8190->8200 8191 6d32c48f __RTC_Initialize __DllMainCRTStartup@12 8215 6d32cafc 8191->8215 8192->8199 8192->8200 8196 6d32c599 8197 6d32c5a2 dllmain_crt_dispatch 8196->8197 8196->8200 8198 6d32c5b5 dllmain_raw 8197->8198 8197->8200 8198->8200 8199->8196 8201 6d32c448 __DllMainCRTStartup@12 81 API calls 8199->8201 8200->8175 8202 6d32c58e dllmain_raw 8201->8202 8202->8196 8204 6d32c960 ___scrt_release_startup_lock 8203->8204 8205 6d32c964 8204->8205 8208 6d32c970 __DllMainCRTStartup@12 8204->8208 8228 6d32fe02 8205->8228 8207 6d32c96e 8207->8187 8209 6d32c97d 8208->8209 8232 6d32f5eb 8208->8232 8209->8187 8369 6d32d79a InterlockedFlushSList 8212->8369 8216 6d32cb08 8215->8216 8220 6d32c4ae 8216->8220 8376 6d32ffab 8216->8376 8218 6d32cb16 8381 6d32d7ef 8218->8381 8221 6d32c4ea 8220->8221 8479 6d32c97e 8221->8479 8225 6d32cb40 __CreateFrameInfo 8224->8225 8226 6d32cbeb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8225->8226 8227 6d32cc2f __CreateFrameInfo 8226->8227 8227->8189 8229 6d32fe0e __EH_prolog3 8228->8229 8243 6d32fccd 8229->8243 8231 6d32fe35 __DllMainCRTStartup@12 8231->8207 8233 6d32f618 8232->8233 8241 6d32f629 8232->8241 8314 6d32f6b3 GetModuleHandleW 8233->8314 8237 6d32f667 8237->8187 8321 6d32f49b 8241->8321 8244 6d32fcd9 ___scrt_is_nonwritable_in_current_image 8243->8244 8251 6d3309f3 EnterCriticalSection 8244->8251 8246 6d32fce7 8252 6d32fd28 8246->8252 8251->8246 8253 6d32fcf4 8252->8253 8255 6d32fd47 8252->8255 8256 6d32fd1c 8253->8256 8255->8253 8259 6d330e14 8255->8259 8313 6d330a3b LeaveCriticalSection 8256->8313 8258 6d32fd05 8258->8231 8260 6d330e1f HeapFree 8259->8260 8261 6d330e49 8259->8261 8260->8261 8262 6d330e34 GetLastError 8260->8262 8261->8253 8263 6d330e41 __dosmaperr 8262->8263 8265 6d330da4 8263->8265 8268 6d330818 GetLastError 8265->8268 8267 6d330da9 8267->8261 8269 6d33082e 8268->8269 8273 6d330834 8268->8273 8291 6d3326f7 8269->8291 8288 6d330838 SetLastError 8273->8288 8296 6d332736 8273->8296 8277 6d33087e 8280 6d332736 _unexpected 6 API calls 8277->8280 8278 6d33086d 8279 6d332736 _unexpected 6 API calls 8278->8279 8281 6d33087b 8279->8281 8282 6d33088a 8280->8282 8285 6d330e14 ___free_lconv_mon 12 API calls 8281->8285 8283 6d3308a5 8282->8283 8284 6d33088e 8282->8284 8308 6d3304c9 8283->8308 8287 6d332736 _unexpected 6 API calls 8284->8287 8285->8288 8287->8281 8288->8267 8290 6d330e14 ___free_lconv_mon 12 API calls 8290->8288 8292 6d332595 _unexpected 5 API calls 8291->8292 8293 6d332713 8292->8293 8294 6d33272e TlsGetValue 8293->8294 8295 6d33271c 8293->8295 8295->8273 8297 6d332595 _unexpected 5 API calls 8296->8297 8298 6d332752 8297->8298 8299 6d332770 TlsSetValue 8298->8299 8300 6d330850 8298->8300 8300->8288 8301 6d330db7 8300->8301 8307 6d330dc4 _unexpected 8301->8307 8302 6d330e04 8304 6d330da4 __dosmaperr 13 API calls 8302->8304 8303 6d330def RtlAllocateHeap 8305 6d330865 8303->8305 8303->8307 8304->8305 8305->8277 8305->8278 8306 6d332b50 _unexpected EnterCriticalSection LeaveCriticalSection 8306->8307 8307->8302 8307->8303 8307->8306 8309 6d33035d _unexpected EnterCriticalSection LeaveCriticalSection 8308->8309 8310 6d330537 8309->8310 8311 6d33046f _unexpected 14 API calls 8310->8311 8312 6d330560 8311->8312 8312->8290 8313->8258 8315 6d32f61d 8314->8315 8315->8241 8316 6d32f70e GetModuleHandleExW 8315->8316 8317 6d32f74d GetProcAddress 8316->8317 8320 6d32f761 8316->8320 8317->8320 8318 6d32f774 FreeLibrary 8319 6d32f77d 8318->8319 8319->8241 8320->8318 8320->8319 8322 6d32f4a7 ___scrt_is_nonwritable_in_current_image 8321->8322 8336 6d3309f3 EnterCriticalSection 8322->8336 8324 6d32f4b1 8337 6d32f503 8324->8337 8326 6d32f4be 8341 6d32f4dc 8326->8341 8329 6d32f682 8345 6d32f6f5 8329->8345 8331 6d32f68c 8332 6d32f6a0 8331->8332 8333 6d32f690 GetCurrentProcess TerminateProcess 8331->8333 8334 6d32f70e __CreateFrameInfo 3 API calls 8332->8334 8333->8332 8335 6d32f6a8 ExitProcess 8334->8335 8336->8324 8338 6d32f50f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 8337->8338 8339 6d32fe02 __DllMainCRTStartup@12 14 API calls 8338->8339 8340 6d32f573 __CreateFrameInfo 8338->8340 8339->8340 8340->8326 8344 6d330a3b LeaveCriticalSection 8341->8344 8343 6d32f4ca 8343->8237 8343->8329 8344->8343 8348 6d330a77 8345->8348 8347 6d32f6fa __CreateFrameInfo 8347->8331 8349 6d330a86 __CreateFrameInfo 8348->8349 8350 6d330a93 8349->8350 8352 6d33261a 8349->8352 8350->8347 8355 6d332595 8352->8355 8354 6d332636 8354->8350 8356 6d3325c5 8355->8356 8360 6d3325c1 _unexpected 8355->8360 8356->8360 8361 6d3324ca 8356->8361 8359 6d3325df GetProcAddress 8359->8360 8360->8354 8367 6d3324db ___vcrt_InitializeCriticalSectionEx 8361->8367 8362 6d332571 8362->8359 8362->8360 8363 6d3324f9 LoadLibraryExW 8364 6d332514 GetLastError 8363->8364 8365 6d332578 8363->8365 8364->8367 8365->8362 8366 6d33258a FreeLibrary 8365->8366 8366->8362 8367->8362 8367->8363 8368 6d332547 LoadLibraryExW 8367->8368 8368->8365 8368->8367 8371 6d32d7aa 8369->8371 8372 6d32c821 8369->8372 8371->8372 8373 6d330029 8371->8373 8372->8191 8374 6d330e14 ___free_lconv_mon 14 API calls 8373->8374 8375 6d330041 8374->8375 8375->8371 8377 6d32ffb6 8376->8377 8378 6d32ffc8 ___scrt_uninitialize_crt 8376->8378 8379 6d32ffc4 8377->8379 8387 6d3331e5 8377->8387 8378->8218 8379->8218 8382 6d32d802 8381->8382 8383 6d32d7f8 8381->8383 8382->8220 8454 6d32dc71 8383->8454 8390 6d333076 8387->8390 8393 6d332fca 8390->8393 8394 6d332fd6 ___scrt_is_nonwritable_in_current_image 8393->8394 8401 6d3309f3 EnterCriticalSection 8394->8401 8396 6d332fe0 ___scrt_uninitialize_crt 8397 6d33304c 8396->8397 8402 6d332f3e 8396->8402 8410 6d33306a 8397->8410 8401->8396 8403 6d332f4a ___scrt_is_nonwritable_in_current_image 8402->8403 8413 6d333302 EnterCriticalSection 8403->8413 8405 6d332f8d 8425 6d332fbe 8405->8425 8406 6d332f54 ___scrt_uninitialize_crt 8406->8405 8414 6d333180 8406->8414 8453 6d330a3b LeaveCriticalSection 8410->8453 8412 6d333058 8412->8379 8413->8406 8415 6d333195 ___std_exception_copy 8414->8415 8416 6d3331a7 8415->8416 8417 6d33319c 8415->8417 8428 6d333117 8416->8428 8418 6d333076 ___scrt_uninitialize_crt 68 API calls 8417->8418 8421 6d3331a2 ___std_exception_copy 8418->8421 8421->8405 8423 6d3331c8 8441 6d334815 8423->8441 8452 6d333316 LeaveCriticalSection 8425->8452 8427 6d332fac 8427->8396 8429 6d333130 8428->8429 8433 6d333157 8428->8433 8430 6d333567 ___scrt_uninitialize_crt 29 API calls 8429->8430 8429->8433 8431 6d33314c 8430->8431 8432 6d335034 ___scrt_uninitialize_crt 64 API calls 8431->8432 8432->8433 8433->8421 8434 6d333567 8433->8434 8435 6d333573 8434->8435 8436 6d333588 8434->8436 8437 6d330da4 __dosmaperr 14 API calls 8435->8437 8436->8423 8438 6d333578 8437->8438 8439 6d330cc3 ___std_exception_copy 29 API calls 8438->8439 8440 6d333583 8439->8440 8440->8423 8442 6d334826 8441->8442 8443 6d334833 8441->8443 8445 6d330da4 __dosmaperr 14 API calls 8442->8445 8444 6d33487c 8443->8444 8447 6d33485a 8443->8447 8446 6d330da4 __dosmaperr 14 API calls 8444->8446 8451 6d33482b 8445->8451 8448 6d334881 8446->8448 8449 6d334773 ___scrt_uninitialize_crt 33 API calls 8447->8449 8450 6d330cc3 ___std_exception_copy 29 API calls 8448->8450 8449->8451 8450->8451 8451->8421 8452->8427 8453->8412 8455 6d32dc7b 8454->8455 8456 6d32d7fd 8454->8456 8462 6d32e208 8455->8462 8458 6d32dcc8 8456->8458 8459 6d32dcf2 8458->8459 8460 6d32dcd3 8458->8460 8459->8382 8461 6d32dcdd DeleteCriticalSection 8460->8461 8461->8459 8461->8461 8467 6d32e0e2 8462->8467 8465 6d32e23a TlsFree 8466 6d32e22e 8465->8466 8466->8456 8468 6d32e0ff 8467->8468 8471 6d32e103 8467->8471 8468->8465 8468->8466 8469 6d32e16b GetProcAddress 8469->8468 8471->8468 8471->8469 8472 6d32e15c 8471->8472 8474 6d32e182 LoadLibraryExW 8471->8474 8472->8469 8473 6d32e164 FreeLibrary 8472->8473 8473->8469 8475 6d32e1c9 8474->8475 8476 6d32e199 GetLastError 8474->8476 8475->8471 8476->8475 8477 6d32e1a4 ___vcrt_InitializeCriticalSectionEx 8476->8477 8477->8475 8478 6d32e1ba LoadLibraryExW 8477->8478 8478->8471 8484 6d32ffdb 8479->8484 8482 6d32dc71 ___vcrt_uninitialize_ptd 6 API calls 8483 6d32c4ef 8482->8483 8483->8181 8487 6d330998 8484->8487 8488 6d3309a2 8487->8488 8489 6d32c985 8487->8489 8491 6d3326b8 8488->8491 8489->8482 8492 6d332595 _unexpected 5 API calls 8491->8492 8493 6d3326d4 8492->8493 8494 6d3326ef TlsFree 8493->8494 8495 6d3326dd 8493->8495 8495->8489 8496->8178 9785 6d3328ad GetStartupInfoW 9786 6d3328d3 9785->9786 9787 6d332967 9785->9787 9786->9787 9788 6d334594 30 API calls 9786->9788 9789 6d3328fb 9788->9789 9789->9787 9790 6d33292b GetFileType 9789->9790 9790->9789 9139 6d32ec2d 9142 6d32f1b7 9139->9142 9143 6d32f1c4 9142->9143 9144 6d32ec3c 9142->9144 9145 6d330029 ___std_type_info_destroy_list 14 API calls 9143->9145 9145->9144 9791 6d32fe93 9794 6d32fc77 9791->9794 9793 6d32fe98 9795 6d32fc83 __EH_prolog3 9794->9795 9804 6d32fc41 9795->9804 9802 6d32fc12 14 API calls 9803 6d32fcba __DllMainCRTStartup@12 9802->9803 9803->9793 9805 6d32fc53 9804->9805 9806 6d32fc59 9804->9806 9807 6d32fc12 14 API calls 9805->9807 9808 6d32fc5c 9806->9808 9807->9806 9809 6d32fc74 9808->9809 9810 6d32fc6e 9808->9810 9812 6d32fc12 9809->9812 9811 6d32fc12 14 API calls 9810->9811 9811->9809 9813 6d32fc1f 9812->9813 9817 6d32fc3c 9812->9817 9814 6d32fc36 9813->9814 9816 6d330e14 ___free_lconv_mon 14 API calls 9813->9816 9815 6d330e14 ___free_lconv_mon 14 API calls 9814->9815 9815->9817 9816->9813 9817->9802 9149 6d32ed16 9152 6d32ee98 9149->9152 9151 6d32ed1e 9153 6d32eede 9152->9153 9154 6d32eea8 9152->9154 9153->9151 9154->9153 9155 6d32db9e __CreateFrameInfo 49 API calls 9154->9155 9156 6d32eed4 9155->9156 9156->9151 9818 6d33289b GetProcessHeap 9161 6d32d600 9162 6d32d61e __InternalCxxFrameHandler 9161->9162 9173 6d32d5c0 9162->9173 9174 6d32d5d2 9173->9174 9175 6d32d5df 9173->9175 9176 6d32c2e0 _ValidateLocalCookies 5 API calls 9174->9176 9176->9175 9819 6d336480 9822 6d33649e 9819->9822 9821 6d336496 9826 6d3364a3 9822->9826 9823 6d336d63 15 API calls 9824 6d3366cf 9823->9824 9824->9821 9825 6d336538 9825->9821 9826->9823 9826->9825 9177 6d333607 9180 6d33358e 9177->9180 9181 6d33359a ___scrt_is_nonwritable_in_current_image 9180->9181 9188 6d3309f3 EnterCriticalSection 9181->9188 9183 6d3335a4 9184 6d3335d2 9183->9184 9189 6d333978 9183->9189 9193 6d3335f0 9184->9193 9188->9183 9190 6d333993 9189->9190 9191 6d333986 _unexpected 9189->9191 9190->9183 9191->9190 9192 6d3336ab _unexpected 14 API calls 9191->9192 9192->9190 9196 6d330a3b LeaveCriticalSection 9193->9196 9195 6d3335de 9196->9195 9827 6d32ef86 9828 6d32ef28 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 9827->9828 9829 6d32efc8 __FrameHandler3::FrameUnwindToState 49 API calls 9828->9829 9830 6d32efa1 9828->9830 9829->9830 9831 6d3300a9 CallUnexpected 39 API calls 9830->9831 9833 6d32efa6 __FrameHandler3::FrameUnwindToState 9830->9833 9832 6d32efe1 9831->9832 9197 6d32df72 9198 6d32c2e0 _ValidateLocalCookies 5 API calls 9197->9198 9199 6d32df84 CatchGuardHandler 9198->9199 9841 6d330ffb 9842 6d33100b 9841->9842 9851 6d331021 9841->9851 9843 6d330da4 __dosmaperr 14 API calls 9842->9843 9844 6d331010 9843->9844 9845 6d330cc3 ___std_exception_copy 29 API calls 9844->9845 9846 6d33101a 9845->9846 9847 6d33108c 9847->9847 9883 6d32fa7c 9847->9883 9851->9847 9853 6d3310a0 9851->9853 9865 6d331178 9851->9865 9852 6d3310d8 9854 6d330e14 ___free_lconv_mon 14 API calls 9852->9854 9889 6d331530 9853->9889 9854->9853 9855 6d33114e 9856 6d330e14 ___free_lconv_mon 14 API calls 9855->9856 9859 6d33115b 9856->9859 9858 6d3310ee 9858->9855 9862 6d33116b 9858->9862 9895 6d333f75 9858->9895 9860 6d331530 14 API calls 9859->9860 9860->9846 9863 6d330cd3 ___std_exception_copy 11 API calls 9862->9863 9864 6d331177 9863->9864 9866 6d331184 9865->9866 9866->9866 9867 6d330db7 _unexpected 14 API calls 9866->9867 9868 6d3311b2 9867->9868 9869 6d333f75 29 API calls 9868->9869 9870 6d3311de 9869->9870 9871 6d330cd3 ___std_exception_copy 11 API calls 9870->9871 9872 6d331228 9871->9872 9904 6d331579 9872->9904 9877 6d331354 9878 6d331579 39 API calls 9877->9878 9879 6d331391 9878->9879 9912 6d330f18 9879->9912 9882 6d331178 45 API calls 9884 6d32fabf 9883->9884 9885 6d32fa8d 9883->9885 9884->9852 9884->9858 9885->9884 9886 6d330db7 _unexpected 14 API calls 9885->9886 9887 6d32fab6 9886->9887 9888 6d330e14 ___free_lconv_mon 14 API calls 9887->9888 9888->9884 9890 6d33153a 9889->9890 9891 6d33154a 9890->9891 9892 6d330e14 ___free_lconv_mon 14 API calls 9890->9892 9893 6d330e14 ___free_lconv_mon 14 API calls 9891->9893 9892->9890 9894 6d331551 9893->9894 9894->9846 9896 6d333ebe 9895->9896 9897 6d333ed8 9896->9897 9899 6d333eec 9896->9899 9902 6d333f11 9896->9902 9898 6d330da4 __dosmaperr 14 API calls 9897->9898 9897->9899 9900 6d333ee2 9898->9900 9899->9858 9901 6d330cc3 ___std_exception_copy 29 API calls 9900->9901 9901->9899 9902->9899 9903 6d330da4 __dosmaperr 14 API calls 9902->9903 9903->9900 9905 6d3314ae 39 API calls 9904->9905 9906 6d33158b 9905->9906 9907 6d3312f0 9906->9907 9935 6d33265a 9906->9935 9909 6d330fde 9907->9909 9941 6d330e66 9909->9941 9913 6d330f42 9912->9913 9914 6d330f26 9912->9914 9916 6d330f65 9913->9916 9917 6d330f49 9913->9917 9915 6d3315b8 14 API calls 9914->9915 9923 6d330f30 9915->9923 9918 6d3322cc ___scrt_uninitialize_crt WideCharToMultiByte 9916->9918 9917->9923 9976 6d3315d2 9917->9976 9919 6d330f75 9918->9919 9921 6d330f92 9919->9921 9922 6d330f7c GetLastError 9919->9922 9925 6d330fa3 9921->9925 9927 6d3315d2 15 API calls 9921->9927 9924 6d330d4a __dosmaperr 14 API calls 9922->9924 9923->9882 9926 6d330f88 9924->9926 9925->9923 9981 6d331555 9925->9981 9929 6d330da4 __dosmaperr 14 API calls 9926->9929 9927->9925 9929->9923 9931 6d330fbd GetLastError 9932 6d330d4a __dosmaperr 14 API calls 9931->9932 9933 6d330fc9 9932->9933 9934 6d330da4 __dosmaperr 14 API calls 9933->9934 9934->9923 9938 6d33247c 9935->9938 9939 6d332595 _unexpected 5 API calls 9938->9939 9940 6d332492 9939->9940 9940->9907 9942 6d330e74 9941->9942 9943 6d330e8e 9941->9943 9959 6d3315b8 9942->9959 9945 6d330e95 9943->9945 9946 6d330eb4 9943->9946 9947 6d330e7e FindFirstFileExW 9945->9947 9963 6d33160e 9945->9963 9948 6d332212 ___scrt_uninitialize_crt MultiByteToWideChar 9946->9948 9947->9877 9949 6d330ec3 9948->9949 9951 6d330eca GetLastError 9949->9951 9954 6d33160e 15 API calls 9949->9954 9957 6d330ef0 9949->9957 9968 6d330d4a 9951->9968 9954->9957 9955 6d332212 ___scrt_uninitialize_crt MultiByteToWideChar 9958 6d330f07 9955->9958 9956 6d330da4 __dosmaperr 14 API calls 9956->9947 9957->9947 9957->9955 9958->9947 9958->9951 9960 6d3315c3 9959->9960 9961 6d3315cb 9959->9961 9962 6d330e14 ___free_lconv_mon 14 API calls 9960->9962 9961->9947 9962->9961 9964 6d3315b8 14 API calls 9963->9964 9965 6d33161c 9964->9965 9973 6d33164d 9965->9973 9969 6d330d91 __dosmaperr 14 API calls 9968->9969 9970 6d330d55 __dosmaperr 9969->9970 9971 6d330da4 __dosmaperr 14 API calls 9970->9971 9972 6d330d68 9971->9972 9972->9956 9974 6d33332a 15 API calls 9973->9974 9975 6d33162d 9974->9975 9975->9947 9977 6d3315b8 14 API calls 9976->9977 9978 6d3315e0 9977->9978 9979 6d33164d 15 API calls 9978->9979 9980 6d3315ee 9979->9980 9980->9923 9982 6d3322cc ___scrt_uninitialize_crt WideCharToMultiByte 9981->9982 9983 6d330fb9 9982->9983 9983->9923 9983->9931 9200 6d335b7f 9201 6d335b88 9200->9201 9202 6d335c2e 9201->9202 9205 6d335baf 9201->9205 9203 6d336d27 20 API calls 9202->9203 9206 6d335c3e 9203->9206 9204 6d336c50 9205->9204 9207 6d336d27 20 API calls 9205->9207 9208 6d336c4e 9207->9208 9209 6d32ef7c 9212 6d32d95f 9209->9212 9213 6d32d983 9212->9213 9214 6d32d971 9212->9214 9215 6d32db9e __CreateFrameInfo 49 API calls 9213->9215 9214->9213 9216 6d32d979 9214->9216 9218 6d32d988 9215->9218 9217 6d32d981 9216->9217 9219 6d32db9e __CreateFrameInfo 49 API calls 9216->9219 9218->9217 9220 6d32db9e __CreateFrameInfo 49 API calls 9218->9220 9221 6d32d9a1 9219->9221 9220->9217 9222 6d32db9e __CreateFrameInfo 49 API calls 9221->9222 9223 6d32d9ac 9222->9223 9226 6d32ffed 9223->9226 9227 6d32fff9 ___scrt_is_nonwritable_in_current_image 9226->9227 9228 6d3306c7 _unexpected 39 API calls 9227->9228 9229 6d32fffe 9228->9229 9230 6d3300a9 CallUnexpected 39 API calls 9229->9230 9231 6d330028 9230->9231 9232 6d332a7c 9233 6d332a81 9232->9233 9235 6d332aa4 9233->9235 9236 6d33455f 9233->9236 9237 6d33458e 9236->9237 9238 6d33456c 9236->9238 9237->9233 9239 6d33457a DeleteCriticalSection 9238->9239 9240 6d334588 9238->9240 9239->9239 9239->9240 9241 6d330e14 ___free_lconv_mon 14 API calls 9240->9241 9241->9237 9984 6d32f5e2 9985 6d32ffed _unexpected 39 API calls 9984->9985 9986 6d32f5ea 9985->9986 9242 6d332161 GetCommandLineA GetCommandLineW 9243 6d32da60 9244 6d32da72 9243->9244 9246 6d32da80 9243->9246 9245 6d32c2e0 _ValidateLocalCookies 5 API calls 9244->9245 9245->9246 9247 6d332865 9248 6d332870 9247->9248 9249 6d332896 9247->9249 9248->9249 9250 6d332880 FreeLibrary 9248->9250 9250->9248 9251 6d33646a IsProcessorFeaturePresent 9252 6d338069 9253 6d32c2e0 _ValidateLocalCookies 5 API calls 9252->9253 9254 6d33807f 9253->9254 9255 6d32c2e0 _ValidateLocalCookies 5 API calls 9254->9255 9256 6d338089 9255->9256 9257 6d333c69 9258 6d333a1e 9257->9258 9259 6d32c2e0 _ValidateLocalCookies 5 API calls 9258->9259 9260 6d333a2b 9259->9260 9987 6d333ce9 9988 6d333a1e 9987->9988 9988->9988 9989 6d32c2e0 _ValidateLocalCookies 5 API calls 9988->9989 9990 6d333a2b 9989->9990 9991 6d32fee9 9992 6d330e14 ___free_lconv_mon 14 API calls 9991->9992 9993 6d32fef7 9992->9993 9994 6d330e14 ___free_lconv_mon 14 API calls 9993->9994 9995 6d32ff0a 9994->9995 9996 6d330e14 ___free_lconv_mon 14 API calls 9995->9996 9997 6d32ff1b 9996->9997 9998 6d330e14 ___free_lconv_mon 14 API calls 9997->9998 9999 6d32ff2c 9998->9999 8497 6d32c2ee 8498 6d32c2f9 8497->8498 8499 6d32c32c 8497->8499 8501 6d32c31e 8498->8501 8502 6d32c2fe 8498->8502 8500 6d32c448 __DllMainCRTStartup@12 86 API calls 8499->8500 8508 6d32c308 8500->8508 8509 6d32c341 8501->8509 8503 6d32c303 8502->8503 8504 6d32c314 8502->8504 8503->8508 8523 6d32c91a 8503->8523 8528 6d32c8fb 8504->8528 8510 6d32c34d ___scrt_is_nonwritable_in_current_image 8509->8510 8536 6d32c98b 8510->8536 8512 6d32c354 __DllMainCRTStartup@12 8513 6d32c440 8512->8513 8514 6d32c37b 8512->8514 8522 6d32c3b7 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 8512->8522 8516 6d32cb2a __DllMainCRTStartup@12 4 API calls 8513->8516 8547 6d32c8ed 8514->8547 8517 6d32c447 8516->8517 8518 6d32c38a __RTC_Initialize 8518->8522 8550 6d32c80b InitializeSListHead 8518->8550 8520 6d32c398 8520->8522 8551 6d32c8c2 8520->8551 8522->8508 8695 6d32ffa3 8523->8695 8898 6d32d7dc 8528->8898 8533 6d32c917 8533->8508 8534 6d32d7e7 21 API calls 8535 6d32c904 8534->8535 8535->8508 8537 6d32c994 8536->8537 8555 6d32cce8 IsProcessorFeaturePresent 8537->8555 8541 6d32c9a5 8546 6d32c9a9 8541->8546 8565 6d32ff86 8541->8565 8544 6d32c9c0 8544->8512 8545 6d32d7ef ___scrt_uninitialize_crt 7 API calls 8545->8546 8546->8512 8689 6d32c9c4 8547->8689 8549 6d32c8f4 8549->8518 8550->8520 8552 6d32c8c7 ___scrt_release_startup_lock 8551->8552 8553 6d32cce8 IsProcessorFeaturePresent 8552->8553 8554 6d32c8d0 8552->8554 8553->8554 8554->8522 8556 6d32c9a0 8555->8556 8557 6d32d7bd 8556->8557 8568 6d32dc8c 8557->8568 8560 6d32d7c6 8560->8541 8562 6d32d7ce 8563 6d32d7d9 8562->8563 8564 6d32dcc8 ___vcrt_uninitialize_locks DeleteCriticalSection 8562->8564 8563->8541 8564->8560 8597 6d332aa8 8565->8597 8569 6d32dc95 8568->8569 8571 6d32dcbe 8569->8571 8572 6d32d7c2 8569->8572 8582 6d32e2bc 8569->8582 8573 6d32dcc8 ___vcrt_uninitialize_locks DeleteCriticalSection 8571->8573 8572->8560 8574 6d32dc3e 8572->8574 8573->8572 8587 6d32e1cd 8574->8587 8577 6d32dc53 8577->8562 8580 6d32dc6e 8580->8562 8581 6d32dc71 ___vcrt_uninitialize_ptd 6 API calls 8581->8577 8583 6d32e0e2 ___vcrt_InitializeCriticalSectionEx 5 API calls 8582->8583 8584 6d32e2d6 8583->8584 8585 6d32e2f4 InitializeCriticalSectionAndSpinCount 8584->8585 8586 6d32e2df 8584->8586 8585->8586 8586->8569 8588 6d32e0e2 ___vcrt_InitializeCriticalSectionEx 5 API calls 8587->8588 8589 6d32e1e7 8588->8589 8590 6d32e200 TlsAlloc 8589->8590 8591 6d32dc48 8589->8591 8591->8577 8592 6d32e27e 8591->8592 8593 6d32e0e2 ___vcrt_InitializeCriticalSectionEx 5 API calls 8592->8593 8594 6d32e298 8593->8594 8595 6d32e2b3 TlsSetValue 8594->8595 8596 6d32dc61 8594->8596 8595->8596 8596->8580 8596->8581 8598 6d32c9b2 8597->8598 8599 6d332ab8 8597->8599 8598->8544 8598->8545 8599->8598 8602 6d33296c 8599->8602 8607 6d332a1c 8599->8607 8603 6d332973 8602->8603 8604 6d3329b6 GetStdHandle 8603->8604 8605 6d332a18 8603->8605 8606 6d3329c9 GetFileType 8603->8606 8604->8603 8605->8599 8606->8603 8608 6d332a28 ___scrt_is_nonwritable_in_current_image 8607->8608 8619 6d3309f3 EnterCriticalSection 8608->8619 8610 6d332a2f 8620 6d334594 8610->8620 8613 6d332a4d 8639 6d332a73 8613->8639 8618 6d33296c 2 API calls 8618->8613 8619->8610 8621 6d3345a0 ___scrt_is_nonwritable_in_current_image 8620->8621 8622 6d3345ca 8621->8622 8623 6d3345a9 8621->8623 8642 6d3309f3 EnterCriticalSection 8622->8642 8624 6d330da4 __dosmaperr 14 API calls 8623->8624 8626 6d3345ae 8624->8626 8650 6d330cc3 8626->8650 8628 6d332a3e 8628->8613 8633 6d3328b6 GetStartupInfoW 8628->8633 8629 6d334602 8653 6d334629 8629->8653 8631 6d3345d6 8631->8629 8643 6d3344e4 8631->8643 8634 6d332967 8633->8634 8635 6d3328d3 8633->8635 8634->8618 8635->8634 8636 6d334594 30 API calls 8635->8636 8637 6d3328fb 8636->8637 8637->8634 8638 6d33292b GetFileType 8637->8638 8638->8637 8688 6d330a3b LeaveCriticalSection 8639->8688 8641 6d332a5e 8641->8599 8642->8631 8644 6d330db7 _unexpected 14 API calls 8643->8644 8646 6d3344f6 8644->8646 8645 6d334503 8647 6d330e14 ___free_lconv_mon 14 API calls 8645->8647 8646->8645 8656 6d332778 8646->8656 8649 6d334558 8647->8649 8649->8631 8661 6d330c0f 8650->8661 8652 6d330ccf 8652->8628 8687 6d330a3b LeaveCriticalSection 8653->8687 8655 6d334630 8655->8628 8657 6d332595 _unexpected 5 API calls 8656->8657 8658 6d332794 8657->8658 8659 6d3327b2 InitializeCriticalSectionAndSpinCount 8658->8659 8660 6d33279d 8658->8660 8659->8660 8660->8646 8662 6d330c21 ___std_exception_copy 8661->8662 8665 6d330c46 8662->8665 8664 6d330c39 ___std_exception_copy 8664->8652 8666 6d330c5d 8665->8666 8667 6d330c56 8665->8667 8672 6d330c6b 8666->8672 8680 6d330a9e 8666->8680 8676 6d330190 GetLastError 8667->8676 8670 6d330c92 8670->8672 8683 6d330cd3 IsProcessorFeaturePresent 8670->8683 8672->8664 8673 6d330cc2 8674 6d330c0f ___std_exception_copy 29 API calls 8673->8674 8675 6d330ccf 8674->8675 8675->8664 8677 6d3301a9 8676->8677 8678 6d3308c9 ___std_exception_copy 14 API calls 8677->8678 8679 6d3301c5 SetLastError 8678->8679 8679->8666 8681 6d330ac2 8680->8681 8682 6d330aa9 GetLastError SetLastError 8680->8682 8681->8670 8682->8670 8684 6d330cdf 8683->8684 8685 6d330ac7 __CreateFrameInfo 8 API calls 8684->8685 8686 6d330cf4 GetCurrentProcess TerminateProcess 8685->8686 8686->8673 8687->8655 8688->8641 8690 6d32c9d0 8689->8690 8691 6d32c9d4 8689->8691 8690->8549 8692 6d32cb2a __DllMainCRTStartup@12 4 API calls 8691->8692 8694 6d32c9e1 ___scrt_release_startup_lock 8691->8694 8693 6d32ca4a 8692->8693 8694->8549 8701 6d33069b 8695->8701 8698 6d32d7e7 8881 6d32db73 8698->8881 8702 6d3306a5 8701->8702 8705 6d32c91f 8701->8705 8703 6d3326f7 _unexpected 6 API calls 8702->8703 8704 6d3306ac 8703->8704 8704->8705 8706 6d332736 _unexpected 6 API calls 8704->8706 8705->8698 8707 6d3306bf 8706->8707 8709 6d330562 8707->8709 8710 6d33057d 8709->8710 8711 6d33056d 8709->8711 8710->8705 8715 6d330583 8711->8715 8714 6d330e14 ___free_lconv_mon 14 API calls 8714->8710 8716 6d33059e 8715->8716 8717 6d330598 8715->8717 8719 6d330e14 ___free_lconv_mon 14 API calls 8716->8719 8718 6d330e14 ___free_lconv_mon 14 API calls 8717->8718 8718->8716 8720 6d3305aa 8719->8720 8721 6d330e14 ___free_lconv_mon 14 API calls 8720->8721 8722 6d3305b5 8721->8722 8723 6d330e14 ___free_lconv_mon 14 API calls 8722->8723 8724 6d3305c0 8723->8724 8725 6d330e14 ___free_lconv_mon 14 API calls 8724->8725 8726 6d3305cb 8725->8726 8727 6d330e14 ___free_lconv_mon 14 API calls 8726->8727 8728 6d3305d6 8727->8728 8729 6d330e14 ___free_lconv_mon 14 API calls 8728->8729 8730 6d3305e1 8729->8730 8731 6d330e14 ___free_lconv_mon 14 API calls 8730->8731 8732 6d3305ec 8731->8732 8733 6d330e14 ___free_lconv_mon 14 API calls 8732->8733 8734 6d3305f7 8733->8734 8735 6d330e14 ___free_lconv_mon 14 API calls 8734->8735 8736 6d330605 8735->8736 8741 6d3303af 8736->8741 8742 6d3303bb ___scrt_is_nonwritable_in_current_image 8741->8742 8757 6d3309f3 EnterCriticalSection 8742->8757 8744 6d3303ef 8758 6d33040e 8744->8758 8747 6d3303c5 8747->8744 8748 6d330e14 ___free_lconv_mon 14 API calls 8747->8748 8748->8744 8749 6d33041a 8750 6d330426 ___scrt_is_nonwritable_in_current_image 8749->8750 8762 6d3309f3 EnterCriticalSection 8750->8762 8752 6d330430 8763 6d330650 8752->8763 8754 6d330443 8767 6d330463 8754->8767 8757->8747 8761 6d330a3b LeaveCriticalSection 8758->8761 8760 6d3303fc 8760->8749 8761->8760 8762->8752 8764 6d330686 _unexpected 8763->8764 8765 6d33065f _unexpected 8763->8765 8764->8754 8765->8764 8770 6d3336ab 8765->8770 8880 6d330a3b LeaveCriticalSection 8767->8880 8769 6d330451 8769->8714 8772 6d33372b 8770->8772 8773 6d3336c1 8770->8773 8774 6d330e14 ___free_lconv_mon 14 API calls 8772->8774 8797 6d333779 8772->8797 8773->8772 8777 6d3336f4 8773->8777 8780 6d330e14 ___free_lconv_mon 14 API calls 8773->8780 8775 6d33374d 8774->8775 8776 6d330e14 ___free_lconv_mon 14 API calls 8775->8776 8778 6d333760 8776->8778 8782 6d330e14 ___free_lconv_mon 14 API calls 8777->8782 8796 6d333716 8777->8796 8783 6d330e14 ___free_lconv_mon 14 API calls 8778->8783 8779 6d330e14 ___free_lconv_mon 14 API calls 8784 6d333720 8779->8784 8786 6d3336e9 8780->8786 8781 6d333787 8785 6d3337e7 8781->8785 8792 6d330e14 14 API calls ___free_lconv_mon 8781->8792 8787 6d33370b 8782->8787 8788 6d33376e 8783->8788 8789 6d330e14 ___free_lconv_mon 14 API calls 8784->8789 8790 6d330e14 ___free_lconv_mon 14 API calls 8785->8790 8798 6d335626 8786->8798 8826 6d335724 8787->8826 8794 6d330e14 ___free_lconv_mon 14 API calls 8788->8794 8789->8772 8795 6d3337ed 8790->8795 8792->8781 8794->8797 8795->8764 8796->8779 8838 6d33381c 8797->8838 8799 6d335637 8798->8799 8825 6d335720 8798->8825 8800 6d335648 8799->8800 8801 6d330e14 ___free_lconv_mon 14 API calls 8799->8801 8802 6d330e14 ___free_lconv_mon 14 API calls 8800->8802 8803 6d33565a 8800->8803 8801->8800 8802->8803 8804 6d33566c 8803->8804 8806 6d330e14 ___free_lconv_mon 14 API calls 8803->8806 8805 6d33567e 8804->8805 8807 6d330e14 ___free_lconv_mon 14 API calls 8804->8807 8808 6d335690 8805->8808 8809 6d330e14 ___free_lconv_mon 14 API calls 8805->8809 8806->8804 8807->8805 8810 6d3356a2 8808->8810 8811 6d330e14 ___free_lconv_mon 14 API calls 8808->8811 8809->8808 8812 6d3356b4 8810->8812 8814 6d330e14 ___free_lconv_mon 14 API calls 8810->8814 8811->8810 8813 6d3356c6 8812->8813 8815 6d330e14 ___free_lconv_mon 14 API calls 8812->8815 8816 6d3356d8 8813->8816 8817 6d330e14 ___free_lconv_mon 14 API calls 8813->8817 8814->8812 8815->8813 8818 6d3356ea 8816->8818 8819 6d330e14 ___free_lconv_mon 14 API calls 8816->8819 8817->8816 8820 6d3356fc 8818->8820 8822 6d330e14 ___free_lconv_mon 14 API calls 8818->8822 8819->8818 8821 6d33570e 8820->8821 8823 6d330e14 ___free_lconv_mon 14 API calls 8820->8823 8824 6d330e14 ___free_lconv_mon 14 API calls 8821->8824 8821->8825 8822->8820 8823->8821 8824->8825 8825->8777 8827 6d335731 8826->8827 8837 6d335789 8826->8837 8828 6d330e14 ___free_lconv_mon 14 API calls 8827->8828 8829 6d335741 8827->8829 8828->8829 8831 6d335753 8829->8831 8832 6d330e14 ___free_lconv_mon 14 API calls 8829->8832 8830 6d335765 8834 6d335777 8830->8834 8835 6d330e14 ___free_lconv_mon 14 API calls 8830->8835 8831->8830 8833 6d330e14 ___free_lconv_mon 14 API calls 8831->8833 8832->8831 8833->8830 8836 6d330e14 ___free_lconv_mon 14 API calls 8834->8836 8834->8837 8835->8834 8836->8837 8837->8796 8839 6d333829 8838->8839 8843 6d333848 8838->8843 8839->8843 8844 6d3357b2 8839->8844 8842 6d330e14 ___free_lconv_mon 14 API calls 8842->8843 8843->8781 8845 6d333842 8844->8845 8846 6d3357c3 8844->8846 8845->8842 8847 6d33578d _unexpected 14 API calls 8846->8847 8848 6d3357cb 8847->8848 8849 6d33578d _unexpected 14 API calls 8848->8849 8850 6d3357d6 8849->8850 8851 6d33578d _unexpected 14 API calls 8850->8851 8852 6d3357e1 8851->8852 8853 6d33578d _unexpected 14 API calls 8852->8853 8854 6d3357ec 8853->8854 8855 6d33578d _unexpected 14 API calls 8854->8855 8856 6d3357fa 8855->8856 8857 6d330e14 ___free_lconv_mon 14 API calls 8856->8857 8858 6d335805 8857->8858 8859 6d330e14 ___free_lconv_mon 14 API calls 8858->8859 8860 6d335810 8859->8860 8861 6d330e14 ___free_lconv_mon 14 API calls 8860->8861 8862 6d33581b 8861->8862 8863 6d33578d _unexpected 14 API calls 8862->8863 8864 6d335829 8863->8864 8865 6d33578d _unexpected 14 API calls 8864->8865 8866 6d335837 8865->8866 8867 6d33578d _unexpected 14 API calls 8866->8867 8868 6d335848 8867->8868 8869 6d33578d _unexpected 14 API calls 8868->8869 8870 6d335856 8869->8870 8871 6d33578d _unexpected 14 API calls 8870->8871 8872 6d335864 8871->8872 8873 6d330e14 ___free_lconv_mon 14 API calls 8872->8873 8874 6d33586f 8873->8874 8875 6d330e14 ___free_lconv_mon 14 API calls 8874->8875 8876 6d33587a 8875->8876 8877 6d330e14 ___free_lconv_mon 14 API calls 8876->8877 8878 6d335885 8877->8878 8879 6d330e14 ___free_lconv_mon 14 API calls 8878->8879 8879->8845 8880->8769 8882 6d32c924 8881->8882 8883 6d32db7d 8881->8883 8882->8508 8889 6d32e243 8883->8889 8886 6d32e27e ___vcrt_FlsSetValue 6 API calls 8887 6d32db93 8886->8887 8894 6d32db57 8887->8894 8890 6d32e0e2 ___vcrt_InitializeCriticalSectionEx 5 API calls 8889->8890 8891 6d32e25d 8890->8891 8892 6d32e275 TlsGetValue 8891->8892 8893 6d32db84 8891->8893 8892->8893 8893->8886 8895 6d32db61 8894->8895 8896 6d32db6e 8894->8896 8895->8896 8897 6d330029 ___std_type_info_destroy_list 14 API calls 8895->8897 8896->8882 8897->8896 8904 6d32dbac 8898->8904 8900 6d32c900 8900->8535 8901 6d32ff98 8900->8901 8902 6d330818 __dosmaperr 14 API calls 8901->8902 8903 6d32c90c 8902->8903 8903->8533 8903->8534 8905 6d32dbb5 8904->8905 8906 6d32dbb8 GetLastError 8904->8906 8905->8900 8907 6d32e243 ___vcrt_FlsGetValue 6 API calls 8906->8907 8908 6d32dbcd 8907->8908 8909 6d32dc32 SetLastError 8908->8909 8910 6d32e27e ___vcrt_FlsSetValue 6 API calls 8908->8910 8917 6d32dbec 8908->8917 8909->8900 8911 6d32dbe6 __CreateFrameInfo 8910->8911 8912 6d32e27e ___vcrt_FlsSetValue 6 API calls 8911->8912 8914 6d32dc0e 8911->8914 8911->8917 8912->8914 8913 6d32e27e ___vcrt_FlsSetValue 6 API calls 8915 6d32dc22 8913->8915 8914->8913 8914->8915 8916 6d330029 ___std_type_info_destroy_list 14 API calls 8915->8916 8916->8917 8917->8909 9261 6d32d86e 9264 6d32d8bc 9261->9264 9265 6d32d879 9264->9265 9266 6d32d8c5 9264->9266 9266->9265 9267 6d32db9e __CreateFrameInfo 49 API calls 9266->9267 9268 6d32d900 9267->9268 9269 6d32db9e __CreateFrameInfo 49 API calls 9268->9269 9270 6d32d90b 9269->9270 9271 6d32ffed _unexpected 39 API calls 9270->9271 9272 6d32d913 9271->9272 10000 6d3331ee 10001 6d3331fb 10000->10001 10002 6d330db7 _unexpected 14 API calls 10001->10002 10003 6d333215 10002->10003 10004 6d330e14 ___free_lconv_mon 14 API calls 10003->10004 10005 6d333221 10004->10005 10006 6d330db7 _unexpected 14 API calls 10005->10006 10010 6d333247 10005->10010 10008 6d33323b 10006->10008 10007 6d332778 6 API calls 10007->10010 10009 6d330e14 ___free_lconv_mon 14 API calls 10008->10009 10009->10010 10010->10007 10011 6d333253 10010->10011 9273 6d33096c 9281 6d332679 9273->9281 9276 6d330980 9277 6d330818 __dosmaperr 14 API calls 9278 6d330988 9277->9278 9279 6d330995 9278->9279 9280 6d330998 __DllMainCRTStartup@12 6 API calls 9278->9280 9280->9276 9282 6d332595 _unexpected 5 API calls 9281->9282 9283 6d332695 9282->9283 9284 6d3326ad TlsAlloc 9283->9284 9285 6d330976 9283->9285 9284->9285 9285->9276 9285->9277 9286 6d33166c 9287 6d33167e 9286->9287 9296 6d33167a 9286->9296 9288 6d331683 9287->9288 9289 6d3316a9 9287->9289 9290 6d330db7 _unexpected 14 API calls 9288->9290 9289->9296 9297 6d33240f 9289->9297 9292 6d33168c 9290->9292 9293 6d330e14 ___free_lconv_mon 14 API calls 9292->9293 9293->9296 9294 6d3316c9 9295 6d330e14 ___free_lconv_mon 14 API calls 9294->9295 9295->9296 9298 6d332437 9297->9298 9299 6d33241c 9297->9299 9301 6d332446 9298->9301 9306 6d3343cc 9298->9306 9299->9298 9300 6d332428 9299->9300 9302 6d330da4 __dosmaperr 14 API calls 9300->9302 9313 6d3343ff 9301->9313 9305 6d33242d __CreateFrameInfo 9302->9305 9305->9294 9307 6d3343d7 9306->9307 9308 6d3343ec HeapSize 9306->9308 9309 6d330da4 __dosmaperr 14 API calls 9307->9309 9308->9301 9310 6d3343dc 9309->9310 9311 6d330cc3 ___std_exception_copy 29 API calls 9310->9311 9312 6d3343e7 9311->9312 9312->9301 9314 6d334417 9313->9314 9315 6d33440c 9313->9315 9317 6d33441f 9314->9317 9324 6d334428 _unexpected 9314->9324 9325 6d33332a 9315->9325 9319 6d330e14 ___free_lconv_mon 14 API calls 9317->9319 9318 6d334414 9318->9305 9319->9318 9320 6d334452 HeapReAlloc 9320->9318 9320->9324 9321 6d33442d 9322 6d330da4 __dosmaperr 14 API calls 9321->9322 9322->9318 9324->9320 9324->9321 9332 6d332b50 9324->9332 9326 6d333368 9325->9326 9330 6d333338 _unexpected 9325->9330 9327 6d330da4 __dosmaperr 14 API calls 9326->9327 9329 6d333366 9327->9329 9328 6d333353 HeapAlloc 9328->9329 9328->9330 9329->9318 9330->9326 9330->9328 9331 6d332b50 _unexpected 2 API calls 9330->9331 9331->9330 9335 6d332b7c 9332->9335 9336 6d332b88 ___scrt_is_nonwritable_in_current_image 9335->9336 9341 6d3309f3 EnterCriticalSection 9336->9341 9338 6d332b93 __CreateFrameInfo 9342 6d332bca 9338->9342 9341->9338 9345 6d330a3b LeaveCriticalSection 9342->9345 9344 6d332b5b 9344->9324 9345->9344 10012 6d32fed2 10015 6d32ff58 10012->10015 10016 6d32ff6c 10015->10016 10017 6d32fee5 10015->10017 10016->10017 10018 6d330e14 ___free_lconv_mon 14 API calls 10016->10018 10018->10017 8082 6d323750 8092 6d3237a7 __CreateFrameInfo 8082->8092 8083 6d329b43 Wow64GetThreadContext 8083->8092 8084 6d32aa73 ReadProcessMemory 8084->8092 8085 6d329951 CreateProcessW 8085->8092 8086 6d32b8c3 VirtualAlloc 8086->8092 8087 6d32aba5 WriteProcessMemory 8087->8092 8088 6d329e60 WriteProcessMemory 8088->8092 8089 6d32ae86 WriteProcessMemory Wow64SetThreadContext ResumeThread 8089->8092 8090 6d325e0c GetConsoleWindow ShowWindow 8114 6d321090 8090->8114 8092->8083 8092->8084 8092->8085 8092->8086 8092->8087 8092->8088 8092->8089 8092->8090 8093 6d32b227 8092->8093 8095 6d321090 24 API calls 8092->8095 8097 6d329d7b VirtualAllocEx 8092->8097 8098 6d32b248 GetConsoleWindow ShowWindow 8092->8098 8101 6d321000 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8092->8101 8102 6d32a081 WriteProcessMemory 8092->8102 8104 6d32b943 VirtualAllocEx 8092->8104 8105 6d32bb08 WriteProcessMemory 8092->8105 8106 6d32b98f WriteProcessMemory 8092->8106 8109 6d32bb5e WriteProcessMemory SetThreadContext ResumeThread 8092->8109 8110 6d32b07e CloseHandle CloseHandle 8092->8110 8111 6d329a5f VirtualAlloc 8092->8111 8137 6d322ed0 8092->8137 8149 6d32c2e0 8093->8149 8095->8092 8096 6d32b231 8097->8092 8099 6d321090 24 API calls 8098->8099 8108 6d32b275 8099->8108 8100 6d321090 24 API calls 8100->8108 8101->8092 8145 6d3233e0 8102->8145 8104->8092 8105->8092 8107 6d3233e0 5 API calls 8106->8107 8107->8108 8108->8092 8108->8100 8109->8092 8110->8092 8111->8092 8120 6d3210b8 __InternalCxxFrameHandler 8114->8120 8115 6d322131 MapViewOfFile 8115->8120 8116 6d322a67 CloseHandle CloseHandle 8116->8120 8117 6d322e6e CloseHandle 8117->8120 8118 6d321a96 K32GetModuleInformation 8118->8120 8119 6d321baa GetModuleFileNameA CreateFileA 8119->8120 8120->8115 8120->8116 8120->8117 8120->8118 8120->8119 8121 6d322c2e CreateFileMappingA 8120->8121 8122 6d321d62 CreateFileMappingA 8120->8122 8123 6d322011 CloseHandle 8120->8123 8124 6d322e91 CloseHandle CloseHandle 8120->8124 8125 6d32190d GetCurrentProcess 8120->8125 8128 6d322cae MapViewOfFile 8120->8128 8129 6d32279d VirtualProtect 8120->8129 8130 6d322bd4 8120->8130 8133 6d322963 FindCloseChangeNotification 8120->8133 8134 6d32264f VirtualProtect 8120->8134 8135 6d322d9c VirtualProtect 8120->8135 8121->8120 8122->8120 8123->8120 8124->8120 8156 6d32cee0 8125->8156 8128->8120 8129->8120 8131 6d32c2e0 _ValidateLocalCookies 5 API calls 8130->8131 8132 6d322bde 8131->8132 8132->8092 8133->8120 8134->8120 8136 6d322e47 __InternalCxxFrameHandler 8135->8136 8136->8120 8140 6d322eef __CreateFrameInfo 8137->8140 8138 6d32307a GetProcAddress 8138->8140 8139 6d3230b6 NtQueryInformationProcess 8139->8140 8140->8138 8140->8139 8141 6d32304d GetModuleHandleW 8140->8141 8142 6d323396 8140->8142 8141->8140 8143 6d32c2e0 _ValidateLocalCookies 5 API calls 8142->8143 8144 6d3233a6 VirtualAllocEx 8143->8144 8144->8092 8146 6d323436 8145->8146 8147 6d32c2e0 _ValidateLocalCookies 5 API calls 8146->8147 8148 6d32370f 8147->8148 8148->8092 8150 6d32c2e8 8149->8150 8151 6d32c2e9 IsProcessorFeaturePresent 8149->8151 8150->8096 8153 6d32c68e 8151->8153 8158 6d32c651 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8153->8158 8155 6d32c771 8155->8096 8157 6d321963 GetModuleHandleA 8156->8157 8157->8120 8158->8155 10019 6d3339d0 10020 6d333a0a 10019->10020 10021 6d330da4 __dosmaperr 14 API calls 10020->10021 10026 6d333a1e 10020->10026 10022 6d333a13 10021->10022 10023 6d330cc3 ___std_exception_copy 29 API calls 10022->10023 10023->10026 10024 6d32c2e0 _ValidateLocalCookies 5 API calls 10025 6d333a2b 10024->10025 10026->10024 10027 6d32e4d1 10028 6d3300a9 CallUnexpected 39 API calls 10027->10028 10029 6d32e4d9 10028->10029 10030 6d32e4f9 10029->10030 10038 6d32e441 10029->10038 10042 6d32df1f RtlUnwind 10030->10042 10033 6d32e50e 10034 6d32eefa __FrameHandler3::FrameUnwindToState 49 API calls 10033->10034 10035 6d32e51f __FrameHandler3::FrameUnwindToState 10034->10035 10043 6d32ec8a 10035->10043 10037 6d32e547 __InternalCxxFrameHandler 10039 6d32e44d ___scrt_is_nonwritable_in_current_image 10038->10039 10057 6d32e303 10039->10057 10041 6d32e475 __InternalCxxFrameHandler ___AdjustPointer 10041->10030 10042->10033 10044 6d32ec96 ___scrt_is_nonwritable_in_current_image 10043->10044 10061 6d32dfa3 10044->10061 10047 6d32db9e __CreateFrameInfo 49 API calls 10048 6d32ecc2 10047->10048 10049 6d32db9e __CreateFrameInfo 49 API calls 10048->10049 10050 6d32eccd 10049->10050 10051 6d32db9e __CreateFrameInfo 49 API calls 10050->10051 10052 6d32ecd8 10051->10052 10053 6d32db9e __CreateFrameInfo 49 API calls 10052->10053 10054 6d32ece0 __InternalCxxFrameHandler 10053->10054 10055 6d32eddd __InternalCxxFrameHandler 50 API calls 10054->10055 10056 6d32edc5 10055->10056 10056->10037 10059 6d32e30f ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___AdjustPointer 10057->10059 10058 6d3300a9 CallUnexpected 39 API calls 10060 6d32e440 10058->10060 10059->10041 10059->10058 10062 6d32db9e __CreateFrameInfo 49 API calls 10061->10062 10063 6d32dfb4 10062->10063 10064 6d32db9e __CreateFrameInfo 49 API calls 10063->10064 10065 6d32dfbf 10064->10065 10065->10047 9346 6d336f57 9347 6d336f70 __startOneArgErrorHandling 9346->9347 9349 6d336fc1 __startOneArgErrorHandling 9347->9349 9350 6d3373a4 9347->9350 9351 6d3373dd __startOneArgErrorHandling 9350->9351 9352 6d337715 __raise_exc RaiseException 9351->9352 9353 6d337404 __startOneArgErrorHandling 9351->9353 9352->9353 9354 6d337447 9353->9354 9356 6d337422 9353->9356 9355 6d337a06 __startOneArgErrorHandling 14 API calls 9354->9355 9358 6d337442 __startOneArgErrorHandling 9355->9358 9361 6d337a37 9356->9361 9359 6d32c2e0 _ValidateLocalCookies 5 API calls 9358->9359 9360 6d33746b 9359->9360 9360->9349 9362 6d337a44 9361->9362 9363 6d337a53 __startOneArgErrorHandling 9362->9363 9365 6d337a82 __startOneArgErrorHandling 9362->9365 9364 6d337a06 __startOneArgErrorHandling 14 API calls 9363->9364 9366 6d337a6c 9364->9366 9367 6d337ad0 9365->9367 9368 6d337a06 __startOneArgErrorHandling 14 API calls 9365->9368 9366->9358 9367->9358 9368->9367 10066 6d32fad7 10067 6d331e18 49 API calls 10066->10067 10068 6d32fae8 10067->10068 10081 6d33236f GetEnvironmentStringsW 10068->10081 10071 6d32faf3 10073 6d330e14 ___free_lconv_mon 14 API calls 10071->10073 10072 6d32faff 10102 6d32fb30 10072->10102 10075 6d32faf9 10073->10075 10077 6d330e14 ___free_lconv_mon 14 API calls 10078 6d32fb23 10077->10078 10079 6d330e14 ___free_lconv_mon 14 API calls 10078->10079 10080 6d32fb29 10079->10080 10082 6d332387 10081->10082 10083 6d32faed 10081->10083 10084 6d3322cc ___scrt_uninitialize_crt WideCharToMultiByte 10082->10084 10083->10071 10083->10072 10085 6d3323a4 10084->10085 10086 6d3323b9 10085->10086 10087 6d3323ae FreeEnvironmentStringsW 10085->10087 10088 6d33332a 15 API calls 10086->10088 10087->10083 10089 6d3323c0 10088->10089 10090 6d3323d9 10089->10090 10091 6d3323c8 10089->10091 10092 6d3322cc ___scrt_uninitialize_crt WideCharToMultiByte 10090->10092 10093 6d330e14 ___free_lconv_mon 14 API calls 10091->10093 10095 6d3323e9 10092->10095 10094 6d3323cd FreeEnvironmentStringsW 10093->10094 10094->10083 10096 6d3323f0 10095->10096 10097 6d3323f8 10095->10097 10098 6d330e14 ___free_lconv_mon 14 API calls 10096->10098 10099 6d330e14 ___free_lconv_mon 14 API calls 10097->10099 10100 6d3323f6 FreeEnvironmentStringsW 10098->10100 10099->10100 10100->10083 10103 6d32fb45 10102->10103 10104 6d330db7 _unexpected 14 API calls 10103->10104 10105 6d32fb6c 10104->10105 10106 6d32fb74 10105->10106 10107 6d32fb7e 10105->10107 10108 6d330e14 ___free_lconv_mon 14 API calls 10106->10108 10110 6d32fbdb 10107->10110 10112 6d330db7 _unexpected 14 API calls 10107->10112 10113 6d32fbea 10107->10113 10118 6d32fc05 10107->10118 10120 6d330e14 ___free_lconv_mon 14 API calls 10107->10120 10124 6d33004f 10107->10124 10109 6d32fb06 10108->10109 10109->10077 10111 6d330e14 ___free_lconv_mon 14 API calls 10110->10111 10111->10109 10112->10107 10115 6d32fc12 14 API calls 10113->10115 10116 6d32fbf0 10115->10116 10117 6d330e14 ___free_lconv_mon 14 API calls 10116->10117 10119 6d32fbf7 10117->10119 10121 6d330cd3 ___std_exception_copy 11 API calls 10118->10121 10122 6d330e14 ___free_lconv_mon 14 API calls 10119->10122 10120->10107 10123 6d32fc11 10121->10123 10122->10109 10125 6d33005d 10124->10125 10127 6d33006b 10124->10127 10125->10127 10131 6d330083 10125->10131 10126 6d330da4 __dosmaperr 14 API calls 10128 6d330073 10126->10128 10127->10126 10129 6d330cc3 ___std_exception_copy 29 API calls 10128->10129 10130 6d33007d 10129->10130 10130->10107 10131->10130 10132 6d330da4 __dosmaperr 14 API calls 10131->10132 10132->10128 9369 6d336c55 9370 6d336c7d 9369->9370 9371 6d336cb5 9370->9371 9372 6d336ca7 9370->9372 9373 6d336cae 9370->9373 9374 6d336d27 20 API calls 9372->9374 9378 6d336d10 9373->9378 9376 6d336cac 9374->9376 9379 6d336d30 9378->9379 9380 6d33724c __startOneArgErrorHandling 20 API calls 9379->9380 9381 6d336cb3 9380->9381 9382 6d32ec5d 9383 6d32f1b7 ___std_exception_destroy 14 API calls 9382->9383 9384 6d32ec72 9383->9384 10136 6d32c5c3 ___scrt_dllmain_exception_filter 10137 6d32eac3 10138 6d32ead1 ___except_validate_context_record 10137->10138 10139 6d32db9e __CreateFrameInfo 49 API calls 10138->10139 10140 6d32ead7 10139->10140 10141 6d32eb16 10140->10141 10142 6d32eb3c 10140->10142 10145 6d32eb34 10140->10145 10141->10145 10146 6d32eee2 10141->10146 10142->10145 10149 6d32e55a 10142->10149 10147 6d32eefa __FrameHandler3::FrameUnwindToState 49 API calls 10146->10147 10148 6d32eef5 10147->10148 10148->10145 10153 6d32e57a __FrameHandler3::FrameUnwindToState 10149->10153 10150 6d32e88d 10151 6d3300a9 CallUnexpected 39 API calls 10150->10151 10162 6d32e893 10150->10162 10152 6d32e8fe 10151->10152 10153->10150 10156 6d32e65c 10153->10156 10157 6d32db9e __CreateFrameInfo 49 API calls 10153->10157 10154 6d32e862 10154->10150 10155 6d32e860 10154->10155 10220 6d32e8ff 10154->10220 10159 6d32db9e __CreateFrameInfo 49 API calls 10155->10159 10156->10154 10158 6d32e6e5 10156->10158 10198 6d32e662 type_info::operator== 10156->10198 10160 6d32e5dc 10157->10160 10165 6d32e7fc __InternalCxxFrameHandler 10158->10165 10205 6d32dd33 10158->10205 10159->10150 10160->10162 10164 6d32db9e __CreateFrameInfo 49 API calls 10160->10164 10162->10145 10167 6d32e5ea 10164->10167 10165->10155 10166 6d32e82c 10165->10166 10168 6d32e851 10165->10168 10169 6d32e836 10165->10169 10166->10155 10166->10169 10170 6d32db9e __CreateFrameInfo 49 API calls 10167->10170 10171 6d32efe2 __InternalCxxFrameHandler 39 API calls 10168->10171 10172 6d32db9e __CreateFrameInfo 49 API calls 10169->10172 10179 6d32e5f2 10170->10179 10173 6d32e85a 10171->10173 10174 6d32e841 10172->10174 10173->10155 10175 6d32e8bd 10173->10175 10176 6d32db9e __CreateFrameInfo 49 API calls 10174->10176 10178 6d32db9e __CreateFrameInfo 49 API calls 10175->10178 10176->10198 10177 6d32db9e __CreateFrameInfo 49 API calls 10180 6d32e63b 10177->10180 10181 6d32e8c2 10178->10181 10179->10150 10179->10177 10180->10156 10185 6d32db9e __CreateFrameInfo 49 API calls 10180->10185 10182 6d32db9e __CreateFrameInfo 49 API calls 10181->10182 10186 6d32e8ca 10182->10186 10183 6d32ffed _unexpected 39 API calls 10191 6d32e89d __InternalCxxFrameHandler 10183->10191 10184 6d32e706 ___TypeMatch 10184->10165 10210 6d32e4da 10184->10210 10187 6d32e645 10185->10187 10240 6d32df1f RtlUnwind 10186->10240 10188 6d32db9e __CreateFrameInfo 49 API calls 10187->10188 10192 6d32e650 10188->10192 10237 6d32f1d6 10191->10237 10200 6d32efe2 10192->10200 10193 6d32e8de 10195 6d32eee2 __InternalCxxFrameHandler 49 API calls 10193->10195 10197 6d32e8ea __InternalCxxFrameHandler 10195->10197 10241 6d32ee59 10197->10241 10198->10183 10198->10191 10201 6d32f076 10200->10201 10204 6d32eff6 ___TypeMatch 10200->10204 10202 6d3300a9 CallUnexpected 39 API calls 10201->10202 10203 6d32f07b 10202->10203 10204->10156 10206 6d32dd4f 10205->10206 10207 6d32dd86 10206->10207 10208 6d3300a9 CallUnexpected 39 API calls 10206->10208 10207->10184 10209 6d32dda1 10208->10209 10211 6d32e4f9 10210->10211 10212 6d32e4ec 10210->10212 10253 6d32df1f RtlUnwind 10211->10253 10213 6d32e441 __InternalCxxFrameHandler 39 API calls 10212->10213 10213->10211 10215 6d32e50e 10216 6d32eefa __FrameHandler3::FrameUnwindToState 49 API calls 10215->10216 10217 6d32e51f __FrameHandler3::FrameUnwindToState 10216->10217 10218 6d32ec8a __InternalCxxFrameHandler 50 API calls 10217->10218 10219 6d32e547 __InternalCxxFrameHandler 10218->10219 10219->10184 10221 6d32e915 10220->10221 10222 6d32ea2a 10220->10222 10223 6d32db9e __CreateFrameInfo 49 API calls 10221->10223 10222->10155 10224 6d32e91c 10223->10224 10225 6d32e923 EncodePointer 10224->10225 10226 6d32e95e 10224->10226 10229 6d32db9e __CreateFrameInfo 49 API calls 10225->10229 10226->10222 10227 6d32e97b 10226->10227 10228 6d32ea2f 10226->10228 10231 6d32dd33 __InternalCxxFrameHandler 39 API calls 10227->10231 10230 6d3300a9 CallUnexpected 39 API calls 10228->10230 10234 6d32e931 10229->10234 10232 6d32ea34 10230->10232 10233 6d32e992 10231->10233 10233->10222 10236 6d32e4da __InternalCxxFrameHandler 50 API calls 10233->10236 10234->10226 10235 6d32ddff __InternalCxxFrameHandler 49 API calls 10234->10235 10235->10226 10236->10233 10238 6d32f1f0 10237->10238 10239 6d32f21d RaiseException 10237->10239 10238->10239 10239->10175 10240->10193 10242 6d32ee65 __EH_prolog3_catch 10241->10242 10243 6d32db9e __CreateFrameInfo 49 API calls 10242->10243 10244 6d32ee6a 10243->10244 10245 6d32ee8d 10244->10245 10254 6d32f10c 10244->10254 10247 6d3300a9 CallUnexpected 39 API calls 10245->10247 10249 6d32ee92 10247->10249 10253->10215 10255 6d32db9e __CreateFrameInfo 49 API calls 10254->10255 10256 6d32f112 10255->10256 10257 6d32ffed _unexpected 39 API calls 10256->10257 10258 6d32f128 10257->10258 9385 6d335c41 9386 6d335c65 9385->9386 9387 6d336f57 __startOneArgErrorHandling 9386->9387 9388 6d335c7e 9386->9388 9391 6d3373a4 20 API calls 9387->9391 9392 6d336fc1 __startOneArgErrorHandling 9387->9392 9389 6d335cc8 9388->9389 9393 6d336d63 9388->9393 9391->9392 9394 6d336d76 DecodePointer 9393->9394 9395 6d336d86 9393->9395 9394->9395 9396 6d336dca 9395->9396 9397 6d336db5 9395->9397 9400 6d336e11 9395->9400 9398 6d330da4 __dosmaperr 14 API calls 9396->9398 9396->9400 9399 6d330da4 __dosmaperr 14 API calls 9397->9399 9397->9400 9398->9400 9399->9400 9400->9389 10259 6d333fc0 10262 6d333fd7 10259->10262 10261 6d333fd2 10263 6d333fe5 10262->10263 10264 6d333ff9 10262->10264 10265 6d330da4 __dosmaperr 14 API calls 10263->10265 10266 6d334013 10264->10266 10267 6d334001 10264->10267 10268 6d333fea 10265->10268 10270 6d3314ae 39 API calls 10266->10270 10273 6d334011 10266->10273 10269 6d330da4 __dosmaperr 14 API calls 10267->10269 10271 6d330cc3 ___std_exception_copy 29 API calls 10268->10271 10272 6d334006 10269->10272 10270->10273 10274 6d333ff5 10271->10274 10275 6d330cc3 ___std_exception_copy 29 API calls 10272->10275 10273->10261 10274->10261 10275->10273 10276 6d32f7cb 10277 6d32f7e2 10276->10277 10287 6d32f7db 10276->10287 10278 6d32f803 10277->10278 10279 6d32f7ed 10277->10279 10280 6d331e18 49 API calls 10278->10280 10281 6d330da4 __dosmaperr 14 API calls 10279->10281 10282 6d32f809 10280->10282 10283 6d32f7f2 10281->10283 10306 6d3317fb GetModuleFileNameW 10282->10306 10285 6d330cc3 ___std_exception_copy 29 API calls 10283->10285 10285->10287 10290 6d32fa7c 14 API calls 10291 6d32f85c 10290->10291 10292 6d32f871 10291->10292 10293 6d32f865 10291->10293 10295 6d32f908 39 API calls 10292->10295 10294 6d330da4 __dosmaperr 14 API calls 10293->10294 10296 6d32f86a 10294->10296 10297 6d32f887 10295->10297 10299 6d330e14 ___free_lconv_mon 14 API calls 10296->10299 10297->10296 10298 6d32f8ab 10297->10298 10300 6d32f8c2 10298->10300 10301 6d32f8cc 10298->10301 10299->10287 10302 6d330e14 ___free_lconv_mon 14 API calls 10300->10302 10303 6d330e14 ___free_lconv_mon 14 API calls 10301->10303 10304 6d32f8ca 10302->10304 10303->10304 10305 6d330e14 ___free_lconv_mon 14 API calls 10304->10305 10305->10287 10307 6d33183b 10306->10307 10308 6d33182a GetLastError 10306->10308 10310 6d331579 39 API calls 10307->10310 10309 6d330d4a __dosmaperr 14 API calls 10308->10309 10311 6d331836 10309->10311 10312 6d33186c 10310->10312 10314 6d32c2e0 _ValidateLocalCookies 5 API calls 10311->10314 10322 6d3316fe 10312->10322 10315 6d32f81c 10314->10315 10316 6d32f908 10315->10316 10318 6d32f92e 10316->10318 10320 6d32f98c 10318->10320 10347 6d332149 10318->10347 10319 6d32f84f 10319->10290 10320->10319 10321 6d332149 39 API calls 10320->10321 10321->10320 10323 6d33170b 10322->10323 10324 6d33171a 10322->10324 10323->10311 10325 6d331722 10324->10325 10326 6d331747 10324->10326 10325->10323 10343 6d3317c0 10325->10343 10327 6d3322cc ___scrt_uninitialize_crt WideCharToMultiByte 10326->10327 10328 6d331757 10327->10328 10330 6d331774 10328->10330 10331 6d33175e GetLastError 10328->10331 10333 6d331785 10330->10333 10335 6d3317c0 14 API calls 10330->10335 10332 6d330d4a __dosmaperr 14 API calls 10331->10332 10334 6d33176a 10332->10334 10333->10323 10336 6d331555 WideCharToMultiByte 10333->10336 10337 6d330da4 __dosmaperr 14 API calls 10334->10337 10335->10333 10338 6d33179b 10336->10338 10337->10323 10338->10323 10339 6d33179f GetLastError 10338->10339 10340 6d330d4a __dosmaperr 14 API calls 10339->10340 10341 6d3317ab 10340->10341 10342 6d330da4 __dosmaperr 14 API calls 10341->10342 10342->10323 10344 6d3317cb 10343->10344 10345 6d330da4 __dosmaperr 14 API calls 10344->10345 10346 6d3317d4 10345->10346 10346->10323 10350 6d3320f9 10347->10350 10351 6d3314ae 39 API calls 10350->10351 10352 6d33210c 10351->10352 10352->10318 10353 6d32fec9 10354 6d32d7ef ___scrt_uninitialize_crt 7 API calls 10353->10354 10355 6d32fed0 10354->10355 10356 6d32ebce 10359 6d32ec01 10356->10359 10362 6d32f154 10359->10362 10363 6d32f161 ___std_exception_copy 10362->10363 10367 6d32ebdc 10362->10367 10364 6d32f18e 10363->10364 10365 6d33004f ___std_exception_copy 29 API calls 10363->10365 10363->10367 10366 6d330029 ___std_type_info_destroy_list 14 API calls 10364->10366 10365->10364 10366->10367
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: Process$Memory$Write$AllocVirtual$ThreadWindow$CloseConsoleContextHandleResumeShow$CreateReadWow64
        • String ID: $~V$!/_$Hp+$#xL$$I\D$$I\D$@$AXs$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$L7Ho$MZx$Z#Il$]n?S$^~R$fAACDxAijcIREAGiOgnTh/zV4lkQA6KofAACDxAijmJZEAOgtAwAAiw0EbEQAus33yyUzFQxsRAAB0UH/4Q+2wIsEhRBsRAC50FG88DMNGGxEAAHBQTHA/+GhKGxEALkJl$kernel32.dll$ntdll.dll$x?ZQ$=%h$=%h$\:
        • API String ID: 3290418030-1524399179
        • Opcode ID: 66aca74f3173a19b42171fed97394730ed0759471804b6376f25aca60ba8fdfe
        • Instruction ID: dab3cd7fa44b5db62ef01e6ec6206c03c119fb6beb9efe44d953feb37d9660a7
        • Opcode Fuzzy Hash: 66aca74f3173a19b42171fed97394730ed0759471804b6376f25aca60ba8fdfe
        • Instruction Fuzzy Hash: EAE3F131E642658FCB15CE2DC9C13D977F9BB4B311F008299D919EB2A4CA369E85CF60
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: File$CloseHandle$CreateProtectVirtual$MappingModule$ChangeCurrentFindNameNotificationProcessView
        • String ID: .text$@$Rj+$S>|$S>|$^\+)$^\+)
        • API String ID: 2059257565-797904774
        • Opcode ID: 1a0bbc444c0e59ba9839d8f78d0d230336238dec8818696c24f97d30abdf33b3
        • Instruction ID: 7ef87b1b5cbab3b90e61a6448798979b1d54a3123adf92bfa548ee194f64ebed
        • Opcode Fuzzy Hash: 1a0bbc444c0e59ba9839d8f78d0d230336238dec8818696c24f97d30abdf33b3
        • Instruction Fuzzy Hash: 00F2FC39E142058FCB28CE3CCA957DE7BF6BB86311F108599D919DB394C73A89898F11

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1611 6d322ed0-6d322ee8 1612 6d322eef-6d322efa 1611->1612 1613 6d322f00-6d322f0d 1612->1613 1614 6d3231ef-6d3231f6 1612->1614 1617 6d322f13-6d322f20 1613->1617 1618 6d32317d-6d3231cc 1613->1618 1615 6d3233cf 1614->1615 1615->1612 1620 6d322f26-6d322f33 1617->1620 1621 6d32307a-6d323105 GetProcAddress call 6d32cee0 NtQueryInformationProcess 1617->1621 1618->1615 1625 6d32321a-6d32325b 1620->1625 1626 6d322f39-6d322f46 1620->1626 1621->1615 1625->1615 1628 6d32320e-6d323215 1626->1628 1629 6d322f4c-6d322f59 1626->1629 1628->1615 1631 6d322f5f-6d322f6c 1629->1631 1632 6d32304d-6d323075 GetModuleHandleW 1629->1632 1634 6d322f72-6d322f7f 1631->1634 1635 6d32310a-6d323178 1631->1635 1632->1615 1637 6d3231d1-6d3231d8 1634->1637 1638 6d322f85-6d322f92 1634->1638 1635->1615 1637->1615 1640 6d3233b0-6d3233b7 1638->1640 1641 6d322f98-6d322fa5 1638->1641 1640->1615 1643 6d3232d1-6d3232d8 1641->1643 1644 6d322fab-6d322fb8 1641->1644 1643->1615 1646 6d3231fb-6d323209 1644->1646 1647 6d322fbe-6d322fcb 1644->1647 1646->1615 1649 6d322fd1-6d322fde 1647->1649 1650 6d3233bc-6d3233c3 1647->1650 1652 6d322fe4-6d322ff1 1649->1652 1653 6d3233c8 1649->1653 1650->1615 1655 6d323323-6d323391 1652->1655 1656 6d322ff7-6d323004 1652->1656 1653->1615 1655->1615 1658 6d323396-6d3233af call 6d32c2e0 1656->1658 1659 6d32300a-6d323017 1656->1659 1662 6d3232dd-6d32331e 1659->1662 1663 6d32301d-6d32302a 1659->1663 1662->1615 1666 6d323260-6d3232cc 1663->1666 1667 6d323030-6d32303d 1663->1667 1666->1615 1669 6d323043-6d323048 1667->1669 1670 6d3231dd-6d3231ea 1667->1670 1669->1615 1670->1615
        APIs
        • GetModuleHandleW.KERNEL32(?), ref: 6D323065
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: HandleModule
        • String ID: NtQueryInformationProcess$ntdll.dll
        • API String ID: 4139908857-2906145389
        • Opcode ID: 3f66c3e498d876e0506cb2578399ab53ce6a150bb1bd4bd657d89b9dcad236ef
        • Instruction ID: 54c10b0e08cb86d41dad21215e20f68456b0afea5abf147a05dc81b3db3cfa78
        • Opcode Fuzzy Hash: 3f66c3e498d876e0506cb2578399ab53ce6a150bb1bd4bd657d89b9dcad236ef
        • Instruction Fuzzy Hash: 45C1FF76E25205DFCB04CFACD6C13DDBBF6AB86350F10951AD614EB350CA3A9A0A8B51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1561 6d32c448-6d32c45b call 6d32cca0 1564 6d32c461-6d32c483 call 6d32c890 1561->1564 1565 6d32c45d-6d32c45f 1561->1565 1569 6d32c4f0-6d32c509 call 6d32cb2a call 6d32cca0 1564->1569 1570 6d32c485-6d32c4c8 call 6d32c95b call 6d32c817 call 6d32cc73 call 6d32c4dd call 6d32cafc call 6d32c4ea 1564->1570 1566 6d32c4ca-6d32c4d9 1565->1566 1581 6d32c51a-6d32c521 1569->1581 1582 6d32c50b-6d32c511 1569->1582 1570->1566 1585 6d32c523-6d32c526 1581->1585 1586 6d32c52d-6d32c541 dllmain_raw 1581->1586 1582->1581 1584 6d32c513-6d32c515 1582->1584 1588 6d32c5f3-6d32c602 1584->1588 1585->1586 1589 6d32c528-6d32c52b 1585->1589 1591 6d32c547-6d32c558 dllmain_crt_dispatch 1586->1591 1592 6d32c5ea-6d32c5f1 1586->1592 1593 6d32c55e-6d32c570 call 6d32bc40 1589->1593 1591->1592 1591->1593 1592->1588 1600 6d32c572-6d32c574 1593->1600 1601 6d32c599-6d32c59b 1593->1601 1600->1601 1604 6d32c576-6d32c594 call 6d32bc40 call 6d32c448 dllmain_raw 1600->1604 1602 6d32c5a2-6d32c5b3 dllmain_crt_dispatch 1601->1602 1603 6d32c59d-6d32c5a0 1601->1603 1602->1592 1605 6d32c5b5-6d32c5e7 dllmain_raw 1602->1605 1603->1592 1603->1602 1604->1601 1605->1592
        APIs
        • __RTC_Initialize.LIBCMT ref: 6D32C48F
        • ___scrt_uninitialize_crt.LIBCMT ref: 6D32C4A9
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: Initialize___scrt_uninitialize_crt
        • String ID:
        • API String ID: 2442719207-0
        • Opcode ID: 22710b153ae1e7b484894c02958855684e3b752e9402c83e5e86655aba276ec6
        • Instruction ID: db6a3d1b9a20bd576afb08c1b36f3b2704f922d9c65eb0981996d7a51170d14c
        • Opcode Fuzzy Hash: 22710b153ae1e7b484894c02958855684e3b752e9402c83e5e86655aba276ec6
        • Instruction Fuzzy Hash: 0941D672D48215ABDB218F65C841B7F7BB8EB857A5F128126F955A7140C771CD01CBE0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1672 6d32c4f8-6d32c509 call 6d32cca0 1675 6d32c51a-6d32c521 1672->1675 1676 6d32c50b-6d32c511 1672->1676 1678 6d32c523-6d32c526 1675->1678 1679 6d32c52d-6d32c541 dllmain_raw 1675->1679 1676->1675 1677 6d32c513-6d32c515 1676->1677 1680 6d32c5f3-6d32c602 1677->1680 1678->1679 1681 6d32c528-6d32c52b 1678->1681 1682 6d32c547-6d32c558 dllmain_crt_dispatch 1679->1682 1683 6d32c5ea-6d32c5f1 1679->1683 1684 6d32c55e-6d32c570 call 6d32bc40 1681->1684 1682->1683 1682->1684 1683->1680 1687 6d32c572-6d32c574 1684->1687 1688 6d32c599-6d32c59b 1684->1688 1687->1688 1691 6d32c576-6d32c594 call 6d32bc40 call 6d32c448 dllmain_raw 1687->1691 1689 6d32c5a2-6d32c5b3 dllmain_crt_dispatch 1688->1689 1690 6d32c59d-6d32c5a0 1688->1690 1689->1683 1692 6d32c5b5-6d32c5e7 dllmain_raw 1689->1692 1690->1683 1690->1689 1691->1688 1692->1683
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: dllmain_raw$dllmain_crt_dispatch
        • String ID:
        • API String ID: 3136044242-0
        • Opcode ID: 05ca623c000e3bac5a18035150448d9d0d09401e8e5cf01640360c1de084d89a
        • Instruction ID: 36e1ca801fce75d14601d999d3b14b038c7cc1a486414ee80c63285d86ba60ed
        • Opcode Fuzzy Hash: 05ca623c000e3bac5a18035150448d9d0d09401e8e5cf01640360c1de084d89a
        • Instruction Fuzzy Hash: AA21A771D4426AABDB224F56CC41E7F3B79EB85B94F168125F91AAB210C731CD01CBE0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1698 6d32c341-6d32c34f call 6d32cca0 call 6d32c98b 1702 6d32c354-6d32c357 1698->1702 1703 6d32c42e 1702->1703 1704 6d32c35d-6d32c375 call 6d32c890 1702->1704 1705 6d32c430-6d32c43f 1703->1705 1708 6d32c440-6d32c447 call 6d32cb2a 1704->1708 1709 6d32c37b-6d32c38c call 6d32c8ed 1704->1709 1714 6d32c3db-6d32c3e9 call 6d32c424 1709->1714 1715 6d32c38e-6d32c3b0 call 6d32cc47 call 6d32c80b call 6d32c82f call 6d32f307 1709->1715 1714->1703 1720 6d32c3eb-6d32c3f5 call 6d32cb24 1714->1720 1715->1714 1734 6d32c3b2-6d32c3b9 call 6d32c8c2 1715->1734 1726 6d32c416-6d32c41f 1720->1726 1727 6d32c3f7-6d32c400 call 6d32ca4b 1720->1727 1726->1705 1727->1726 1733 6d32c402-6d32c414 1727->1733 1733->1726 1734->1714 1738 6d32c3bb-6d32c3d8 call 6d32f2dc 1734->1738 1738->1714
        APIs
        • __RTC_Initialize.LIBCMT ref: 6D32C38E
          • Part of subcall function 6D32C80B: InitializeSListHead.KERNEL32(6D38CA20,6D32C398,6D33E650,00000010,6D32C329,?,?,?,6D32C551,?,00000001,?,?,00000001,?,6D33E698), ref: 6D32C810
        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6D32C3F8
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
        • String ID:
        • API String ID: 3231365870-0
        • Opcode ID: 3fc91a514f52cfe703452938634126cdc29f0174c8f6f071406ca629ef999e38
        • Instruction ID: 28ee6c8546388f2bc621939197ac35ddf4e1ba9c75b677ac39e1b877422fcf35
        • Opcode Fuzzy Hash: 3fc91a514f52cfe703452938634126cdc29f0174c8f6f071406ca629ef999e38
        • Instruction Fuzzy Hash: B3212132E4C252AADB119FB498167FD37A09F0626DF12C42ADAC1776C2CB62C140C6A2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1741 6d33296c-6d332971 1742 6d332973-6d33298b 1741->1742 1743 6d332999-6d3329a2 1742->1743 1744 6d33298d-6d332991 1742->1744 1746 6d3329b4 1743->1746 1747 6d3329a4-6d3329a7 1743->1747 1744->1743 1745 6d332993-6d332997 1744->1745 1748 6d332a0e-6d332a12 1745->1748 1751 6d3329b6-6d3329c3 GetStdHandle 1746->1751 1749 6d3329b0-6d3329b2 1747->1749 1750 6d3329a9-6d3329ae 1747->1750 1748->1742 1752 6d332a18-6d332a1b 1748->1752 1749->1751 1750->1751 1753 6d3329f0-6d332a02 1751->1753 1754 6d3329c5-6d3329c7 1751->1754 1753->1748 1755 6d332a04-6d332a07 1753->1755 1754->1753 1756 6d3329c9-6d3329d2 GetFileType 1754->1756 1755->1748 1756->1753 1757 6d3329d4-6d3329dd 1756->1757 1758 6d3329e5-6d3329e8 1757->1758 1759 6d3329df-6d3329e3 1757->1759 1758->1748 1760 6d3329ea-6d3329ee 1758->1760 1759->1748 1760->1748
        APIs
        • GetStdHandle.KERNEL32(000000F6), ref: 6D3329B8
        • GetFileType.KERNELBASE(00000000), ref: 6D3329CA
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: FileHandleType
        • String ID:
        • API String ID: 3000768030-0
        • Opcode ID: 9650837ea29fba839c8c132d6934a89ead9c5c8aa8cd7af1e7f2665d10297b43
        • Instruction ID: 00a038ada09c169fa11a71c12667c5021964f6dbabb02d095a2498f3f64f9e25
        • Opcode Fuzzy Hash: 9650837ea29fba839c8c132d6934a89ead9c5c8aa8cd7af1e7f2665d10297b43
        • Instruction Fuzzy Hash: 961129795047E256CB308E3E8F89732BAACB747270B26070AE5B6961F1C735D492D2D0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1761 6d330db7-6d330dc2 1762 6d330dd0-6d330dd6 1761->1762 1763 6d330dc4-6d330dce 1761->1763 1765 6d330dd8-6d330dd9 1762->1765 1766 6d330def-6d330e00 RtlAllocateHeap 1762->1766 1763->1762 1764 6d330e04-6d330e0f call 6d330da4 1763->1764 1770 6d330e11-6d330e13 1764->1770 1765->1766 1767 6d330e02 1766->1767 1768 6d330ddb-6d330de2 call 6d3339c8 1766->1768 1767->1770 1768->1764 1774 6d330de4-6d330ded call 6d332b50 1768->1774 1774->1764 1774->1766
        APIs
        • RtlAllocateHeap.NTDLL(00000008,00000000,00000000,?,6D330865,00000001,00000364,00000000,FFFFFFFF,000000FF,?,6D32FDE0,00000000,00000000), ref: 6D330DF8
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 9d60286e78f9c902f95646329bea1afa0ef43343962ffe3baf4a7d84cbe54e43
        • Instruction ID: 86b3642ad2b47ad54f5d230069300e92f1305c89073c12fe1128967dfea98737
        • Opcode Fuzzy Hash: 9d60286e78f9c902f95646329bea1afa0ef43343962ffe3baf4a7d84cbe54e43
        • Instruction Fuzzy Hash: 74F0B43220A9B5A6EB155E27CF01B6B379CAF827B0B17C011B924AB580CB71E80083E0
        APIs
        • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6D32CB36
        • IsDebuggerPresent.KERNEL32 ref: 6D32CC02
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D32CC1B
        • UnhandledExceptionFilter.KERNEL32(?), ref: 6D32CC25
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
        • String ID:
        • API String ID: 254469556-0
        • Opcode ID: 0436130722665a9712d911a9966a3a2a5e1929445edd1a5df8ee0edfb315e6b4
        • Instruction ID: 0494281a7e95f3ecffccf5212ad5297eb0d2aa63b84a87d7448fa86a1331b097
        • Opcode Fuzzy Hash: 0436130722665a9712d911a9966a3a2a5e1929445edd1a5df8ee0edfb315e6b4
        • Instruction Fuzzy Hash: 4531F879D0522DDBDF20DF64D9897CDBBB8AF08304F1041AAE50CAB240EB719A85CF55
        APIs
        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6D330BBF
        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6D330BC9
        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6D330BD6
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$DebuggerPresent
        • String ID:
        • API String ID: 3906539128-0
        • Opcode ID: f01250d6513b0b28077723389ed2903b83c5446a70ea80210c7707f0f938195a
        • Instruction ID: c04b1798362862883bed3a7c06e06b7c6215c23ffd94a9534977b083c3b95409
        • Opcode Fuzzy Hash: f01250d6513b0b28077723389ed2903b83c5446a70ea80210c7707f0f938195a
        • Instruction Fuzzy Hash: 2E31E574D0122DABCB21DF64D98878DBBB8BF08314F5141DAE81CA7250EB709B858F54
        APIs
        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D337710,?,?,00000008,?,?,6D337313,00000000), ref: 6D337942
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: ExceptionRaise
        • String ID:
        • API String ID: 3997070919-0
        • Opcode ID: e221bc7e7b5f051600590b609b99af4ae42283a1fd7d638a9c4e1497c90f716f
        • Instruction ID: 14587a40beb377072ecde435ef813e0eb69fc7caa565575799b0df0d94d7144d
        • Opcode Fuzzy Hash: e221bc7e7b5f051600590b609b99af4ae42283a1fd7d638a9c4e1497c90f716f
        • Instruction Fuzzy Hash: 79B18B71A20659DFD705CF28C587B647BE0FF45365F268658E8A9CF2A1C336D982CB40
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID:
        • String ID: >H=
        • API String ID: 0-1700937968
        • Opcode ID: c914dfe83427a4a88450319b0df8eadfb430afe9f82e341c4d06de7c286faf42
        • Instruction ID: 312456577c2375d9159d02018cacbe62389aa429ea294fc61a3d4f3c3568f1d3
        • Opcode Fuzzy Hash: c914dfe83427a4a88450319b0df8eadfb430afe9f82e341c4d06de7c286faf42
        • Instruction Fuzzy Hash: 49F1CB72E9520A8FCF09CEACE6917DD7BF6BB46340F248116D501EB358D62ACE05CB25
        APIs
        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D32CCFE
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: FeaturePresentProcessor
        • String ID:
        • API String ID: 2325560087-0
        • Opcode ID: 1e74ffe90d4fe0db93ad57ce51f0831a243a97f5884c5b61ca9269e998d40e2f
        • Instruction ID: de87dd14e9085ef24d048aa36a7d29a3a1540b3249a995cb79e60997ea2028f2
        • Opcode Fuzzy Hash: 1e74ffe90d4fe0db93ad57ce51f0831a243a97f5884c5b61ca9269e998d40e2f
        • Instruction Fuzzy Hash: FE519AB1E0220ADFEB15CF55D4827AABBF8FB4A712F14812AD411EB750D376E940CB50
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d67620320d1544c9af1b63e73f406bbad3f98a1f83788f850c0baee025275bcc
        • Instruction ID: 9b8418ccaae859a79a2c2aa6e5d36296e5a4d391dbdcaf4824bc5c830cfebaa6
        • Opcode Fuzzy Hash: d67620320d1544c9af1b63e73f406bbad3f98a1f83788f850c0baee025275bcc
        • Instruction Fuzzy Hash: 4E41B2B5C04269AFDB10DF69CD89AEABBB8AF45304F1582D9E45DD3200DB359E84CF60
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: HeapProcess
        • String ID:
        • API String ID: 54951025-0
        • Opcode ID: 12b12f13fc483e4d11ae151b76694ea2ad1897338093e9b89e53af1806dcc651
        • Instruction ID: da206b2c81832ab18eb7ce98700500450c3833411249c4719dff233cbbf3605d
        • Opcode Fuzzy Hash: 12b12f13fc483e4d11ae151b76694ea2ad1897338093e9b89e53af1806dcc651
        • Instruction Fuzzy Hash: A6A00274605241EB9B508E35470931976BD554759270545595405D5150DB7454509F11
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: efc34d37f2f4d96fad5ac77d4f694893e7ea119da9ce74546484ab007d5b05ab
        • Instruction ID: 4a28a362f199cb64b0115b56d887b651ffc81dc843393105eada9b3b08b713a5
        • Opcode Fuzzy Hash: efc34d37f2f4d96fad5ac77d4f694893e7ea119da9ce74546484ab007d5b05ab
        • Instruction Fuzzy Hash: AD91D376F206058FCF09CE7CD9957EE77F6AF4A320F109219EA61E7390C63A99058B50

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1875 6d32e55a-6d32e585 call 6d32f129 1878 6d32e58b-6d32e58e 1875->1878 1879 6d32e8f9-6d32e8fe call 6d3300a9 1875->1879 1878->1879 1881 6d32e594-6d32e59d 1878->1881 1882 6d32e5a3-6d32e5a7 1881->1882 1883 6d32e69a-6d32e6a0 1881->1883 1882->1883 1885 6d32e5ad-6d32e5b4 1882->1885 1886 6d32e6a8-6d32e6b6 1883->1886 1887 6d32e5b6-6d32e5bd 1885->1887 1888 6d32e5cc-6d32e5d1 1885->1888 1889 6d32e862-6d32e865 1886->1889 1890 6d32e6bc-6d32e6c0 1886->1890 1887->1888 1891 6d32e5bf-6d32e5c6 1887->1891 1888->1883 1892 6d32e5d7-6d32e5df call 6d32db9e 1888->1892 1893 6d32e867-6d32e86a 1889->1893 1894 6d32e888-6d32e891 call 6d32db9e 1889->1894 1890->1889 1895 6d32e6c6-6d32e6cd 1890->1895 1891->1883 1891->1888 1909 6d32e893-6d32e897 1892->1909 1910 6d32e5e5-6d32e5fe call 6d32db9e * 2 1892->1910 1893->1879 1897 6d32e870-6d32e885 call 6d32e8ff 1893->1897 1894->1879 1894->1909 1898 6d32e6e5-6d32e6eb 1895->1898 1899 6d32e6cf-6d32e6d6 1895->1899 1897->1894 1904 6d32e802-6d32e806 1898->1904 1905 6d32e6f1-6d32e718 call 6d32dd33 1898->1905 1899->1898 1903 6d32e6d8-6d32e6df 1899->1903 1903->1889 1903->1898 1907 6d32e812-6d32e81e 1904->1907 1908 6d32e808-6d32e811 call 6d32d80e 1904->1908 1905->1904 1921 6d32e71e-6d32e721 1905->1921 1907->1894 1914 6d32e820-6d32e82a 1907->1914 1908->1907 1910->1879 1937 6d32e604-6d32e60a 1910->1937 1918 6d32e838-6d32e83a 1914->1918 1919 6d32e82c-6d32e82e 1914->1919 1923 6d32e851-6d32e85e call 6d32efe2 1918->1923 1924 6d32e83c-6d32e84f call 6d32db9e * 2 1918->1924 1919->1894 1922 6d32e830-6d32e834 1919->1922 1926 6d32e724-6d32e739 1921->1926 1922->1894 1930 6d32e836 1922->1930 1939 6d32e860 1923->1939 1940 6d32e8bd-6d32e8d2 call 6d32db9e * 2 1923->1940 1949 6d32e898 call 6d32ffed 1924->1949 1927 6d32e7e3-6d32e7f6 1926->1927 1928 6d32e73f-6d32e742 1926->1928 1927->1926 1933 6d32e7fc-6d32e7ff 1927->1933 1928->1927 1934 6d32e748-6d32e750 1928->1934 1930->1924 1933->1904 1934->1927 1938 6d32e756-6d32e76a 1934->1938 1942 6d32e636-6d32e63e call 6d32db9e 1937->1942 1943 6d32e60c-6d32e610 1937->1943 1944 6d32e76d-6d32e77e 1938->1944 1939->1894 1972 6d32e8d7-6d32e8f4 call 6d32df1f call 6d32eee2 call 6d32f09f call 6d32ee59 1940->1972 1973 6d32e8d4 1940->1973 1958 6d32e6a2-6d32e6a5 1942->1958 1959 6d32e640-6d32e660 call 6d32db9e * 2 call 6d32efe2 1942->1959 1943->1942 1948 6d32e612-6d32e619 1943->1948 1952 6d32e780-6d32e791 call 6d32ea35 1944->1952 1953 6d32e7a4-6d32e7b1 1944->1953 1950 6d32e61b-6d32e622 1948->1950 1951 6d32e62d-6d32e630 1948->1951 1967 6d32e89d-6d32e8b8 call 6d32d80e call 6d32ebe9 call 6d32f1d6 1949->1967 1950->1951 1956 6d32e624-6d32e62b 1950->1956 1951->1879 1951->1942 1969 6d32e793-6d32e79c 1952->1969 1970 6d32e7b5-6d32e7dd call 6d32e4da 1952->1970 1953->1944 1961 6d32e7b3 1953->1961 1956->1942 1956->1951 1958->1886 1959->1958 1990 6d32e662-6d32e667 1959->1990 1966 6d32e7e0 1961->1966 1966->1927 1967->1940 1969->1952 1975 6d32e79e-6d32e7a1 1969->1975 1970->1966 1972->1879 1973->1972 1975->1953 1990->1949 1992 6d32e66d-6d32e680 call 6d32ec3e 1990->1992 1992->1967 1996 6d32e686-6d32e692 1992->1996 1996->1949 1997 6d32e698 1996->1997 1997->1992
        APIs
        • type_info::operator==.LIBVCRUNTIME ref: 6D32E679
        • ___TypeMatch.LIBVCRUNTIME ref: 6D32E787
        • _UnwindNestedFrames.LIBCMT ref: 6D32E8D9
        • CallUnexpected.LIBVCRUNTIME ref: 6D32E8F4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
        • String ID: L3m$csm$csm$csm
        • API String ID: 2751267872-2258815385
        • Opcode ID: 8074d8e1fad495326e0952e7d2a3b596327c497c0bbb5725ebf0eabc74620c16
        • Instruction ID: 79c75e4692a4348f4d672ac20650e3b9a81ee7e9ae008ae24b571497dd98ced9
        • Opcode Fuzzy Hash: 8074d8e1fad495326e0952e7d2a3b596327c497c0bbb5725ebf0eabc74620c16
        • Instruction Fuzzy Hash: 90B18931C0430AAFCF15CFA4D9829AEBBB5FF04714B15816AE965BB201D332DA51CF91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1998 6d32d600-6d32d651 call 6d337f60 call 6d32d5c0 call 6d32db27 2005 6d32d653-6d32d665 1998->2005 2006 6d32d6ad-6d32d6b0 1998->2006 2008 6d32d6d0-6d32d6d9 2005->2008 2009 6d32d667-6d32d67e 2005->2009 2007 6d32d6b2-6d32d6bf call 6d32db10 2006->2007 2006->2008 2013 6d32d6c4-6d32d6cd call 6d32d5c0 2007->2013 2011 6d32d680-6d32d68e call 6d32dab0 2009->2011 2012 6d32d694 2009->2012 2020 6d32d690 2011->2020 2021 6d32d6a4-6d32d6ab 2011->2021 2015 6d32d697-6d32d69c 2012->2015 2013->2008 2015->2009 2018 6d32d69e-6d32d6a0 2015->2018 2018->2008 2022 6d32d6a2 2018->2022 2023 6d32d692 2020->2023 2024 6d32d6da-6d32d6e3 2020->2024 2021->2013 2022->2013 2023->2015 2025 6d32d6e5-6d32d6ec 2024->2025 2026 6d32d71d-6d32d72d call 6d32daf0 2024->2026 2025->2026 2028 6d32d6ee-6d32d6fd call 6d337d30 2025->2028 2031 6d32d741-6d32d75d call 6d32d5c0 call 6d32dad0 2026->2031 2032 6d32d72f-6d32d73e call 6d32db10 2026->2032 2036 6d32d71a 2028->2036 2037 6d32d6ff-6d32d717 2028->2037 2032->2031 2036->2026 2037->2036
        APIs
        • _ValidateLocalCookies.LIBCMT ref: 6D32D637
        • ___except_validate_context_record.LIBVCRUNTIME ref: 6D32D63F
        • _ValidateLocalCookies.LIBCMT ref: 6D32D6C8
        • __IsNonwritableInCurrentImage.LIBCMT ref: 6D32D6F3
        • _ValidateLocalCookies.LIBCMT ref: 6D32D748
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
        • String ID: csm
        • API String ID: 1170836740-1018135373
        • Opcode ID: 5abbb0bd4b1024713e64520514e30a329bce55f2cb2fd541533ec65fd86a4fce
        • Instruction ID: 33b683daef31c0c3b4344c766d41d86e10875e2cb4269a2793d95e19bf58e171
        • Opcode Fuzzy Hash: 5abbb0bd4b1024713e64520514e30a329bce55f2cb2fd541533ec65fd86a4fce
        • Instruction Fuzzy Hash: 9541A434E04209ABCF00CF68E884AAEBBB5BF85318F21C155E9196B351D772EA05CFD1
        APIs
        • FreeLibrary.KERNEL32(00000000,?,6D3325D9,00000000,6D32FDE0,00000000,00000000,00000001,?,6D332752,00000022,FlsSetValue,6D33A898,6D33A8A0,00000000), ref: 6D33258B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: FreeLibrary
        • String ID: api-ms-$ext-ms-
        • API String ID: 3664257935-537541572
        • Opcode ID: 72e8809c24a215cb67a417989e19cbabd29b07188f28a43d4100c9fb1e511771
        • Instruction ID: 00ea18189fe0a0196ec644065a6286d780c8da97a98a9b1ba505b25a34c9703c
        • Opcode Fuzzy Hash: 72e8809c24a215cb67a417989e19cbabd29b07188f28a43d4100c9fb1e511771
        • Instruction Fuzzy Hash: D721F9399452B1FBDB319F298F51A5A777CAB43768F134220EE15A7180DB31EA00C6E0
        APIs
        • GetLastError.KERNEL32(00000001,?,6D32D7E1,6D32C900,6D32C319,?,6D32C551,?,00000001,?,?,00000001,?,6D33E698,0000000C,6D32C64A), ref: 6D32DBBA
        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D32DBC8
        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D32DBE1
        • SetLastError.KERNEL32(00000000,6D32C551,?,00000001,?,?,00000001,?,6D33E698,0000000C,6D32C64A,?,00000001,?), ref: 6D32DC33
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: ErrorLastValue___vcrt_
        • String ID:
        • API String ID: 3852720340-0
        • Opcode ID: f53d0e03b82c783c02aa05b9ec39f1ec352e79d191580a71b23425f720ee955a
        • Instruction ID: 0afd04c832652293efc460a20bc14bd486a4f0c99c97be609f29945ea009b53a
        • Opcode Fuzzy Hash: f53d0e03b82c783c02aa05b9ec39f1ec352e79d191580a71b23425f720ee955a
        • Instruction Fuzzy Hash: C901D83290C33B6EEB1526B4BDC6726267DEF437797214229E710990F1EFD3480092E0
        Strings
        • C:\Users\user\Desktop\Loader.exe, xrefs: 6D33171A
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID:
        • String ID: C:\Users\user\Desktop\Loader.exe
        • API String ID: 0-1966603485
        • Opcode ID: 4846a63c45afebf320debf1e52f3bbb7ea2470104f71de1360f937e42e39a9d7
        • Instruction ID: a58336b5577a1d2c9143c53d3112d24fce6e59fe73aaee0dfeff16b8a0ed7aa3
        • Opcode Fuzzy Hash: 4846a63c45afebf320debf1e52f3bbb7ea2470104f71de1360f937e42e39a9d7
        • Instruction Fuzzy Hash: 8A218E352082A6AFD7109F658E8196B77BDBF5136870BC618FA58D7150EB31E84087A0
        APIs
        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,DCEAC541,00000000,?,00000000,6D338012,000000FF,?,6D32F6A8,?,?,6D32F67C,?), ref: 6D32F743
        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D32F755
        • FreeLibrary.KERNEL32(00000000,?,00000000,6D338012,000000FF,?,6D32F6A8,?,?,6D32F67C,?), ref: 6D32F777
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 9b23dc3338ceb6610240eb112517d6f8cd7aae276f89602896bf6133d2733b17
        • Instruction ID: 6c03ecc2781868e62e0bf7fcd4d23bd9f2f1b4c1eb3de227f598231af9f6b237
        • Opcode Fuzzy Hash: 9b23dc3338ceb6610240eb112517d6f8cd7aae276f89602896bf6133d2733b17
        • Instruction Fuzzy Hash: 2401A23991066AFFDF219F54CE49FBE7BBDFB05755F010525E821A2290DB75D800CAA0
        APIs
        • __alloca_probe_16.LIBCMT ref: 6D33420A
        • __alloca_probe_16.LIBCMT ref: 6D3342D3
        • __freea.LIBCMT ref: 6D33433A
          • Part of subcall function 6D33332A: HeapAlloc.KERNEL32(00000000,6D331C77,6D333044,?,6D331C77,00000220,?,?,6D333044), ref: 6D33335C
        • __freea.LIBCMT ref: 6D33434D
        • __freea.LIBCMT ref: 6D33435A
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: __freea$__alloca_probe_16$AllocHeap
        • String ID:
        • API String ID: 1096550386-0
        • Opcode ID: 23998eb0d6ce875702e15740beff39b352959eeadc34deeee011014f9eb22417
        • Instruction ID: eea74cc805d52df485ba985dda7c7872e19bfdeaf3b1e702e419fda51948840b
        • Opcode Fuzzy Hash: 23998eb0d6ce875702e15740beff39b352959eeadc34deeee011014f9eb22417
        • Instruction Fuzzy Hash: 5051B6726042ABABEB154FA4DE41EBB36A9EF48764F178128FE14D7110E737DC50C6A0
        APIs
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6D32E133,00000000,?,00000001,?,?,?,6D32E222,00000001,FlsFree,6D339F70,FlsFree), ref: 6D32E18F
        • GetLastError.KERNEL32(?,6D32E133,00000000,?,00000001,?,?,?,6D32E222,00000001,FlsFree,6D339F70,FlsFree,00000000,?,6D32DC81), ref: 6D32E199
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6D32E1C1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: LibraryLoad$ErrorLast
        • String ID: api-ms-
        • API String ID: 3177248105-2084034818
        • Opcode ID: 805409d28e0e29a2f96b337b640a8b5423c820a77f2e2aad3b9ac0bd915b3150
        • Instruction ID: 19421cde07af7eafd7df69e3312247842f720f8b682b142f5565051f00925225
        • Opcode Fuzzy Hash: 805409d28e0e29a2f96b337b640a8b5423c820a77f2e2aad3b9ac0bd915b3150
        • Instruction Fuzzy Hash: 61E01A38648355F7EF201F71DD07B693A69AB01B54F114030F90CE8095DB62E450C6A6
        APIs
        • GetConsoleOutputCP.KERNEL32(DCEAC541,00000000,00000000,?), ref: 6D3348F5
          • Part of subcall function 6D3322CC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D334330,?,00000000,-00000008), ref: 6D33232D
        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6D334B47
        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D334B8D
        • GetLastError.KERNEL32 ref: 6D334C30
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
        • String ID:
        • API String ID: 2112829910-0
        • Opcode ID: f5352e14cca457c6015893452dd10b435c376d0ceebc2ae99c201cd19fd5deb0
        • Instruction ID: 2118b232a414e899c14f601056d2dfa6df7f3b76237289c6f19a9f426c411bca
        • Opcode Fuzzy Hash: f5352e14cca457c6015893452dd10b435c376d0ceebc2ae99c201cd19fd5deb0
        • Instruction Fuzzy Hash: CDD19E75D04298AFCF01CFA8D980AADBBB9FF0D314F15812AE555EB351D731A941CB60
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: AdjustPointer
        • String ID:
        • API String ID: 1740715915-0
        • Opcode ID: c2666f073dc1005329904d3695d5194ea6295620a47e8cca5a72d0ec4e03f489
        • Instruction ID: fe1b8248a651b28f509ba440f3fa45f53c32a8a50738eaf2f2d506220bee5af6
        • Opcode Fuzzy Hash: c2666f073dc1005329904d3695d5194ea6295620a47e8cca5a72d0ec4e03f489
        • Instruction Fuzzy Hash: 2351CD72E08302EFEB158F65D842BBA77A4BF44714F10852DEA95E7290E732E940C790
        APIs
          • Part of subcall function 6D3322CC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D334330,?,00000000,-00000008), ref: 6D33232D
        • GetLastError.KERNEL32 ref: 6D330F7C
        • __dosmaperr.LIBCMT ref: 6D330F83
        • GetLastError.KERNEL32(?,?,?,?), ref: 6D330FBD
        • __dosmaperr.LIBCMT ref: 6D330FC4
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
        • String ID:
        • API String ID: 1913693674-0
        • Opcode ID: 12009cc6699ead9c84c81b29cf291d47157e823d308e2e20e20850cd8c550d60
        • Instruction ID: 2c2da929cb479b651f3e07fe6dc917f0301ec3430782d63e60a152810589fe0b
        • Opcode Fuzzy Hash: 12009cc6699ead9c84c81b29cf291d47157e823d308e2e20e20850cd8c550d60
        • Instruction Fuzzy Hash: 5A2198326082A6AFD7119F6BCA4196BB7BDFF45364703C518FA59E7140DB31EC508760
        APIs
        • GetEnvironmentStringsW.KERNEL32 ref: 6D332377
          • Part of subcall function 6D3322CC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D334330,?,00000000,-00000008), ref: 6D33232D
        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D3323AF
        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D3323CF
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
        • String ID:
        • API String ID: 158306478-0
        • Opcode ID: 598ed4d34789b1aad9347253b3bad95149bbfa72545d8a138fbd6965fc7c8872
        • Instruction ID: f4b3a720f354552b0bf8f5eda34bf363780095d3859936c9a70495e2bdb2e9fe
        • Opcode Fuzzy Hash: 598ed4d34789b1aad9347253b3bad95149bbfa72545d8a138fbd6965fc7c8872
        • Instruction Fuzzy Hash: E511E5BA9085B6BFEA251A769F89C6FAA6CDE461E8707C024F601D1200EF358D0186F0
        APIs
        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6D3359C6,00000000,00000001,00000000,?,?,6D334C84,?,00000000,00000000), ref: 6D33621D
        • GetLastError.KERNEL32(?,6D3359C6,00000000,00000001,00000000,?,?,6D334C84,?,00000000,00000000,?,?,?,6D335227,00000000), ref: 6D336229
          • Part of subcall function 6D3361EF: CloseHandle.KERNEL32(FFFFFFFE,6D336239,?,6D3359C6,00000000,00000001,00000000,?,?,6D334C84,?,00000000,00000000,?,?), ref: 6D3361FF
        • ___initconout.LIBCMT ref: 6D336239
          • Part of subcall function 6D3361B1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D3361E0,6D3359B3,?,?,6D334C84,?,00000000,00000000,?), ref: 6D3361C4
        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6D3359C6,00000000,00000001,00000000,?,?,6D334C84,?,00000000,00000000,?), ref: 6D33624E
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
        • String ID:
        • API String ID: 2744216297-0
        • Opcode ID: 4b2e57c9d78acf0a993f82c2028ee6f40c6f6bc221c7408a0790596a576bc503
        • Instruction ID: e3552d88ccd89f716abaa69b0fc3811cdef7880ab80a287d89a3118c26d2fba1
        • Opcode Fuzzy Hash: 4b2e57c9d78acf0a993f82c2028ee6f40c6f6bc221c7408a0790596a576bc503
        • Instruction Fuzzy Hash: 90F0AC3A5041A5BFCF221F95DE05A997F7AFB4A3A1F074110FB1995120DB328920EBD4
        APIs
        • EncodePointer.KERNEL32(00000000,?), ref: 6D32E924
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1393040422.000000006D321000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D320000, based on PE: true
        • Associated: 00000000.00000002.1393020864.000000006D320000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393080024.000000006D339000.00000002.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393103242.000000006D340000.00000004.00000001.01000000.00000007.sdmpDownload File
        • Associated: 00000000.00000002.1393184797.000000006D38E000.00000002.00000001.01000000.00000007.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_6d320000_Loader.jbxd
        Similarity
        • API ID: EncodePointer
        • String ID: MOC$RCC
        • API String ID: 2118026453-2084237596
        • Opcode ID: ab21f745b024b5a609196131649d570193212c426d3ee99d8387abb92bd63647
        • Instruction ID: 089623858c34cf5d6bfb4e20857c5f2f0012c733f0c0e8edb645e38f27a88bc0
        • Opcode Fuzzy Hash: ab21f745b024b5a609196131649d570193212c426d3ee99d8387abb92bd63647
        • Instruction Fuzzy Hash: 78413875D0020AAFCF05CFA4CD82AEE7BB5FF48304F15805AEA15BA250D336A951DB91

        Execution Graph

        Execution Coverage:2.5%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:5.9%
        Total number of Nodes:34
        Total number of Limit Nodes:3
        execution_graph 11765 588418 11768 58a740 11765->11768 11767 588423 GetUserDefaultUILanguage 11769 58a779 11768->11769 11769->11767 11769->11769 11775 5888ab 11776 5887ea 11775->11776 11776->11775 11777 588954 11776->11777 11778 588882 LoadLibraryExW 11776->11778 11778->11776 11779 5594c0 11780 5594c9 11779->11780 11781 5594da ExitProcess 11780->11781 11785 5594e5 11780->11785 11788 55a5b0 11780->11788 11792 588960 11785->11792 11786 5594ec 11786->11785 11795 55b460 FreeLibrary 11786->11795 11789 55a665 11788->11789 11790 55a6b1 LoadLibraryExW 11788->11790 11789->11790 11791 55a6e5 11790->11791 11791->11786 11796 58a0d0 11792->11796 11794 588965 FreeLibrary 11794->11781 11795->11785 11797 58a0d9 11796->11797 11797->11794 11798 582e0e 11801 58b320 11798->11801 11800 582e3a 11803 58b340 11801->11803 11802 58b4ae 11802->11800 11803->11802 11805 588aa0 LdrInitializeThunk 11803->11805 11805->11802 11811 586712 RtlAllocateHeap 11812 586802 RtlFreeHeap 11813 588f42 11815 588f7f 11813->11815 11814 588ffe 11815->11814 11817 588aa0 LdrInitializeThunk 11815->11817 11817->11814

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 192 588aa0-588ac8 LdrInitializeThunk
        APIs
        • LdrInitializeThunk.NTDLL(0058B4DC,005C003F,00000006,00120089,?,00000018,08090E0F,00000000,00565CBA), ref: 00588AC6
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
        • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
        • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
        • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 67 55a5b0-55a663 68 55a665 67->68 69 55a6b1-55a6ea LoadLibraryExW call 587b10 67->69 70 55a667-55a6ad 68->70 74 55a6ec-55a6f9 69->74 75 55a6fe-55a853 call 58a740 * 12 69->75 70->70 72 55a6af 70->72 72->69 76 55a9b4-55a9c6 74->76 102 55a857-55a85f 75->102 103 55a861-55a869 102->103 104 55a86e-55a8a6 call 584c20 102->104 105 55a99c-55a9a5 103->105 112 55a8a8-55a8b2 104->112 105->76 109 55a9a7-55a9ac 105->109 109->76 112->112 113 55a8b4-55a8cb 112->113 114 55a8cd 113->114 115 55a8cf-55a8d3 113->115 116 55a91c-55a92b call 55a9d0 114->116 117 55a8d5-55a8d8 115->117 123 55a930-55a934 116->123 118 55a8de-55a918 call 55f070 117->118 119 55a8da-55a8dc 117->119 118->117 121 55a91a 118->121 119->121 121->116 126 55a936-55a964 123->126 127 55a938-55a962 call 55b420 123->127 130 55a96c-55a975 126->130 127->130 135 55a977-55a97f 130->135 136 55a981-55a986 130->136 135->136 137 55a988-55a995 136->137 138 55a99a 136->138 137->102 138->105
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: ?$@$B
        • API String ID: 1029625771-3550719225
        • Opcode ID: 8bbacb1584caab43c8d7acee79d0624958682bcd2534cf2cd7cf4d61668e55e0
        • Instruction ID: 9f7410e6b69f40f2bcd10db2cafac7c2a98b7c43f923523b23eb6c6173b61d86
        • Opcode Fuzzy Hash: 8bbacb1584caab43c8d7acee79d0624958682bcd2534cf2cd7cf4d61668e55e0
        • Instruction Fuzzy Hash: 8AC1457450D7828FCB50DF28D59422ABFE0BBAA314F054A5EF8D897391D7348849EB93

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 140 5594c0-5594d8 call 559550 call 587b50 145 5594dc-5594e3 call 582710 140->145 146 5594da 140->146 150 5594e5 145->150 151 5594e7 call 55a5b0 145->151 147 55951d-559529 ExitProcess 146->147 152 559516 call 588960 150->152 155 5594ec-5594ee 151->155 156 55951b 152->156 157 5594f0 155->157 158 5594f2-55950f call 559530 call 55f220 call 55b460 155->158 156->147 159 559514 157->159 158->159 159->152
        APIs
        Strings
        • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 005594F2
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: ExitProcess
        • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
        • API String ID: 621844428-780655312
        • Opcode ID: 3d0739873cb203152440816a9a6b8428d67bf1a94eb287e7fb7ec15613a46ba1
        • Instruction ID: 88e5b298c348ea91d3179be45945f98389205c593e834edd53661b20d43474ae
        • Opcode Fuzzy Hash: 3d0739873cb203152440816a9a6b8428d67bf1a94eb287e7fb7ec15613a46ba1
        • Instruction Fuzzy Hash: 6CF0A7B0808215C6CE117BB4A96F23D3E58BF91313F400837EDC562102FB2C882DA7A3

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 165 5888ab-5888fc 166 5888fe-5888ff 165->166 167 588942-58894e 165->167 168 588900-588940 166->168 170 5887ea-58883b 167->170 171 588954 167->171 168->167 168->168 172 58883d-58883f 170->172 173 588882-58888e LoadLibraryExW 170->173 174 588840-588880 172->174 175 588890 173->175 176 588895-5888a8 173->176 174->173 174->174 175->176 176->165
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 71b1a70aeba42e8ad7fd5d9d7854048cab32089095631ddfd7cb57c207f99a9d
        • Instruction ID: 46c8c57e2e8c9e242f1244795cfdbfddf14987fa4308e0f671349e9c31cadb7f
        • Opcode Fuzzy Hash: 71b1a70aeba42e8ad7fd5d9d7854048cab32089095631ddfd7cb57c207f99a9d
        • Instruction Fuzzy Hash: 414125706483429BD308DF14D9A072FBBE1FBD6708F148A1DE8992B691CB74DD09DB86

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 177 5887ea-58883b 178 58883d-58883f 177->178 179 588882-58888e LoadLibraryExW 177->179 180 588840-588880 178->180 181 588890 179->181 182 588895-5888fc 179->182 180->179 180->180 181->182 184 5888fe-5888ff 182->184 185 588942-58894e 182->185 186 588900-588940 184->186 185->177 188 588954 185->188 186->185 186->186
        APIs
        • LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 0058888A
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: a515b8e077ccc12c9f33b678c11d8b92f205c0969b55c61774705e3e4ddb0956
        • Instruction ID: af8319c700be70a9bc02fa7ebf7ccc59f82bf301bb89139f005326e3023b9c98
        • Opcode Fuzzy Hash: a515b8e077ccc12c9f33b678c11d8b92f205c0969b55c61774705e3e4ddb0956
        • Instruction Fuzzy Hash: 3A1116706483419BD308DF14D9A072FBBE2FBD6708F148A1DE8952B691CB74DD09DB86

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 189 588418-588449 call 58a740 GetUserDefaultUILanguage
        APIs
        • GetUserDefaultUILanguage.KERNELBASE ref: 00588426
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: DefaultLanguageUser
        • String ID:
        • API String ID: 95929093-0
        • Opcode ID: 0381c13378bef33cc86f3c197c8be7b3c6b13927dd99a46e0a39b96965de5c7d
        • Instruction ID: 0d2a2fe4cb640db2c5228d85fa5de5a90a1fb270a686d79975f8b7dcc0583212
        • Opcode Fuzzy Hash: 0381c13378bef33cc86f3c197c8be7b3c6b13927dd99a46e0a39b96965de5c7d
        • Instruction Fuzzy Hash: 5ED0222EA200404BDB0CB775ECA2A3E3257EBE030736A403EC402C3341F63DC20E9A20

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 194 586802-58680e RtlFreeHeap
        APIs
        • RtlFreeHeap.NTDLL(?,00000000), ref: 00586806
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: FreeHeap
        • String ID:
        • API String ID: 3298025750-0
        • Opcode ID: cc64c9807242cd09c9b96dbdd0e7a29bbe2467af3302191d983f3715906f0d60
        • Instruction ID: 16a40d57eba595d07e25bbb04b4e71a8b8b95c49ad386cb0a1e0a24629cb0d6c
        • Opcode Fuzzy Hash: cc64c9807242cd09c9b96dbdd0e7a29bbe2467af3302191d983f3715906f0d60
        • Instruction Fuzzy Hash: 27B0127B74010464DA2022987C01BED731CC7C0132F000063E70891040412151240160

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 193 586712-58671e RtlAllocateHeap
        APIs
        • RtlAllocateHeap.NTDLL(?,00000000), ref: 00586716
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: cc64c9807242cd09c9b96dbdd0e7a29bbe2467af3302191d983f3715906f0d60
        • Instruction ID: 16a40d57eba595d07e25bbb04b4e71a8b8b95c49ad386cb0a1e0a24629cb0d6c
        • Opcode Fuzzy Hash: cc64c9807242cd09c9b96dbdd0e7a29bbe2467af3302191d983f3715906f0d60
        • Instruction Fuzzy Hash: 27B0127B74010464DA2022987C01BED731CC7C0132F000063E70891040412151240160

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 195 588960-588971 call 58a0d0 FreeLibrary
        APIs
        • FreeLibrary.KERNELBASE(0055951B), ref: 0058896B
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: FreeLibrary
        • String ID:
        • API String ID: 3664257935-0
        • Opcode ID: 90ec0a6d1d0303c8c8c10b3e20e92610f447f11f7369583c828fc5acdff5816a
        • Instruction ID: 9562058f02f20f38e14b0626455396d1269a76c4ec916df3805350b722170d21
        • Opcode Fuzzy Hash: 90ec0a6d1d0303c8c8c10b3e20e92610f447f11f7369583c828fc5acdff5816a
        • Instruction Fuzzy Hash: B4A00235411443DBDE117F34ED0D6283E32BBA1309B260157B44EA58318E251419FB05
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: !b60$#>0{$)a1-$+6*m$,I(K$</)&$?Y?[$LM$WE[S$WVSJ$\1N3$_A@X$b$f1, $j, 9${JVA
        • API String ID: 0-2289204625
        • Opcode ID: 94083ed82ed11c01ac0e2ed12a78c65bc6c3000bc7cc49ea9be97e659a87c554
        • Instruction ID: b4765f65d9ad0e97300c1af825950ecef8a9d3e452f222a4826b21113e3cf767
        • Opcode Fuzzy Hash: 94083ed82ed11c01ac0e2ed12a78c65bc6c3000bc7cc49ea9be97e659a87c554
        • Instruction Fuzzy Hash: FA5267715083458FD718CF18C4906ABBBE2FFD9318F058A2DE8E55B281E774D909CB92
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: C^[A$IVTP$MFG[$afdx$mfgs${~sy$EG$MO$]_
        • API String ID: 0-2294649119
        • Opcode ID: c1638575676f08c5e63e902445dfa4401c1c448ae338bba5b91fb75f8a9d7946
        • Instruction ID: 2c5f75aa75f9711bbf52fcba8e1e18d7187bdecc09bcdba6c7bb420afd023a6d
        • Opcode Fuzzy Hash: c1638575676f08c5e63e902445dfa4401c1c448ae338bba5b91fb75f8a9d7946
        • Instruction Fuzzy Hash: C682AAB5600601CFD724CF29E890A22BBF2FF99304F15896DD58A8B762D735E856DF80
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: $IK$*U"W$61$Cg$Hi$!#$9;$qs$uw
        • API String ID: 0-3993577159
        • Opcode ID: 4778804fd8313d1d4e79665a6744a96b279d9dec0d8c70d028a477e37c51bf7c
        • Instruction ID: fd12a05d93143c6d2c5c391e3f333acc037222c24b76aaad031e1ab8edb6c029
        • Opcode Fuzzy Hash: 4778804fd8313d1d4e79665a6744a96b279d9dec0d8c70d028a477e37c51bf7c
        • Instruction Fuzzy Hash: ED52A4B41193818AE3749F05D591BEFBBE2BB86344F108E2DC9EE2B645CB704146CF96
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: .$.$0$W"k$[$false$null$true${
        • API String ID: 0-1320804404
        • Opcode ID: 849d19c4a2f5d438f56266856bb441da0fe30f9279d9c56bdd82d2b72c24dd7f
        • Instruction ID: b7a7b129e6f34be79a4d093419493d040261b9d0414c95eb121c055cbc3fc9e8
        • Opcode Fuzzy Hash: 849d19c4a2f5d438f56266856bb441da0fe30f9279d9c56bdd82d2b72c24dd7f
        • Instruction Fuzzy Hash: 1CD138B45013069FEB105F20DC6972A7FE5BF82346F15443AEC869B2A2EB75D90CCB52
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
        • String ID:
        • API String ID: 2832541153-0
        • Opcode ID: 2d22969b0e444d0234e42464e0aac54efe66d1236873936e6d69f4e00f95c305
        • Instruction ID: 6305ce2a3738f98795e703cd4fd0049605a2ebc8663803f74d98515b1b05853f
        • Opcode Fuzzy Hash: 2d22969b0e444d0234e42464e0aac54efe66d1236873936e6d69f4e00f95c305
        • Instruction Fuzzy Hash: DD5139B0508B81DFD321DF38D559716BFE0BB1A304F148A6DD89A8BB91D335B818DB92
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: 0$Y!N#$YX$crkr$tQpS${nvo
        • API String ID: 0-2801861193
        • Opcode ID: bc27c668f6989bf8fc83902213486f14ec2b5ef6b9e9555969c668e25bb79fad
        • Instruction ID: 49034f4c3d33cb1c07de5b2d1954df8f90078ff2de0c66e665fd2b4a396d7db4
        • Opcode Fuzzy Hash: bc27c668f6989bf8fc83902213486f14ec2b5ef6b9e9555969c668e25bb79fad
        • Instruction Fuzzy Hash: 830244B02083818BD714DF19C4A1B6BBBE2FFC5309F148A1EE4D98B252D7799909CB57
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: .(.#$119,$5 $60&+$f$f8 <
        • API String ID: 0-2009440134
        • Opcode ID: c84701d44f41ccacabc30ba5a0bd7b5cacdb4d9b5d5c5c9ec1d38bb3ead31ac9
        • Instruction ID: f65cc61713a85136d84d3309418203c43f2d3c3c369ac06be2d8e3ef0c5932be
        • Opcode Fuzzy Hash: c84701d44f41ccacabc30ba5a0bd7b5cacdb4d9b5d5c5c9ec1d38bb3ead31ac9
        • Instruction Fuzzy Hash: C3C1BDB41047018FD728CF24D8A0A27BBF2FF9A304F05896DD99A4B796DB35E806CB50
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: MetricsSystem
        • String ID: YX$f$qxML$stJd$uw$y{
        • API String ID: 4116985748-4140902196
        • Opcode ID: 1877f74233a50cbe631422f801d62f17060425094df450acd2a0a69b86ef44c1
        • Instruction ID: c05f2764eeba705f2d3b038f83e3ec87e063ef041dac45d78eb24f51064d2798
        • Opcode Fuzzy Hash: 1877f74233a50cbe631422f801d62f17060425094df450acd2a0a69b86ef44c1
        • Instruction Fuzzy Hash: 9CD149B010D3818BD375CF14C4A4BABBFE2AFD6344F285A1DD4C91B296C7349989CB96
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: ?>=<$EMLR
        • API String ID: 0-78272047
        • Opcode ID: 2b19a530164e02c1c41a89112507baa65ea8a49113c687230cc735c3db710f9e
        • Instruction ID: 24c55e1247c59009d1b6425c5b43951964845510efe844fcb7fec84773766072
        • Opcode Fuzzy Hash: 2b19a530164e02c1c41a89112507baa65ea8a49113c687230cc735c3db710f9e
        • Instruction Fuzzy Hash: B75289B6600B41CFD328CF29C890B22BBF2FB99314B19896DD5968B7A1D735F945CB40
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: F0$_M$_Z$ihk
        • API String ID: 0-2356880666
        • Opcode ID: b438f4e14150a1e9a0a07f65b5b79db36f748f661e8aa78ef5a00c5d29329ba5
        • Instruction ID: e899b9f20fa457e4f1705485e2eb714e65876d823cbf2f3cbd899d3466e685ff
        • Opcode Fuzzy Hash: b438f4e14150a1e9a0a07f65b5b79db36f748f661e8aa78ef5a00c5d29329ba5
        • Instruction Fuzzy Hash: 974269B5600B019FD728CF29D595617BBF2FF85710B148A1DE8AA8BB85D730F812CB91
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: %;TK$Tvca$vn$+
        • API String ID: 0-2903632686
        • Opcode ID: 44889fe674403507a048ed82cae8ad97231f6482039f9c365db9a55b1e0f05f3
        • Instruction ID: faf673c24f21788f16da6e9a4c4577c3821c74a1976443e06e038f8d99cd18bb
        • Opcode Fuzzy Hash: 44889fe674403507a048ed82cae8ad97231f6482039f9c365db9a55b1e0f05f3
        • Instruction Fuzzy Hash: 8F62D035608201CFD718CF28D89062AB7F2FF9E314F1A896ED58A97761D734E849DB81
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: %;TK$Tvca$vn$+
        • API String ID: 0-2903632686
        • Opcode ID: 26344490dac32f23c8694919040231f38ff9487977e9a99201087d189c3efed1
        • Instruction ID: 6a4dec8992ddc7515e9a6b7937544059a4712442ede617d9c15b93a12068bbe2
        • Opcode Fuzzy Hash: 26344490dac32f23c8694919040231f38ff9487977e9a99201087d189c3efed1
        • Instruction Fuzzy Hash: 3262D235608301CFD718CF28D89062AB7F2FF9A314F1A896ED58A97761D735E809DB81
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: y*{$%q%s$&u&w
        • API String ID: 0-23862052
        • Opcode ID: b6c80a4056b4efe589860e9bfe9a2757182639e4b215e2025d82ffbc549b4b0d
        • Instruction ID: 74e46d5aa603630950c74f577cc2c8075828fdf8d285e32b7ea9142a55a302fb
        • Opcode Fuzzy Hash: b6c80a4056b4efe589860e9bfe9a2757182639e4b215e2025d82ffbc549b4b0d
        • Instruction Fuzzy Hash: 3C02A9B0608341DFE728DF24E890B6BBBE1FBD4304F15991DE5899B2A1D7349846DF82
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: A\$VQ$_Q
        • API String ID: 0-2014431945
        • Opcode ID: 0018cf0d46f7b34891c2d6a60d0ec1a9563958d2f8aaaf798db0608a0139cedc
        • Instruction ID: 1f52ecb8edde335298cccd75f93b2cc79af8dbdd7333a4b2cc4c8b4b206172b6
        • Opcode Fuzzy Hash: 0018cf0d46f7b34891c2d6a60d0ec1a9563958d2f8aaaf798db0608a0139cedc
        • Instruction Fuzzy Hash: 9F4197B0508351DBCB248F14C8A066FBBF1FF86315F054A1DE8995B390EB789D06DB96
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: +82$mgnd
        • API String ID: 0-2839690620
        • Opcode ID: 8c55e9529a8be9d028fa236196aeca17c3ca76cc39296d37b8dee3d1ca7b7e08
        • Instruction ID: 67f53bd14c03554fada55361cf5339cf5baf9846866f0fe87a8f93105167858c
        • Opcode Fuzzy Hash: 8c55e9529a8be9d028fa236196aeca17c3ca76cc39296d37b8dee3d1ca7b7e08
        • Instruction Fuzzy Hash: 37F19970108B918FD725CF39D0947A7BBE1BF56304F18896DC4EB8B692D73AA409DB50
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: +82$mgnd
        • API String ID: 0-2839690620
        • Opcode ID: e0b16b7768c4c1983d8e917dae01a4d77ab77ffd7a6247690cdb9ce5ed51a102
        • Instruction ID: 74fd373d519bbcb293267113e829f27fd3f11548c68892746fd84e478364ca17
        • Opcode Fuzzy Hash: e0b16b7768c4c1983d8e917dae01a4d77ab77ffd7a6247690cdb9ce5ed51a102
        • Instruction Fuzzy Hash: 8AD19B70108B828BD725CF39D094BA7BBF1BF56304F14896DD4EB8B692D736A809DB50
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: vn$+
        • API String ID: 0-1879957136
        • Opcode ID: 0b2f7e34d941586ad10417949e2849ac3119e3f0a0f2bf17588f6fb9ea3976e8
        • Instruction ID: 59049b76ef14c5f8526238c707cd90ad9f8e8a17dc38c43c17acd98dc2663174
        • Opcode Fuzzy Hash: 0b2f7e34d941586ad10417949e2849ac3119e3f0a0f2bf17588f6fb9ea3976e8
        • Instruction Fuzzy Hash: 8742E375608301CFD718CF28D8A062AB7F2FF9A314F19896ED98A97751D734E809DB81
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: X
        • API String ID: 0-529171957
        • Opcode ID: 09bdf61dc5ced588b59da596db21fdcf87d1e62c95f2e079ea363cb78f6c38b5
        • Instruction ID: 37ae7ffbb014ff1360d9176bf929913345fc8cdaf26f170b83cc5ad8f2be24d0
        • Opcode Fuzzy Hash: 09bdf61dc5ced588b59da596db21fdcf87d1e62c95f2e079ea363cb78f6c38b5
        • Instruction Fuzzy Hash: 8ED1F471A08752CBC714CE29C4E425ABFE3BFC5315F29CA2EE895473A5D6789C098B81
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID: ?>=<
        • API String ID: 2994545307-3799960392
        • Opcode ID: 10dd8254f58ddf4ec1603fb10149df74a12dd9c5444d6bce4aa03f97d59ed4ca
        • Instruction ID: 0810cbb8dc6c5dd46b1fcbdf81afa6c987c098d6d79f011ec0ad6db419cbe701
        • Opcode Fuzzy Hash: 10dd8254f58ddf4ec1603fb10149df74a12dd9c5444d6bce4aa03f97d59ed4ca
        • Instruction Fuzzy Hash: A271DC35605201CFD728CF18D890B22B3F2FF99305F19886EE98A8BA91D736F955DB50
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: 95
        • API String ID: 0-435051366
        • Opcode ID: 338b27fdd4725514f32f27615e4d963fe078574ffcd6e673930d0073e911b38b
        • Instruction ID: 94947e485936d31acc57f630b0406efcb51df9afdd59a19a5fb21fd3a589b5e3
        • Opcode Fuzzy Hash: 338b27fdd4725514f32f27615e4d963fe078574ffcd6e673930d0073e911b38b
        • Instruction Fuzzy Hash: 2251ADB19187418BD321DF28C85472ABBE8BF9A304F040A2DE4C5D7292E736DD45CB92
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID: @
        • API String ID: 2994545307-2766056989
        • Opcode ID: c44a35eb52ed7da93ac617a5f7117d619d35c449770a55ccc5a921ccdcf44374
        • Instruction ID: 079839b05837efa7f6eb5bd29de7c1bb0d13bd464de7174e41d7bd78679a4375
        • Opcode Fuzzy Hash: c44a35eb52ed7da93ac617a5f7117d619d35c449770a55ccc5a921ccdcf44374
        • Instruction Fuzzy Hash: E83198B15083059FD700EF18C8C0B6ABBF9FF99324F504A1DE894A7260C375A914CBA2
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: 2V
        • API String ID: 0-2394869900
        • Opcode ID: e14e8af4c81799f7dbab537716765addeb57e39c432b9f52c256e55b25037846
        • Instruction ID: b43cf6df606d5fd479b7e9c9fd5c782b52051ead952e2884ce85bf3800142a1f
        • Opcode Fuzzy Hash: e14e8af4c81799f7dbab537716765addeb57e39c432b9f52c256e55b25037846
        • Instruction Fuzzy Hash: 9211D075608301EFE310CF28DC86B6BB7E9EB89704F10492AF644D72A1E771E908DB42
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: 2V
        • API String ID: 0-2394869900
        • Opcode ID: bd26d397582a4d7f64a2485b4733c102770dd015c89f73c2aeb337160da80b72
        • Instruction ID: 48e29a4bf40de73c705ab0887d2945b432f4a96a4ac7a958641299c1d67a34ac
        • Opcode Fuzzy Hash: bd26d397582a4d7f64a2485b4733c102770dd015c89f73c2aeb337160da80b72
        • Instruction Fuzzy Hash: B011A9B6A18300DFC700CF28D88596AB7E9FB99304F00492AE554C3321E73AEA08DB52
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: \
        • API String ID: 0-2967466578
        • Opcode ID: f192f9e9c408b162717effa63685aec90440f078f252826209de8cfc909abf5b
        • Instruction ID: 8c6c28b7180ed792e41f94571eec891afaf268c7ef7fb2a7c2d4da00493edca0
        • Opcode Fuzzy Hash: f192f9e9c408b162717effa63685aec90440f078f252826209de8cfc909abf5b
        • Instruction Fuzzy Hash: 9B019674285300BEF6209F50DD47F1BB6A0A790F05F30581DB2497A1D1D6F47909964E
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 778d99a5e817c14e1941c326cf3ec900021067227dd567f81c87b1ae683ffb15
        • Instruction ID: 0af97ceadbe3afeb73319f90029a8991b2b3ad37ac5bf48f9cb57aeea63600ab
        • Opcode Fuzzy Hash: 778d99a5e817c14e1941c326cf3ec900021067227dd567f81c87b1ae683ffb15
        • Instruction Fuzzy Hash: 1962E4315087118BC724DF18D8A067AB7E1FFD4315F198A2ED9C6A7381EB34E959CB82
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2c7707bba77f17cc6253d3c156aa4c95db60232043759fed5f96612df1dd8bb9
        • Instruction ID: c1ef7702486814e38fab27d6c9508c532e2255d19c606e2fa5b1ad7f6f35a322
        • Opcode Fuzzy Hash: 2c7707bba77f17cc6253d3c156aa4c95db60232043759fed5f96612df1dd8bb9
        • Instruction Fuzzy Hash: 9A228B7160C3458FD714DF18C890B6ABBE2BBC8314F288A6DF9A59B391D735E805CB52
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 787038f9b152fb731d1770967a64674f2fd4d7083f93dedeeb1678e2ba96aadb
        • Instruction ID: b4bffbed673cd488b87e212aa697a6e3cbeb4096377ed47f72b90f7ac4240ee1
        • Opcode Fuzzy Hash: 787038f9b152fb731d1770967a64674f2fd4d7083f93dedeeb1678e2ba96aadb
        • Instruction Fuzzy Hash: 5CF1D3B4604B418FC724CF29D490622BBF2BF9A304B09896DD4DB8BB52D735F80ADB54
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ef702b0a96f55de0d9ece70ac1174a3b584e25385ff52a30b0eef1675fd3598c
        • Instruction ID: f67924fd9669f80721d1ffe584cc153f8b686ff186043caf28b73cd62f019230
        • Opcode Fuzzy Hash: ef702b0a96f55de0d9ece70ac1174a3b584e25385ff52a30b0eef1675fd3598c
        • Instruction Fuzzy Hash: 2DF1D271605B408FD324CF39D891726BBE2BF9A320F19C66DD4AA8B7E1C335E9059B00
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b35d45ded01736ea161091aaf0188490265680cd4fd2fa1b1a6d3d3ff48f2da7
        • Instruction ID: 4f735e04bab4d55c55532c0fa819dd95c422e6e4275718785bb16bba56219a96
        • Opcode Fuzzy Hash: b35d45ded01736ea161091aaf0188490265680cd4fd2fa1b1a6d3d3ff48f2da7
        • Instruction Fuzzy Hash: 2BA1F570104F818BD3288B398094766FFE6BF96304F28866DD8EB4B792F3756945D750
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8b72aa6f06424cd596ef3e8242400e7ad1d8d7cf3176da6ae1362d2434276d8d
        • Instruction ID: 9e403139ae6daf94dc5efe62e3f7c5c06e37fa7911e70571fdb52d98dc82ac71
        • Opcode Fuzzy Hash: 8b72aa6f06424cd596ef3e8242400e7ad1d8d7cf3176da6ae1362d2434276d8d
        • Instruction Fuzzy Hash: C3A1E724104F818BD3288F3980A4766FFE2BF96304F28CA6DD4EB4B792D735A849D750
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ab387acfc012bfd4fce599158157e7d9a87c6473fad4c80b562183820d54d0cf
        • Instruction ID: 72a42fe05658bc70423797e191de1c0b6eeca0cd6235029be333fee46f6bc59d
        • Opcode Fuzzy Hash: ab387acfc012bfd4fce599158157e7d9a87c6473fad4c80b562183820d54d0cf
        • Instruction Fuzzy Hash: 27B1B170104F428AD728CF35D4987E3BBE1BF56304F18896DC0EB4B692DB7A6509DB94
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bce16dadf67938f728824a5641d77130c748d6074f4e40c8aa1b073f8de92d98
        • Instruction ID: 30546fd4a333dc8ffabb0970682a09a33f9f01ac4dfb9607efc8c450cd8b5392
        • Opcode Fuzzy Hash: bce16dadf67938f728824a5641d77130c748d6074f4e40c8aa1b073f8de92d98
        • Instruction Fuzzy Hash: 9E61A2B16407019BCB28CF15CC92B637BB6FF99324B19861DE8478B7A0F734A801CB60
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: dd0b408f23cb3da7bf22e3993cff87963153073e855bad85fa660743775c85c7
        • Instruction ID: 17ee85f7e116ca10d1d11981a9d0f377e6e63a548670460072e08e4c3dc4fec2
        • Opcode Fuzzy Hash: dd0b408f23cb3da7bf22e3993cff87963153073e855bad85fa660743775c85c7
        • Instruction Fuzzy Hash: 98715879200B019FD7208F29C890B62BBF1FF86714F54894DE8968B7A0E739F815CB90
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a8ad5c4d6c2d1724592e13f47108d77c2b5bce9dbe94b28161cd9949414c94bc
        • Instruction ID: 9f5f2e59c2c4c8f903a9afdeafdbbe87a3db02bde031e4cae619a2dafe3a130a
        • Opcode Fuzzy Hash: a8ad5c4d6c2d1724592e13f47108d77c2b5bce9dbe94b28161cd9949414c94bc
        • Instruction Fuzzy Hash: 7681A174605740CFD325CF38D890B22BBE2BF5A314F1986ADD55A8B7A2C736E805EB10
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 798f8765049bf285a76ce3d4bd51a89d8b55822d53e954927484a7b2ff876b55
        • Instruction ID: f2d9e942f05228f1e35a8ff7d965fc4e643251c30df9a823e2e5d26f3c57653c
        • Opcode Fuzzy Hash: 798f8765049bf285a76ce3d4bd51a89d8b55822d53e954927484a7b2ff876b55
        • Instruction Fuzzy Hash: 0D614B70104F518BE725CF39C4A47A2BBE2BF56304F44895DD0EB8B282DB3AA519DB54
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d5c7108bc464627d20f63e66f2629c8426849fab47f9974a06d7b924ca01acd6
        • Instruction ID: 305e5d332beb980741d9e1eea283bc9c503685a33af48756260eefe97cd3482e
        • Opcode Fuzzy Hash: d5c7108bc464627d20f63e66f2629c8426849fab47f9974a06d7b924ca01acd6
        • Instruction Fuzzy Hash: 8C712C70104F518FE725CF39C4A47A2BBE2BF56204F48895DD0EBCB282DB2AA519DB54
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: 057e90dcfa51e726b2d862abe2eb7ca7749970423e1cac7951b821ef4ddf1a46
        • Instruction ID: 516a0029bde7e21a334452956c8232df828c5cb1febdf57f1eea35c5cd7b9886
        • Opcode Fuzzy Hash: 057e90dcfa51e726b2d862abe2eb7ca7749970423e1cac7951b821ef4ddf1a46
        • Instruction Fuzzy Hash: E3519E766083018FD314EF18C89066BBBE6FBD8714F1A8A2DE9C967355C7399C05CB81
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a7636ed063c64d2fd911d37252f062a1744a33633154bf4721345c0b1940ac27
        • Instruction ID: 03f28dc00c3d2f40af3c7f5c87edbbd73d767fd835d3fa21e82cbac798294ea3
        • Opcode Fuzzy Hash: a7636ed063c64d2fd911d37252f062a1744a33633154bf4721345c0b1940ac27
        • Instruction Fuzzy Hash: E3716874600B018FD728DF19D990A26BBE2FB99304F01895DE89B9BA51D735F845CF80
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9f87995f30d2ba089923c3f99fdd5173bf1e9995a78dbba91803c6cddc9fb7c1
        • Instruction ID: 4f4993f24e0770c348b2727040df6cb40595ce88f6e21c401bafeafda421d5ad
        • Opcode Fuzzy Hash: 9f87995f30d2ba089923c3f99fdd5173bf1e9995a78dbba91803c6cddc9fb7c1
        • Instruction Fuzzy Hash: 5E514774600B018FD325CF28C890B66B7E2FF8A314F098A5DD4A68B7A1E778F945CB40
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 09a5c7dd600f00d275911e88207053f9b090cec54717118d97407297c5104bfd
        • Instruction ID: 704d9be0294d0dbd9d189a7301ef54cddc388aac503709b45d4c4b650e01384b
        • Opcode Fuzzy Hash: 09a5c7dd600f00d275911e88207053f9b090cec54717118d97407297c5104bfd
        • Instruction Fuzzy Hash: 52512574600B018FD325CF28C891B66B7E1FF4A710F198A5DD4A68B7A1E778F945CB90
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 12bfcd7267b5f58250beb7797a8eec3b549af9fe90fa92025e6d923d1b0c640b
        • Instruction ID: 72a880dbdc2a784d162f2fd2b59b53f4e3b53032543c097cf07021f25159f235
        • Opcode Fuzzy Hash: 12bfcd7267b5f58250beb7797a8eec3b549af9fe90fa92025e6d923d1b0c640b
        • Instruction Fuzzy Hash: B041C732B081615BCB148A3DCC6027ABED39FC5285F1DC63AECC9DB346E534D9045794
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: eac79e7acb4c5d2ce9581a2c2b8d229d43d4e8a692aae4cfcb9308a1a14e778f
        • Instruction ID: 3867bdbb12e42cebaf2dc5812a99970fba797d73a3aea6a79c602a99c2b394f3
        • Opcode Fuzzy Hash: eac79e7acb4c5d2ce9581a2c2b8d229d43d4e8a692aae4cfcb9308a1a14e778f
        • Instruction Fuzzy Hash: 914129B19487089BCB219F54C88473ABBE8FF91316F1946A9E88947382FFB1DC44C751
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 08b7157c4ddebb451878e33dc1a3bd84f76d3283e4f3ac7b905b71f85500fc7e
        • Instruction ID: 31f216f44f2aeb5615607ed6e79f4ec8c1f01a73537193f742b32c041505ee24
        • Opcode Fuzzy Hash: 08b7157c4ddebb451878e33dc1a3bd84f76d3283e4f3ac7b905b71f85500fc7e
        • Instruction Fuzzy Hash: 8B513D70104F518BE725CF39C4947A3BBE2BF56304F44895DD0EB8B282DB3AA429DB54
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: dd555eb5c6a9d8580900354f07d486399135257b8333361a3d8f43f69cb12fd1
        • Instruction ID: d0da24b8e7562f65d74f385aecaec7f70638a5fd25dfc1c1791739beb9a5122d
        • Opcode Fuzzy Hash: dd555eb5c6a9d8580900354f07d486399135257b8333361a3d8f43f69cb12fd1
        • Instruction Fuzzy Hash: 32412271601B008FD325CF28C991B52BBF2BF8A701F08895ED89A87B65D739F805CB40
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 243537e4999cf07b4934df13b2911a24d01d69319d8529b8622270ad32ce8366
        • Instruction ID: 10e14b907b895969bcfd967c370acdd3db28744aee2b24ad196a790196733825
        • Opcode Fuzzy Hash: 243537e4999cf07b4934df13b2911a24d01d69319d8529b8622270ad32ce8366
        • Instruction Fuzzy Hash: 8D416878240B019FD7208F29C890B62B7F2FF86704F18890DE8968B790E739F815CB90
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: eae64ea677bdf4bca35d4c3fcb74770b69736975759b72cd1fe5c3c05a9640fc
        • Instruction ID: 5e4b7060c11d8e78296f2d63447f91073570150dd834a4bc52dad5668a9834b6
        • Opcode Fuzzy Hash: eae64ea677bdf4bca35d4c3fcb74770b69736975759b72cd1fe5c3c05a9640fc
        • Instruction Fuzzy Hash: D831EB32A082114BC718DF34C89166AF7E2FBCD354F2A9A6DE8A59B3C1D334DC018791
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 84dfe39a0240755fd6f13e35870048ba7ceb730868c3c2d638680708d5ca1a03
        • Instruction ID: c7921d5a9febe42302d269e7f771bcc4a7d619738253723b63b4b84a37db001f
        • Opcode Fuzzy Hash: 84dfe39a0240755fd6f13e35870048ba7ceb730868c3c2d638680708d5ca1a03
        • Instruction Fuzzy Hash: F741ACB1910B00AFD360DF3D8947757BEE8AB0A260F504B1DF8EAD7790E231A4158BD6
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: badbe1553ffab3dad17f5905473659d94891fea34b2952449eb4dded3149edb2
        • Instruction ID: 52dab26305d545cd4a3670bb9377d16a17fa678dfe0a2d734eea1d5637e70f8f
        • Opcode Fuzzy Hash: badbe1553ffab3dad17f5905473659d94891fea34b2952449eb4dded3149edb2
        • Instruction Fuzzy Hash: 43317A725083009FD311EF18C884B5BBBE5FBC5768F158A2DE8D8AB251D339ED458B92
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 88dea710e969eb5744eda019992d353233ee74d05e628acffda370b1205f2bbb
        • Instruction ID: c20d12aca9342124d615fa9ed9723683483a3147fa9b4ac3d67138b32e054ed9
        • Opcode Fuzzy Hash: 88dea710e969eb5744eda019992d353233ee74d05e628acffda370b1205f2bbb
        • Instruction Fuzzy Hash: 1E11BE715087019BC721CF14CC80B6BBBF5FBD9304F08191DE48597262E731D801CB56
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
        • Instruction ID: 9fdbd073d16227f64612e2267521ae73012165a8939be35af32e192efa93041e
        • Opcode Fuzzy Hash: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
        • Instruction Fuzzy Hash: C011C6326051E40BC3169D3D8410569BFE32AA3334F594399E8B8AB2D2DA238D8A8365
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c5bd6d0f5f57ab19e159eae15cdc49e35225bcc7563e26bc5766ba6c6ada42ad
        • Instruction ID: cbfa890637dfe0596c43c2194934b811ea97fe2030aba1d2f9d2942b1e8b78e0
        • Opcode Fuzzy Hash: c5bd6d0f5f57ab19e159eae15cdc49e35225bcc7563e26bc5766ba6c6ada42ad
        • Instruction Fuzzy Hash: 9D0192F160130287D731AE14F4D873BAAA8BB80705F08852DD8495B301DB61EC08DAA1
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 52da11bdfa80d55698eca696b1fc391b65a49468e709b80be94feec5a1af2a1e
        • Instruction ID: cc12bb44f7f0298a781add0b38f0de74657346975a16c438f8200072dee4bfca
        • Opcode Fuzzy Hash: 52da11bdfa80d55698eca696b1fc391b65a49468e709b80be94feec5a1af2a1e
        • Instruction Fuzzy Hash: DA116774604B029FC324CF29C980A26BBF6BF9A310B185A1DC4978BBA1DB70F944CB14
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ecf5b2435f6fad9a1c76ac5d9c6729455afd3750a09ba2418628369d150614ac
        • Instruction ID: 2827801d81bc07069d207ce785f4e057554ef4f1ffb29d59ece77363a6bcf2bd
        • Opcode Fuzzy Hash: ecf5b2435f6fad9a1c76ac5d9c6729455afd3750a09ba2418628369d150614ac
        • Instruction Fuzzy Hash: A0117976201A419BD328CF28C990B66B7F2BB86310F08996DD09AC7B11EB38E805CB44
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ee1e8632c2800de9c474029ef36b45d888954fb80d83fd4ce242a25dee42c612
        • Instruction ID: 1034d462c33f55588c06c4d0b0887515e8891c3215bb0b94f2fd2692bf42047e
        • Opcode Fuzzy Hash: ee1e8632c2800de9c474029ef36b45d888954fb80d83fd4ce242a25dee42c612
        • Instruction Fuzzy Hash: 9C019A316052828FC324CF28C890B20FFF6FF6A315F29459AD1849B662C331E855CF98
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d665afaa01de69fd6255678c59983a907f0d18cd5b9c20b036e790e0463bc5a0
        • Instruction ID: e33c2763b4e1720bde7e6ead3342bbc7387c84c49137923e16d95671320c41a3
        • Opcode Fuzzy Hash: d665afaa01de69fd6255678c59983a907f0d18cd5b9c20b036e790e0463bc5a0
        • Instruction Fuzzy Hash: 69F04CBA7AC30E1B9710DCF99CC0462F7D2E3C8555F0C4039DD45D3200E464EA0982D0
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3bc38ea068082d4b92a633d9d58e24b68f8873dd92fc05601116b715a65e56bb
        • Instruction ID: d85a4819dd0b3669a5bd7b2fd62d4d1922c91e33db7614277b769c153ef281b5
        • Opcode Fuzzy Hash: 3bc38ea068082d4b92a633d9d58e24b68f8873dd92fc05601116b715a65e56bb
        • Instruction Fuzzy Hash: 6001A739209340CFD3448F2CD8906397BA6EB96365F5529AAF491873F1C734CC85D751
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 889a0a25f094b01e0f69bc34d83ba06e836868c7b06ed6d3d49b14b3c62465fb
        • Instruction ID: 8a724fce1ac2123ab34a24e1715ebf6cabd2e6f3dec3fcdf69c7efca21ffc35f
        • Opcode Fuzzy Hash: 889a0a25f094b01e0f69bc34d83ba06e836868c7b06ed6d3d49b14b3c62465fb
        • Instruction Fuzzy Hash: 5AF0E775A1C201ABD708DF29C59166BBBE2AB85744F18892DF88AD3341D634DC06EB46
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
        • Instruction ID: c37ea7505b9e03fd98c7ae771f358a80285a539e48f72055a5ba4e67f6ae1e91
        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
        • Instruction Fuzzy Hash: F9D0A762649BA50E57688D3844B0477FFF8F947613F18149FE8D6E7105D220DC4586AC
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 415e07923a9248e3ab0b99fd183aa0e3509434bcf9ab1075cc96053aa39154a8
        • Instruction ID: 2393fc11c457fb321078cdd1824504a66442edd1e2351e37d5d7c8309b447ccc
        • Opcode Fuzzy Hash: 415e07923a9248e3ab0b99fd183aa0e3509434bcf9ab1075cc96053aa39154a8
        • Instruction Fuzzy Hash: 27E0C2B011A241DFD310EF28C999B4ABBF0FB94704F41895CE986D7390D7749508CB82
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: edfe9d4b0f945351f3ebf764d8a8a652b27a0a9a4d96b54098bb7e27959cb61e
        • Instruction ID: 1f8f40d85c6ced5fd731afa4665f67045b0e9890b830b533da6f2f80757ccab9
        • Opcode Fuzzy Hash: edfe9d4b0f945351f3ebf764d8a8a652b27a0a9a4d96b54098bb7e27959cb61e
        • Instruction Fuzzy Hash: DDD0ECA04093C4DE8B09CF559454035FFB1AF56204B6424DED0964B292DA31D58BEB55
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 128f5fe937d45877b8dd531beaf0bf20fec1687645d771a1486700b49ccdb4aa
        • Instruction ID: 4485dc28013bb5ba83e5db757bf52972c22e1db1d78798371a9a6059a747ea8c
        • Opcode Fuzzy Hash: 128f5fe937d45877b8dd531beaf0bf20fec1687645d771a1486700b49ccdb4aa
        • Instruction Fuzzy Hash: E4B012A5D8500096D2445D00A40A2B0F334632B307F067411D808B7223D952EA480109
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID: MetricsSystem
        • String ID: $[Y$$\Y$,[Y$,\Y$4[Y$4\Y$<[Y$<\Y$D[Y$D\Y$L[Y$L\Y$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$PHY$T[Y$T\Y$\[Y$\\Y$d[Y$d\Y$l[Y$l\Y$t[Y$t\Y$|[Y$|\Y$[Y$[Y
        • API String ID: 4116985748-53087812
        • Opcode ID: 5a162564fafcc0001243892996c8255b3850fcb541c14b472857c154b43fa9dd
        • Instruction ID: 681b1569bae8189bc2c91400bddec9d2f87c1a55446a4c93600388b8a3eb155b
        • Opcode Fuzzy Hash: 5a162564fafcc0001243892996c8255b3850fcb541c14b472857c154b43fa9dd
        • Instruction Fuzzy Hash: E7C138B09197C09BDB72CF10E8987CFBEE4BB86748F104A5CD0AD4A251E7B50959CF86
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1382886794.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
        • Associated: 00000003.00000002.1382867358.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382914931.000000000058D000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382935367.0000000000590000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.1382954984.00000000005A2000.00000002.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_550000_aspnet_regiis.jbxd
        Similarity
        • API ID:
        • String ID: 32$g})/
        • API String ID: 0-4181651060
        • Opcode ID: 8c76918bd42a6fc15894158a8a994409c655a22625b1f161773e3b62df30791a
        • Instruction ID: 627833ca8c693ef6b01828316ca03bff7b8e2bf94fe6044ddd6a6aa18ccbd19f
        • Opcode Fuzzy Hash: 8c76918bd42a6fc15894158a8a994409c655a22625b1f161773e3b62df30791a
        • Instruction Fuzzy Hash: 1AC11130284B418BD725CF29D888762BFE2BF95314F188A5DD4EA8B792DB34F409DB51